Urmăriți
Justice Owusu Agyemang
Justice Owusu Agyemang
Cybersecurity Researcher
Adresă de e-mail confirmată pe sperixlabs.org - Pagina de pornire
Titlu
Citat de
Citat de
Anul
An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers
JD Gadze, AA Bamfo-Asante, JO Agyemang, H Nunoo-Mensah, ...
Technologies 9 (1), 14, 2021
712021
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices
JJ Kponyo, JO Agyemang, GS Klogo, JO Boateng
Internet of Things 12, 100319, 2020
262020
A survey on network optimization techniques for blockchain systems
R Antwi, JD Gadze, ET Tchao, A Sikora, H Nunoo-Mensah, AS Agbemenu, ...
Algorithms 15 (6), 193, 2022
182022
Lightweight rogue access point detection algorithm for WiFi-enabled Internet of Things (IoT) devices
JO Agyemang, JJ Kponyo, GS Klogo, JO Boateng
Internet of Things 11, 100200, 2020
152020
Design of a minimal overhead control traffic topology discovery and data forwarding protocol for software-defined wireless sensor networks
SA Asakipaam, JJ Kponyo, JO Agyemang, F Appiah-Twum
International Journal of Communication Networks and Information Security 12 …, 2020
142020
Light fidelity (LiFi) as an alternative data transmission medium in VANET
JO Agyemang, JJ Kponyo, J Mouzna
2017 European Modelling Symposium (EMS), 213-217, 2017
132017
Lightweight man-in-the-middle (MITM) detection and defense algorithm for WiFi-enabled Internet of Things (IoT) gateways
JO Agyemang, JJ Kponyo, I Acquah
Inf. Secur. Comput. Fraud 7 (1), 1-6, 2019
112019
An intelligent irrigation system for rural agriculture
JJ Kponyo, KAB Opare, AA Rahman, JO Agyemang
International Journal of Applied Agricultural Sciences 5 (3), 75-81, 2019
92019
Detecting end-point (EP) man-in-the-middle (MITM) attack based on ARP analysis: A machine learning approach
JJ Kponyo, JO Agyemang, GS Klogo
International Journal of Communication Networks and Information Security 12 …, 2020
82020
A lightweight messaging protocol for internet of things devices
JO Agyemang, JJ Kponyo, JD Gadze, H Nunoo-Mensah, D Yu
Technologies 10 (1), 21, 2022
72022
Autonomic IoT: Towards Smart System Components with Cognitive IoT
JO Agyemang, D Yu, JJ Kponyo
Pan-African Artificial Intelligence and Smart Systems Conference, 248-265, 2021
42021
A lightweight rogue access point detection algorithm for embedded internet of things (IOT) devices
JO Agyemang, JJ Kponyo, GS Klogo
Information Security and Computer Fraud 7 (1), 7-12, 2019
42019
Lightweight rogue access point detection algorithm for WiFi-enabled internet of things (IoT) devices. Internet of Things, 11: 100200
JO Agyemang, JJ Kponyo, GS Klogo, JO Boateng
22020
SmishShield: A Machine Learning-Based Smishing Detection System
GS Awumee, JO Agyemang, SS Boakye, D Bempong
International Conference on Wireless Intelligent and Distributed Environment …, 2023
12023
A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking
SA Asakipaam, JJ Kponyo, JO Agyemang, FE Appiah-Twum
Int. J. Comput. Netw. Appl.(IJCNA) 8 (1), 1-10, 2021
12021
Dynamic Bandwidth Utilization in Software-Defined Campus Based Networks: A Case Study of the Kwame Nkrumah University of Science and Technology
JD Gadze, KA Obeng, J Owusu-Agyeman
IJARCCE 9 (7), 94-109, 2020
12020
An Orchestration Framework for IoT Devices based on Public Key Infrastructure (PKI)
JO Agyemang, JJ Kponyo
International Journal of Simulation--Systems, Science & Technology 20, 2019
12019
TinyML Implementation on Microcontrollers: The Case of Maize Leaf Disease Identification
FA Wulnye, EAE Arthur, DAN Gookyi, DKP Asiedu, M Wilson, ...
2024 Conference on Information Communications Technology and Society (ICTAS …, 2024
2024
Design of A Minimal Control Traffic Overhead Topology Discovery and Data Forwarding Protocol for SDWSNS
S Asakipaam, J Agyemang, F Appiah-Twum, J Kponyo
Authorea Preprints, 2020
2020
The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices
JO Agyemang, JJ Kponyo, GS Klogo
Information Security and Computer Fraud 6 (1), 8-18, 2018
2018
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20