Proportional reasoning as a heuristic-based process: Time constraint and dual task considerations E Gillard, W Van Dooren, W Schaeken, L Verschaffel Experimental Psychology 56 (2), 92-99, 2009 | 73 | 2009 |
An efficient blockchain‐based approach to improve the accuracy of intrusion detection systems AA Abubakar, J Liu, E Gilliard Electronics Letters 59 (18), e12888, 2023 | 8 | 2023 |
Blockchain-based poisoning attack prevention in smart farming AA Aliyu, J Liu, E Gilliard Sci. Pract. Cyber Secur. J 7 (2), 38-53, 2023 | 5 | 2023 |
Explicit Congestion Notification-Based Congestion Control Algorithm for High-Performing Data Centers MM Gilliard, Ezekia and Sharif, Kashif and Raza, Arif and Karim 2023 IEEE AFRICON, 1-6, 2023 | 3 | 2023 |
Knowledge graph reasoning for cyber attack detection E Gilliard, J Liu, AA Aliyu IET Communications, 2024 | 1 | 2024 |
Knowledge graph‐guided object detection with semantic distance network E Gilliard, J Liu, AA Aliyu Electronics Letters 59 (24), e13051, 2023 | 1 | 2023 |
Increased Accuracy in Blockchain-Based Intrusion Detection and Prevention System A Aliyu, J Liu, E Gilliard Authorea Preprints, 2023 | 1 | 2023 |
Investigation of Intrusion Detection Systems for IoT DDoS Attack AA Aliyu, J Liu, E Gilliard | 1 | |
Intelligent load balancing in data center software‐defined networks E Gilliard, J Liu, AA Aliyu, D Juan, H Jing, M Wang Transactions on Emerging Telecommunications Technologies 35 (4), e4967, 2024 | | 2024 |
Cybersecurity in Tanzania: Opportunities and Challenges E Kayumbe, E Gilliard | | 2024 |
Tanzania’s Rural Revitalization Journey: Lessons Learned and China’s Role in Transformation E Gilliard Authorea Preprints, 2023 | | 2023 |
Comparative Analysis of Data Center Congestion Control Algorithms E Gilliard | | 2020 |
Zone-IT: A location-based & community oriented mobile application for Mzumbe University, Tanzania D Baelden, A Musabila, L Van Audenhove, T Bizyuk | | 2014 |
Determinants of Intention to Adopt Blockchain Technology in Nigeria AA Aliyu, J Liu, E Gilliard | | |
Blockchain-based Reputation System for Smart Farm Anomaly Detection and Prevention AA Aliyu, J Liu, E Gilliard, W Meng | | |