default search action
Moses Garuba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Danda B. Rawat, Ronald Doku, Moses Garuba:
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security. IEEE Trans. Serv. Comput. 14(6): 2055-2072 (2021) - 2020
- [j4]Olumide Malomo, Danda B. Rawat, Moses Garuba:
Security through block vault in a blockchain enabled federated cloud framework. Appl. Netw. Sci. 5(1): 16 (2020) - [c32]Ronald Doku, Danda B. Rawat, Moses Garuba, Laurent Njilla:
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things. CCNC 2020: 1-6 - [c31]Eric Muhati, Danda B. Rawat, Moses Garuba, Laurent Njilla:
CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks. CCNC 2020: 1-4
2010 – 2019
- 2019
- [c30]Yasmeen Mussard-Afcari, Danda B. Rawat, Moses Garuba:
Data Validation and Correction for Resiliency in Mobile Cyber-Physical Systems. CCNC 2019: 1-4 - [c29]Guy M. Lingani, Danda B. Rawat, Moses Garuba:
Smart Traffic Management System using Deep Learning for Smart City Applications. CCWC 2019: 101-106 - [c28]Naveen Naik Sapavath, Dema Saad Alorini, Danda B. Rawat, Moses Garuba:
Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks. ICNC 2019: 131-135 - [c27]Ronald Doku, Danda B. Rawat, Moses Garuba, Laurent Njilla:
LightChain: On the Lightweight Blockchain for the Internet-of-Things. SMARTCOMP 2019: 444-448 - 2018
- [j3]Olumide Malomo, Danda B. Rawat, Moses Garuba:
Next-generation cybersecurity through a blockchain-enabled federated cloud framework. J. Supercomput. 74(10): 5099-5126 (2018) - [c26]Abdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Laurent Njilla:
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications. CNS 2018: 1-2 - [c25]Geremew Begna, Danda B. Rawat, Moses Garuba, Laurent Njilla:
SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework. CNS 2018: 1-2 - [c24]Abdulhamid Adebayo, Danda B. Rawat, Jiang Li, Moses Garuba:
Group-query-as-a-service for secure dynamic spectrum access in geolocation-enabled database-driven opportunistic wireless communications in ROAR framework. INFOCOM Workshops 2018: 842-847 - 2017
- [j2]Md. Salik Parwez, Danda B. Rawat, Moses Garuba:
Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network. IEEE Trans. Ind. Informatics 13(4): 2058-2065 (2017) - [c23]Olumide Malomo, Danda B. Rawat, Moses Garuba:
A federated cloud computing framework for adaptive cyber defense and distributed computing. INFOCOM Workshops 2017: 1-6 - [c22]Sean Grant, Abdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Rajni Goel:
Location-Based Lightweight Security Scheme for Wireless Communications in ROAR Architecture. SmartCloud 2017: 155-160 - 2015
- [c21]Anteneh Girma, Moses Garuba, Jiang Li:
Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics. ITNG 2015: 206-211 - [c20]Anteneh Girma, Moses Garuba, Jiang Li, Chunmei Liu:
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. ITNG 2015: 212-217 - 2014
- [c19]Anteneh Girma, Moses Garuba, Rojini Goel:
Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution Model. ITNG 2014: 307-312
2000 – 2009
- 2008
- [c18]Jiang Li, Moses Garuba:
Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. ITNG 2008: 557-562 - [c17]Moses Garuba, Jiang Li, Zhenqiang Yi:
Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. ITNG 2008: 587-591 - [c16]Moses Garuba, Chunmei Liu, Duane Fraites:
Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. ITNG 2008: 592-598 - [c15]Moses Garuba, Chunmei Liu, Alicia Nicki Washington:
A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. ITNG 2008: 628-632 - [c14]Jiang Li, Moses Garuba, Legand L. Burge III:
Multicast Using Static Trees. ITNG 2008: 1046-1052 - 2007
- [j1]Ahmed Rubaai, Marcel J. Castro-Sitiriche, Moses Garuba, Legand L. Burge III:
Implementation of Artificial Neural Network-Based Tracking Controller for High-Performance Stepper Motor Drives. IEEE Trans. Ind. Electron. 54(1): 218-227 (2007) - [c13]Rajni Goel, Moses Garuba, Anteneh Girma:
Research Directions in Quantum Cryptography. ITNG 2007: 779-784 - [c12]Moses Garuba, Jiang Li, Legand L. Burge III:
Comparative Analysis of Email Filtering Technologies. ITNG 2007: 785-789 - [c11]Moses Garuba, Jiang Li:
Preventing parameterized vulnerability in Web based applications. ITNG 2007: 790-793 - [c10]Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen:
The Security Threat Posed by Steganographic Content on the Internet. ITNG 2007: 794-798 - 2005
- [c9]Moses Garuba, Anteneh Girma:
Impact Of External Security Measures On Data Access Implementation With Online Database Management System. ITCC (1) 2005: 243-248 - 2004
- [b1]Moses Ohene Garuba:
Performance study of a COTS distributed DBMS adapted for multilevel security. Royal Holloway, University of London, UK, 2004 - [c8]Joseph Gill, Legand L. Burge III, Moses Garuba:
The Design and Implementation of the Spacecraft Navigation & Ancillary Information Web Service. International Conference on Internet Computing 2004: 988-992 - [c7]Moses Garuba, Ronald Langrin, Legand L. Burge III:
A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's. ITCC (1) 2004: 551-556 - [c6]Joseph Gill, Legand L. Burge III, Moses Garuba:
The Design and Implementation of the MESSENGER Trajectory Database. ITCC (1) 2004: 557-561 - [c5]Moses Garuba, Edward Appiah, Legand L. Burge III:
Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. ITCC (1) 2004: 566- - [c4]Legand L. Burge III, Moses Garuba, Charita Brent:
Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology. ITCC (1) 2004: 723-728 - 2003
- [c3]Legand L. Burge III, Suleiman Baajun, Donald Charity, Moses Garuba:
PSTORE: Pervasive Storage for Disaster Recovery of Mobile Device Data. International Conference on Internet Computing 2003: 838-841 - [c2]Kathleen Kaplan, Legand L. Burge III, Moses Garuba:
A Parallel Algorithm for Approximate String Matching. PDPTA 2003: 1844-1848 - 2001
- [c1]Legand L. Burge III, Suleiman Baajun, Moses Garuba:
A ubiquitous stable storage for mobile computing devices. SAC 2001: 401-404
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint