Research Publications
Reverse Engineering
-
Possible Implementation Flaws in Mobile Applications: A Security Audit of a Bank’s Mobile Application. https://tinyurl.com/yc3fxh3k
-
Unauthorised User Account Access on iRokotv platform. http://dx.doi.org/10.13140/RG.2.2.25486.79681/2
-
Reverse Engineering GhanaPostGPS Mobile Application to Create an Application Programming Interface for Local Developers. http://dx.doi.org/10.13140/RG.2.2.24355.27684/2
-
A Security Analysis of WhatsApp iOS Mobile Application. http://dx.doi.org/10.13140/RG.2.2.30510.33605
Academic Research
-
Kwame Opuni-Boachie Obour Agyekum, Alex Yaw Boakye, Benedict Appati, Jochebed Akoto Opoku, Justice Owusu Agyemang, Gordon Owusu Boateng, James Dzisi Gadze, “Resource Allocation in D2D-Enabled 5G Networks Using Multiagent Reinforcement Learning”, Journal of Computer Networks and Communications, 2024, 2780845, 14 pages, 2024. https://doi.org/10.1155/2024/2780845
-
Dennis Agyemanh Nana Gookyi, Fortunatus Aabangbio Wulnye, Ewura Abena Essanoah Arthur, Roger Kwao Ahiadormey, Justice Owusu Agyemang, Kwame Opuni-Boachie Obour Agyekum, Raymond Gyaang, “TinyML for smart agriculture: Comparative analysis of TinyML platforms and practical deployment for maize leaf disease identification”, Smart Agricultural Technology, Volume 8, 2024, 100490, ISSN 2772-3755, https://doi.org/10.1016/j.atech.2024.100490. (https://www.sciencedirect.com/science/article/pii/S2772375524000959)
-
F. A. Wulnye, E. A. Essanoah Arthur, D. A. Nana Gookyi, D. Kwaku Pobi Asiedu, M. Wilson and J. O. Agyemang, “TinyML Implementation on Microcontrollers: The Case of Maize Leaf Disease Identification,” 2024 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 2024, pp. 180-185, doi: 10.1109/ICTAS59620.2024.10507115.
-
Awumee, G.S., Agyemang, J.O., Boakye, S.S., Bempong, D. (2024). SmishShield: A Machine Learning-Based Smishing Detection System. In: Woungang, I., Dhurandher, S.K. (eds) The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 185. Springer, Cham. https://doi.org/10.1007/978-3-031-47126-1_14
-
Ernest Kwadwo Adomako, Abdul-Rahman Ahmed, Sani Mubarak Ellis, Justice Owusu Agyemang, & Griffith Selorm Klogo. (2023). Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles. International Journal of Communication Networks and Information Security (IJCNIS), 15(2), 101–113. https://doi.org/10.17762/ijcnis.v15i2.6181
-
Antwi, R.; Gadze, J.D.; Tchao, E.T.; Sikora, A.; Nunoo-Mensah, H.; Agbemenu, A.S.; Obour Agyekum, K.O.-B.; Agyemang, J.O.; Welte, D.; Keelson, E. A Survey on Network Optimization Techniques for Blockchain Systems. Algorithms 2022, 15, 193. https://doi.org/10.3390/a15060193.
-
Agyemang, J.O., Yu, D., Kponyo, J.J. (2022). Autonomic IoT: Towards Smart System Components with Cognitive IoT. In: Ngatched, T.M.N., Woungang, I. (eds) Pan-African Artificial Intelligence and Smart Systems. PAAISS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 405. Springer, Cham. https://doi.org/10.1007/978-3-030-93314-2_16.
-
A Lightweight Messaging Protocol for Internet of Things Devices. https://www.mdpi.com/2227-7080/10/1/21
-
A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking. https://www.ijcna.org/Manuscripts/IJCNA-2021-O-01.pdf
-
An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers. http://dx.doi.org/10.3390/technologies9010014
-
Design of A Minimal Overhead Control Traffic Topology Discovery and Data Forwarding Protocol for Software-Defined Wireless Sensor Networks. https://www.ijcnis.org/index.php/ijcnis/article/view/4803/429
-
Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach. https://www.ijcnis.org/index.php/ijcnis/article/view/4735/416
-
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices. http://dx.doi.org/10.1016/j.iot.2020.100319
-
Dynamic Bandwidth Utilization in Software - Defined Campus Based Networks: A Case Study of the Kwame Nkrumah University of Science and Technology. http://dx.doi.org/10.17148/IJARCCE.2020.9617
-
Lightweight Rogue Access Point Detection Algorithm for WiFi-Enabled Internet of Things(IoT) Devices. http://dx.doi.org/10.1016/j.iot.2020.100200
-
An Algorithm to Determine the Extent of an Epidemic Spread: A NetLogo Modeling Approach. http://dx.doi.org/10.11648/j.eas.20190404.11
-
An Intelligent Irrigation System for Rural Agriculture. http://dx.doi.org/10.11648/j.ijaas.20190503.13
-
An Orchestration Framework for IoT Devices Based on Public Key Infrastructure (PKI). http://dx.doi.org/10.5013/IJSSST.a.20.S1.04
-
A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices. http://dx.doi.org/10.12691/iscf-7-1-2
-
Lightweight Man-In-The-Middle (MITM) Detection and Defense Algorithm for WiFi-Enabled Internet of Things (IoT) Gateways. http://www.sciepub.com/ISCF/abstract/10082
-
The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices. http://www.sciepub.com/ISCF/abstract/9936
-
Light Fidelity(LiFi) as an Alternative Data Transmission Medium in VANET. http://dx.doi.org/10.1109/EMS.2017.44