Moses Garuba

According to our database1, Moses Garuba authored at least 38 papers between 2001 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security.
IEEE Trans. Serv. Comput., 2021

2020
Security through block vault in a blockchain enabled federated cloud framework.
Appl. Netw. Sci., 2020

CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
LightChain: On the Lightweight Blockchain for the Internet-of-Things.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Smart Traffic Management System using Deep Learning for Smart City Applications.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Data Validation and Correction for Resiliency in Mobile Cyber-Physical Systems.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Next-generation cybersecurity through a blockchain-enabled federated cloud framework.
J. Supercomput., 2018

Group-query-as-a-service for secure dynamic spectrum access in geolocation-enabled database-driven opportunistic wireless communications in ROAR framework.
Proceedings of the IEEE INFOCOM 2018, 2018

SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network.
IEEE Trans. Ind. Informatics, 2017

Location-Based Lightweight Security Scheme for Wireless Communications in ROAR Architecture.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A federated cloud computing framework for adaptive cyber defense and distributed computing.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2015
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment.
Proceedings of the 12th International Conference on Information Technology, 2015

Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics.
Proceedings of the 12th International Conference on Information Technology, 2015

2014
Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution Model.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2008
Multicast Using Static Trees.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
Implementation of Artificial Neural Network-Based Tracking Controller for High-Performance Stepper Motor Drives.
IEEE Trans. Ind. Electron., 2007

The Security Threat Posed by Steganographic Content on the Internet.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Research Directions in Quantum Cryptography.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Comparative Analysis of Email Filtering Technologies.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Preventing parameterized vulnerability in Web based applications.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2005
Impact Of External Security Measures On Data Access Implementation With Online Database Management System.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Performance study of a COTS distributed DBMS adapted for multilevel security.
PhD thesis, 2004

The Design and Implementation of the MESSENGER Trajectory Database.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

The Design and Implementation of the Spacecraft Navigation & Ancillary Information Web Service.
Proceedings of the International Conference on Internet Computing, 2004

2003
A Parallel Algorithm for Approximate String Matching.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

PSTORE: Pervasive Storage for Disaster Recovery of Mobile Device Data.
Proceedings of the International Conference on Internet Computing, 2003

2001
A ubiquitous stable storage for mobile computing devices.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001


  Loading...