Follow
Justice Owusu Agyemang
Justice Owusu Agyemang
Cybersecurity Researcher
Verified email at sperixlabs.org - Homepage
Title
Cited by
Cited by
Year
An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers
JD Gadze, AA Bamfo-Asante, JO Agyemang, H Nunoo-Mensah, ...
Technologies 9 (1), 14, 2021
692021
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices
JJ Kponyo, JO Agyemang, GS Klogo, JO Boateng
Internet of Things 12, 100319, 2020
262020
A survey on network optimization techniques for blockchain systems
R Antwi, JD Gadze, ET Tchao, A Sikora, H Nunoo-Mensah, AS Agbemenu, ...
Algorithms 15 (6), 193, 2022
162022
Lightweight rogue access point detection algorithm for WiFi-enabled Internet of Things (IoT) devices
JO Agyemang, JJ Kponyo, GS Klogo, JO Boateng
Internet of Things 11, 100200, 2020
152020
Design of a minimal overhead control traffic topology discovery and data forwarding protocol for software-defined wireless sensor networks
SA Asakipaam, JJ Kponyo, JO Agyemang, F Appiah-Twum
International Journal of Communication Networks and Information Security 12 …, 2020
142020
Light fidelity (LiFi) as an alternative data transmission medium in VANET
JO Agyemang, JJ Kponyo, J Mouzna
2017 European Modelling Symposium (EMS), 213-217, 2017
132017
Lightweight man-in-the-middle (MITM) detection and defense algorithm for WiFi-enabled Internet of Things (IoT) gateways
JO Agyemang, JJ Kponyo, I Acquah
Inf. Secur. Comput. Fraud 7 (1), 1-6, 2019
112019
An intelligent irrigation system for rural agriculture
JJ Kponyo, KAB Opare, AA Rahman, JO Agyemang
International Journal of Applied Agricultural Sciences 5 (3), 75-81, 2019
92019
Detecting end-point (EP) man-in-the-middle (MITM) attack based on ARP analysis: A machine learning approach
JJ Kponyo, JO Agyemang, GS Klogo
International Journal of Communication Networks and Information Security 12 …, 2020
82020
A lightweight messaging protocol for internet of things devices
JO Agyemang, JJ Kponyo, JD Gadze, H Nunoo-Mensah, D Yu
Technologies 10 (1), 21, 2022
72022
Autonomic IoT: Towards Smart System Components with Cognitive IoT
JO Agyemang, D Yu, JJ Kponyo
Pan-African Artificial Intelligence and Smart Systems Conference, 248-265, 2021
42021
A lightweight rogue access point detection algorithm for embedded internet of things (IOT) devices
JO Agyemang, JJ Kponyo, GS Klogo
Information Security and Computer Fraud 7 (1), 7-12, 2019
42019
Lightweight rogue access point detection algorithm for WiFi-enabled internet of things (IoT) devices. Internet of Things, 11: 100200
JO Agyemang, JJ Kponyo, GS Klogo, JO Boateng
22020
SmishShield: A Machine Learning-Based Smishing Detection System
GS Awumee, JO Agyemang, SS Boakye, D Bempong
International Conference on Wireless Intelligent and Distributed Environment …, 2023
12023
A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking
SA Asakipaam, JJ Kponyo, JO Agyemang, FE Appiah-Twum
Int. J. Comput. Netw. Appl.(IJCNA) 8 (1), 1-10, 2021
12021
Dynamic Bandwidth Utilization in Software-Defined Campus Based Networks: A Case Study of the Kwame Nkrumah University of Science and Technology
JD Gadze, KA Obeng, J Owusu-Agyeman
IJARCCE 9 (7), 94-109, 2020
12020
An Orchestration Framework for IoT Devices based on Public Key Infrastructure (PKI)
JO Agyemang, JJ Kponyo
International Journal of Simulation--Systems, Science & Technology 20, 2019
12019
TinyML Implementation on Microcontrollers: The Case of Maize Leaf Disease Identification
FA Wulnye, EAE Arthur, DAN Gookyi, DKP Asiedu, M Wilson, ...
2024 Conference on Information Communications Technology and Society (ICTAS …, 2024
2024
Design of A Minimal Control Traffic Overhead Topology Discovery and Data Forwarding Protocol for SDWSNS
S Asakipaam, J Agyemang, F Appiah-Twum, J Kponyo
Authorea Preprints, 2020
2020
The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices
JO Agyemang, JJ Kponyo, GS Klogo
Information Security and Computer Fraud 6 (1), 8-18, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20