The SCEAS System
Navigation Menu

Search the dblp DataBase


Moses Garuba: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Legand L. Burge III, Suleiman Baajun, Donald Charity, Moses Garuba
    PSTORE: Pervasive Storage for Disaster Recovery of Mobile Device Data. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:838-841 [Conf]
  2. Joseph Gill, Legand L. Burge III, Moses Garuba
    The Design and Implementation of the Spacecraft Navigation & Ancillary Information Web Service. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2004, pp:988-992 [Conf]
  3. Legand L. Burge III, Moses Garuba, Charita Brent
    Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:723-728 [Conf]
  4. Moses Garuba, Edward Appiah, Legand L. Burge III
    Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:566-0 [Conf]
  5. Moses Garuba, Anteneh Girma
    Impact Of External Security Measures On Data Access Implementation With Online Database Management System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:243-248 [Conf]
  6. Moses Garuba, Ronald Langrin, Legand L. Burge III
    A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:551-556 [Conf]
  7. Joseph Gill, Legand L. Burge III, Moses Garuba
    The Design and Implementation of the MESSENGER Trajectory Database. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:557-561 [Conf]
  8. Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen
    The Security Threat Posed by Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:794-798 [Conf]
  9. Rajni Goel, Moses Garuba, Anteneh Girma
    Research Directions in Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:779-784 [Conf]
  10. Moses Garuba, Jiang Li
    Preventing parameterized vulnerability in Web based applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:790-793 [Conf]
  11. Moses Garuba, Jiang Li, Legand L. Burge III
    Comparative Analysis of Email Filtering Technologies. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:785-789 [Conf]
  12. Kathleen Kaplan, Legand L. Burge III, Moses Garuba
    A Parallel Algorithm for Approximate String Matching. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:1844-1848 [Conf]
  13. Legand L. Burge III, Suleiman Baajun, Moses Garuba
    A ubiquitous stable storage for mobile computing devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:401-404 [Conf]

  14. Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. [Citation Graph (, )][DBLP]

  15. Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  16. A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. [Citation Graph (, )][DBLP]

  17. Multicast Using Static Trees. [Citation Graph (, )][DBLP]

  18. Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002