Selected Publications





Journal publications:

  1. Zaman, A. N. K., Obimbo, C. & Dara, R. (2016). A Novel Differential Privacy Approach that Enhances Classification Accuracy. C32SE-16. July 20-22, 2016. Pp 79 - 84.
  2. Sharma, S., Swayne, D., & Obimbo, C. (2015). Identification of concurrent control chart patterns in time series. International Journal of Innovative Research in Science Engineering & Technology, 1-17. Accepted for publication.
  3. Sharma, S., Swayne, D. A., & Obimbo, C. (2015). Automating the Smoothing of Time Series Data. Journal of Environmental & Analytical Toxicology, 5 (5), 216 - 223, doi: 10.4172/2161-0525.1000304.
  4. Sharma, S., Swayne, D. A., & Obimbo, C. A. (2015). Identification of Concurrent Control Chart Patterns in Time Series. International Journal of Innovative Research in Science, Engineering and Technology, 4 (4), 5032-5038, doi: 10.15680/IJIRSET.2015.0406167.
  5. Zaman, A. N. K. & Obimbo, C. (2014).  Privacy Preserving Data Publishing. International Journal of Advanced Computer Science and Applications, 5 (5), 216 - 223, doi: 10.14569/IJACSA.2013.041206.
  6. Benjamin Ferriman and Charlie Obimbo. Solving For The RC4 Stream Cipher State Register Using A Genetic Algorithm. International Journal of Advanced Computer Science and Applications (IJACSA), 5(5), (2014). http://thesai.org/Downloads/Volume5No5/Paper_33-Solving_for_the_RC4_stream_cipher_state_ register.pdf. pp 216 - 223. DOI: 10.14569/IJACSA.2013.041206.
  7. Dragan Lazic and Charlie Obimbo. Anonymous Broadcast Messages. International Journal of Advanced Computer Science and Applications (IJACSA), 4(12), (2013). http://dx.doi.org/10.14569/IJACSA.2013.041206 pp 36 - 41. DOI: 10.14569/IJACSA.2013.041206.
  8. Ahmed Mahmood, Tarfa Hamed, Charlie Obimbo, Robert Dony. Improving the Security of the Medical Images. International Journal of Advanced Computer Science and Applications ( IJACSA ) , 4(9), 137 - 146. October, (2013). http://dx.doi.org/10.14569/IJACSA.2013.040922. DOI: 10.14569/IJACSA.2013.040922.
  9. Charlie Obimbo & Liliana Maria Arboleda-Cobo. An Intrusion Detection System for MANET. CISME Vol.2 No.3 (2012) pp.1-5. www.jcisme.org. World Academic Publishing.
  10. C. Obimbo and M. Jones. Applying Variable Coefficient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset. Procedia Computer Science, Volume 8, (2012), Pages 333-337.
  11. R. Wilson and C. Obimbo. Improvements on Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset. International Journal of Internet Technology and Secured Transactions (IJITST), (2011).
  12. C. Obimbo and B. Ferriman Vulnerabilities of LDAP As An Authentication Service. Journal of Information Security (JIS), (2011). pp 151 - 157.
  13. R. Wilson and C. Obimbo. Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the KDD Cup 1999 Dataset. IEEEXplore, 978-0-9564263-7/6, (2011) IEEE, pp. 42-47.
  14. M. Xu, G. Grewal, S. Areibi, C. Obimbo and D.Banerji. Near-Linear Wirelength Estimation for FPGA Placement. IEEE Canadian Journal of Electrical and Computer Engineering, Vol. 34, No. 3, (Summer 2009), pp. 125-132.
  15. C. Obimbo and B. Salami. A Parallel Algorithm for Determining the Inverse of a Matrix for use in Block Cipher Encryption/Decryption. The Journal of Supercomputing (Kluwer) 39(2): 113 - 130, (Feb 2007).


Other refereed publications:
  1. Charlie Obimbo, Andrew Halligan, Patrick De Freitas. CaptchAll: An Improvement on the Modern Text-Based CAPTCHA. Proceedings of Complex Adaptive Systems. November 13-15, (2013), Baltimore, MD, pp 496-501.
  2. C. Obimbo and W. Wang. A Fuzzy Clustering Algorithm for Fingerprint Enhancement. Accepted and to be presented at The 2011 International Conference on Security and Management (SAM'11: July 18-21, 2011, USA). pp 405 - 408.
  3. E. Ma and C. Obimbo. Attacking TEA with Genetic Algorithm Harmony Search over Known Plaintext. Submitted to The Computational Intelligence and Machine Learning Section of The Complex Adaptive Systems 2011 Conference in Chicago, Illinois, October, 2011. pp 171 - 176.
  4. C. Obimbo, H. Zhou and R. Wilson. Multiple SOFMs Working Cooperatively in a Vote-based Ranking System for Network Intrusion Detection. Submitted to The Computational Intelligence and Machine Learning Section of The Complex Adaptive Systems 2011 Conference in Chicago, Illinois October, 2011. pp 219-224.
