A novel network security algorithm based on private key encryption A Abusukhon, M Talib Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 40 | 2012 |
Wireless ad-hoc network under black-hole attack S Om, M Talib International Journal of Digital Information and Wireless Communications …, 2011 | 25 | 2011 |
Analyzing the efficiency of Text-to-Image encryption algorithm A Abusukhon, M Talib, MA Nabulsi International Journal of Advanced Computer Science and Applications 3 (11), 2012 | 18 | 2012 |
A novel network security algorithm based on encrypting text into a white-page image ZM Ahmad Abusukhon, M Talib Proceedings of the World Congress on Engineering and Computer Science 1, 2016 | 16 | 2016 |
Role of ICT in reduction of poverty in developing countries: Botswana as an evidence in SADC region TM Mogotlhwane, M Talib, M Mokwena Digital Information and Communication Technology and Its Applications …, 2011 | 11 | 2011 |
Comparison between document-based, term-based and hybrid partitioning A Abusukhon, MP Oakes, M Talib, AM Abdalla 2008 First International Conference on the Applications of Digital …, 2008 | 10 | 2008 |
An investigation into improving the load balance for term-based partitioning A Abusukhon, M Talib, MP Oakes Information Systems and e-Business Technologies: 2nd International United …, 2008 | 10 | 2008 |
Cyber crime detection and protection: third world still to cope-up V Sekgwathe, M Talib International Conference on e-Technologies and Networks for Development, 171-181, 2011 | 9 | 2011 |
Cyber forensics: computer security and incident response V Sekgwathe, M Talib International Journal of New Computer Architectures and Their Applications 2 …, 2012 | 7 | 2012 |
Global failure of ICT due to solar storm: A worst case scenario ahead M Talib, TM Mogotlhwane Procedia Environmental Sciences 8, 371-374, 2011 | 7 | 2011 |
A Framework for Quality of Service in Mobile Ad Hoc Networks. FJ Ogwu, M Talib, GA Aderounmu, A Adetoye Int. Arab J. Inf. Technol. 4 (1), 33-40, 2007 | 7 | 2007 |
Text-to-speech processing using African language as case study EJ Ogwu, M Talib, OA Odejobi Journal of Discrete Mathematical Sciences and Cryptography 9 (2), 365-382, 2006 | 6 | 2006 |
Eradication of poverty with the use of ICT in the third world: Botswana as an example in SADC TM Mogotlhwane, M Talib, M Mokwena | 4 | 2011 |
Improving the quality of service guarantee in an Asynchronous Transfer Mode (ATM) Network GA Aderounmu, FJ Ogwu, M Talib Science Publications, http://www. scipub. org/scipub/c4p. php? j_id= JCS, 2007 | 4 | 2007 |
Analyzing the load balance of term-based partitioning A Abusukhon, M Talib The Science and Information Organization Inc., http://ijacsa. thesai. org/, 2011 | 3 | 2011 |
Reduction of Poverty Using ICT in SADC Region: A case Study TM MOGOTLHWANE, M TALIB, M MOKWENA International Journal of Computing and ICT Research 5 (1), 54-65, 2010 | 3 | 2010 |
An analytical survey of mobile agent for resource management in a network FJ Ogwu, M Talib, GA Aderounmu Journal of Statistics and Management Systems 9 (2), 427-439, 2006 | 3 | 2006 |
E-Crime: an analytical study and possible ways to combat M Talib, V Sekgwathe International Journal of Applied Information Systems 2 (2), 1-8, 2012 | 2 | 2012 |
Using merkle tree to mitigate cooperative black-hole attack in Wireless Mesh Networks S Om, M Talib The Science and Information Organization Inc., www. ijacsa. thesai. org, 2011 | 2 | 2011 |
Improving Load Balance and Query Throughput of Distributed IR Systems A Abusukhon, M Talib International Journal of Computing and ICT Research (IJCIR) 4 (1), 20-29, 2010 | 2 | 2010 |