Research Publications
Reverse Engineering
-
Possible Implementation Flaws in Mobile Applications: A Security Audit of a Bank’s Mobile Application. https://tinyurl.com/yc3fxh3k
-
Unauthorised User Account Access on iRokotv platform. http://dx.doi.org/10.13140/RG.2.2.25486.79681/2
-
Reverse Engineering GhanaPostGPS Mobile Application to Create an Application Programming Interface for Local Developers. http://dx.doi.org/10.13140/RG.2.2.24355.27684/2
-
A Security Analysis of WhatsApp iOS Mobile Application. http://dx.doi.org/10.13140/RG.2.2.30510.33605
Academic Research
-
Awumee, G.S., Agyemang, J.O., Boakye, S.S., Bempong, D. (2024). SmishShield: A Machine Learning-Based Smishing Detection System. In: Woungang, I., Dhurandher, S.K. (eds) The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 185. Springer, Cham. https://doi.org/10.1007/978-3-031-47126-1_14
-
Antwi, R.; Gadze, J.D.; Tchao, E.T.; Sikora, A.; Nunoo-Mensah, H.; Agbemenu, A.S.; Obour Agyekum, K.O.-B.; Agyemang, J.O.; Welte, D.; Keelson, E. A Survey on Network Optimization Techniques for Blockchain Systems. Algorithms 2022, 15, 193. https://doi.org/10.3390/a15060193.
-
Agyemang, J.O., Yu, D., Kponyo, J.J. (2022). Autonomic IoT: Towards Smart System Components with Cognitive IoT. In: Ngatched, T.M.N., Woungang, I. (eds) Pan-African Artificial Intelligence and Smart Systems. PAAISS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 405. Springer, Cham. https://doi.org/10.1007/978-3-030-93314-2_16.
-
A Lightweight Messaging Protocol for Internet of Things Devices. https://www.mdpi.com/2227-7080/10/1/21
-
A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking. https://www.ijcna.org/Manuscripts/IJCNA-2021-O-01.pdf
-
An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers. http://dx.doi.org/10.3390/technologies9010014
-
Design of A Minimal Overhead Control Traffic Topology Discovery and Data Forwarding Protocol for Software-Defined Wireless Sensor Networks. https://www.ijcnis.org/index.php/ijcnis/article/view/4803/429
-
Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach. https://www.ijcnis.org/index.php/ijcnis/article/view/4735/416
-
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices. http://dx.doi.org/10.1016/j.iot.2020.100319
-
Dynamic Bandwidth Utilization in Software - Defined Campus Based Networks: A Case Study of the Kwame Nkrumah University of Science and Technology. http://dx.doi.org/10.17148/IJARCCE.2020.9617
-
Lightweight Rogue Access Point Detection Algorithm for WiFi-Enabled Internet of Things(IoT) Devices. http://dx.doi.org/10.1016/j.iot.2020.100200
-
An Algorithm to Determine the Extent of an Epidemic Spread: A NetLogo Modeling Approach. http://dx.doi.org/10.11648/j.eas.20190404.11
-
An Intelligent Irrigation System for Rural Agriculture. http://dx.doi.org/10.11648/j.ijaas.20190503.13
-
An Orchestration Framework for IoT Devices Based on Public Key Infrastructure (PKI). http://dx.doi.org/10.5013/IJSSST.a.20.S1.04
-
A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices. http://dx.doi.org/10.12691/iscf-7-1-2
-
Lightweight Man-In-The-Middle (MITM) Detection and Defense Algorithm for WiFi-Enabled Internet of Things (IoT) Gateways. http://www.sciepub.com/ISCF/abstract/10082
-
The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices. http://www.sciepub.com/ISCF/abstract/9936
-
Light Fidelity(LiFi) as an Alternative Data Transmission Medium in VANET. http://dx.doi.org/10.1109/EMS.2017.44