  5. C. Obimbo. and Y. Zhang. Using Data Mining Techniques for Inquiry Learning. The 2011 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'11: July 18-21, 2011, USA). pp 251 - 254.
  6. C. Obimbo. and W. Wang. A Fuzzy Clustering Algorithm for Fingerprint Enhancement. The 2011 International Conference on Security and Management (SAM'11: July 18-21, 2011, USA). pp 405 - 408.
  7. R. Wilson and C. Obimbo. Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the KDD Cup 1999 Dataset. Proceedings of the World Congress on Internet Security (WorldCIS-2011), February 21-23, 2011, London, UK. pp. 56-61.
  8. Charlie Obimbo. An Intrusion Detection System for Mobile Ad-Hoc Networks. Proceedings of The 2009 International Conference on Security and Management (SAM'09), pp 285--290, July 13-16, 2009.
  9. Charlie Obimbo. A Watermark Generation Algorithm Using The Mersenne Twister. Proceedings of The 2009 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV'09), pp 331--336, July 13-16, 2009.
  10. M. Xu, G. Grewal, S. Areibi, C. Obimbo and D.Banerji Near-Linear Wirelength Estimation for FPGA Placement. IEEE Canadian Conference on Electrical and Computer Engineering, CCECE'09, Newfoundland, Canada, May 2009, pp. 1198-1203. Best Paper Award.
  11. C. Obimbo and B. Salami. DIGICOP: A Copyright Protection Algorithm for Digital Images. TIC - STH 2009. pp 927 - 932. URL http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05444366.
  12. C. Obimbo and Y. Ebrahim. Using the HC for Shape Representation and Description. Proceedings of The 2008 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV'08), July 14-17, 2008.
  13. C. Obimbo. Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks. Proceedings of The 2008 International Conference on Foundations of Computer Science (FCS'08), July 14-17, 2008.
  14. C. Obimbo. An Adaptive Coding Algorithm for Secret Transmission of Information. Proceedings of The 2008 International Conference on Security and Management (SAM'08), July 14-17, 2008.
  15. C. Obimbo. Tips in Successfully Dealing with Large. WCCCE'07 - 12th Annual Western Canadian Conference on Computing Education, Thompson Rivers University, Kamloops, BC, May 5, 2007.
  16. C. Obimbo, W. Wang, J. Tian, G. Grewal. Fingerprint Enhancement and Segmentation. Proceedings of the Conference on Artificial Neural Networks in Engineering, St. Louis, MO, USA. November 5-8, 2006.
  17. C. Obimbo, J. Ni: A Grey-level Image Watermarking Method Based On Block DCT and Statistic Correlation Adjustment. Communication, Network, and Information Security 2006: 22-27.
  18. C. Obimbo, F. Haji, L. Lindsay, and D. Patel. Security Framework for Supervisory Control and Data Acquisition, Automation Systems and Networks. IASTED conference on Communication, Network, and Information Security" (CNIS 2006), Cambridge, Mass., October 9-11, 2006.
  19. C. Obimbo, B. Salami. A multi-bitwatermark generation algorithm with properties of error correction. IASTED conference on Communication, Network, and Information Security" (CNIS 2006), Cambridge, Mass., October 9-11, 2006, 44-49.
  20. C. Obimbo, L.M. Arboleda C., Y. Chen. A Watchdog Enhancement to IDS in MANET. IASTED conference on Wireless Networks" (WNET2006), Banff, Canada, July 3 - 5, 2006.
  21. C. Obimbo and Y. Zhang. An LSB-Based Watermarking Algorithm for Grayscale Images. IASTED conference on "Communication, Network, and Information Security" (CNIS 2005). Phoenix AZ.
  22. A. Koso, A. Turi, and C. Obimbo. Embedding Digital Signatures in MP3s. Internet and Multimedia Systems and Applications (IMSA) 2005: Copyright and Security. (IMSA) ed. M. H. Hamsa. pp 271-274. Honolulu, Hawaii, USA, August 15-17th, 2005.
  23. M. Xu, B. Salami, and C. Obimbo. How to Protect Personal Information against Keyloggers. Internet and Multimedia Systems and Applications (IMSA) 2005: Copyright and Security (IMSA) ed. M. H. Hamsa. pp 275-280. Honolulu, Hawaii, USA, August 15-17th, 2005.
  24. Charlie Obimbo. A Parallel Algorithm for Determining the Inverse of a Matrix for Use in Block Cipher Encryption and Decryption. The 2005 International Conference on Scientific Computing (CSC05), ed. Hamid R. Arabnia. pp 164-169. Las Vegas, NV, June 20-23, 2005.
  25. Charlie Obimbo and Nhi Tonnu. A System That Can Enhance E-Business in The Developing. The 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing (EEE05), ed. Hamid R. Arabnia. pp 68-74. Las Vegas, NV, June 20-23, 2005.
