Follow
Okoth Sylvester J. McOyowo
Title
Cited by
Cited by
Year
Smart-bot technology: Conversational agents role in maternal healthcare support
K Mugoye, H Okoyo, S Mcoyowo
2019 IST-Africa Week Conference (IST-Africa), 1-7, 2019
242019
A Remote Access Security Model based on Vulnerability Management
S Ndichu, S McOyowo, H Okoyo, C Wekesa
International Journal of Information Technology and Computer Science 12 (5 …, 2020
232020
Driver Behaviour Profiling Using Dynamic Bayesian Network
JI Obuhuma, HO Okoyo, SO McOyowo
MECSJ. Mod. Educ. Comput. Sci 7, 50–59, 2018
142018
Real-time Driver Advisory Model: Intelligent Transportation Systems
JI Obuhuma, HO Okoyo, SO McOyowo
in IST-Africa 2018 Conference Proceedings, IEEE Xplore, 2018
122018
A Domains Approach to Remote Access Logical Vulnerabilities Classification
S Ndichu, S McOyowo, H Okoyo, C Wekesa
MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf …, 2019
72019
A Software Agent for Vehicle Driver Modeling
JI Obuhuma, HO Okoyo, SO McOyowo
2019 IEEE AFRICON, 1-8, 2019
42019
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling
JI Obuhuma, HO Okoyo, SO McOyowo
Int. J. Inf. Technol. Comput. Sci, 2019
32019
Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques
MJ Mbogholi, HO Okoyo, OSJ McOyowo
IJCSMC, 2018
32018
A Review of Security Vulnerabilities, Controls and Models in Networked Environments
SW Ndichu, OSJ McOyowo, C Wekesa
IJLRET 2, 6 - 14, 2016
32016
MAS architectural model for dialog systems with advancing conversations
K Mugoye, H Okoyo, S McOyowo
International Journal of Scientific Research, 2018
22018
Addressing Node Failures Using Node Management & Cluster Management Techniques in Cloud Computing
MJ Mbogholi, HO Okoyo, OSJ McOyowo
International Journal of Computer Science and Mobile Computing 7 (4), 27-41, 2018
22018
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
S Ndichu, S McOyowo, H Okoyo, C Wekesa
International Journal of Computer Network and Information Security 15 (2), 48-61, 2023
12023
Techniques to Control Memory Hogging by Web Browsers: An in-Depth Review
H Kamau, S McOyowo, H Okoyo
International Journal of Computer Applications Technology and Research, 185-192, 2018
12018
A Review of Availability Mechanisms in Dynamic Cloud Computing Environments
MJ Msagha, HO Okoyo, OSJ McOyowo
IJERT, 2015
12015
Measuring thickness of thin metallic films with the use of laser probing technique
VA Komotskii, MV Kuznetsov, SM Okoth
Discrete and Continuous Models and Applied Computational Science, 2005
12005
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure
JM Msagha, HO Okoyo, SJO McOyowo
1st-Africa 2020 Conference Proceedings, IEEE Xplore, 2020
2020
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure
JM Msagha, HO Okoyo, SJO McOyowo
2019 IEEE AFRICON, 2019
2019
A Remote Access Security Model based on Logical Vulnerability Management
S Ndichu, S McOyowo, H Okoyo, C Wekesa
International Journal of Information Technology and Computer Science (IJITCS …, 2019
2019
Characteristics of Reflection on Surface Acoustic Waves from the Edge of a Substrate Measured Using Laser Beam Probing Technique in conjunction with Stationary Reference Gratings
VA Komostkii, SM Okoth
Scientific Journal, Series Physics 1 (13), 54-59, 2015
2015
Technique and results of measuring surface-acoustic-wave reflection coefficients with the use of laser sounding
VA Komotskii, SM Okoth, YM Sokolov
Journal of Communications Technology and Electronics 52 (8), 932-937, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–20