  26. Charlie Obimbo and Rohit Makhijani. An Online Linking System for Researchers. 2004 International Conference on Internet Computing (IC'04), eds. Hamid R. Arabnia, Olaf Droegehorn, pp 455 - 458. Las Vegas, NV, June 21-24, 2004.
  27. Charlie Obimbo and Stephen Doxsee. The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing In Applied Cryptography. 2004 International Conference on Algorithmic Mathematics and Computer Science (AMCS'04), eds. Hamid R. Arabnia, Iyad A. Ajwa, & George A. Gravvanis. pp 423 - 426. Las Vegas, NV, June 21-24, 2004.
  28. Charlie Obimbo and Nhi Tonnu. A Web Based Pre-Admission Evaluation for CIS MSc. Application. The WCCCE'04, Proceedings of the 9th West Canadian Conference on Computing Education, eds. Ian Cavers & George Tsiknis, pp 153 - 160. Okanagan University College, Kelowna, BC; May 6 - 7, 2004.
  29. Charlie Obimbo. On the Concept of Enumerability of Infinite Sets. The WCCCE'04, Proceedings of the 9th West Canadian Conference on Computing Education, eds. Ian Cavers & George Tsiknis, pp 161 - 166. Okanagan University College, Kelowna, BC; May 6 - 7, 2004.
  30. Gary Grewal, M. Xu, and C. Obimbo. An Approximate Solution for Steiner Trees in Multicast Routing. The 2004 International Conference on Artificial Intelligence (ICAI'04), eds. Hamid R. Arabnia, Oscar Castillo, R. Joshua et al. pp 707 - 711. June 21-24, 2004, Las Vegas, Nevada, USA.
  31. Charlie Obimbo, Fangju Wang and Weihong Xu. Panoramic Images from Digital Video Clips. International Conference on Artificial Intelligence (IC-AI'03): June 23-26, 2003, Las Vegas, Nevada, USA.
  32. Gary Grewal, Michael O'Cleirigh and Charlie Obimbo. Hierarchical Genetic Algorithms in Datapath Synthesis. The 2003 International Conference on Artificial Intelligence (IC-AI'03): June 23-26, 2003, Las Vegas, Nevada, USA, .
  33. Charlie Obimbo. Solving Divide and Conquer Recurrences By Master Theorem a la Charlie. The WCCCE'03, Proceedings of the 8th West Canadian Conference on Computing Education, eds. Ian Cavers & George Tsiknis, pp 201 - 217. North Island College, Courtenay, BC; May 1 - 2, 2003
  34. Charlie Obimbo. A New Method to Order Functions by Asymptotic Growth Rates. The WCCCE'03, Proceedings of the 8th West Canadian Conference on Computing Education, eds. Ian Cavers & George Tsiknis, pp 219 - 229. North Island College, Courtenay, BC; May 1 - 2, 2003.
  35. Charlie Obimbo. An Algorithm to Solve the Chinese Remainder Problem. The 2001 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'2001), Las Vegas, Nevada, USA; June 25-28, 2001, 2246-2250.
  36. Charlie Obimbo. The ACTs Machine: A Query Processing Engine for Disjunctive Deductive Databases. Proceedings of International Conference on Artificial Intelligence (IC-AI'2001, June 25-28, 2001), Monte Carlo Resort, Las Vegas, Nevada, USA, 1581-1587.
  37. Charlie Obimbo. Access Clause Trees in Disjunctive Deductive Databases. Ph.D. Thesis, University of New Brunswick, May 2000.
  38. Charlie Obimbo and Bruce Spencer. T-priority: A Resolution Strategy for Deductive Databases. Proceedings of International Conference on Artificial Intelligence (IC-AI'2000, June 26 - 29, 2000), Monte Carlo Resort, Las Vegas, Nevada, USA, 1550-1556.
  39. Charlie Obimbo. T-priority: A restrictive Strategy. Proceedings of the 12th Annual Atlantic Mathematics and Computing Science Conference, Saint Mary's University, Halifax, Nova Scotia, Canada, October 16-18, 1998.
  40. Charlie Obimbo. Towards an efficient Disjunctive Deductive Database Engine. Proceedings of the 11th Annual Atlantic Mathematics and Computing Science Conference, University of New Brunswick, Fredericton, NB, Canada, October 1997.
  41. Charlie Obimbo. Using Clause Trees in Disjunctive Logic Programming. Proceedings of the 10th Annual Atlantic Mathematics and Computing Science Conference, Universite de Moncton, NB, Canada, November 1996.
  42. Charlie Obimbo and Bruce Spencer. Access Clause Trees in Disjunctive Deductive Databases. Proceedings of IJCSLP'96 Conference, Bonn, Germany. September, 1996.
  43. Charlie Obimbo and Bruce Spencer. Disjunctive Deductive Databases. Technical Report, University of New Brunswick. TR96-110, August 1996. Available from: http://www.cs.unb.ca/tech-reports/files/TR96_110.pdf.