Smart-bot technology: Conversational agents role in maternal healthcare support K Mugoye, H Okoyo, S Mcoyowo 2019 IST-Africa Week Conference (IST-Africa), 1-7, 2019 | 24 | 2019 |
A Remote Access Security Model based on Vulnerability Management S Ndichu, S McOyowo, H Okoyo, C Wekesa International Journal of Information Technology and Computer Science 12 (5 …, 2020 | 23 | 2020 |
Driver Behaviour Profiling Using Dynamic Bayesian Network JI Obuhuma, HO Okoyo, SO McOyowo MECSJ. Mod. Educ. Comput. Sci 7, 50–59, 2018 | 14 | 2018 |
Real-time Driver Advisory Model: Intelligent Transportation Systems JI Obuhuma, HO Okoyo, SO McOyowo in IST-Africa 2018 Conference Proceedings, IEEE Xplore, 2018 | 12 | 2018 |
A Domains Approach to Remote Access Logical Vulnerabilities Classification S Ndichu, S McOyowo, H Okoyo, C Wekesa MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf …, 2019 | 7 | 2019 |
A Software Agent for Vehicle Driver Modeling JI Obuhuma, HO Okoyo, SO McOyowo 2019 IEEE AFRICON, 1-8, 2019 | 4 | 2019 |
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling JI Obuhuma, HO Okoyo, SO McOyowo Int. J. Inf. Technol. Comput. Sci, 2019 | 3 | 2019 |
Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques MJ Mbogholi, HO Okoyo, OSJ McOyowo IJCSMC, 2018 | 3 | 2018 |
A Review of Security Vulnerabilities, Controls and Models in Networked Environments SW Ndichu, OSJ McOyowo, C Wekesa IJLRET 2, 6 - 14, 2016 | 3 | 2016 |
MAS architectural model for dialog systems with advancing conversations K Mugoye, H Okoyo, S McOyowo International Journal of Scientific Research, 2018 | 2 | 2018 |
Addressing Node Failures Using Node Management & Cluster Management Techniques in Cloud Computing MJ Mbogholi, HO Okoyo, OSJ McOyowo International Journal of Computer Science and Mobile Computing 7 (4), 27-41, 2018 | 2 | 2018 |
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods S Ndichu, S McOyowo, H Okoyo, C Wekesa International Journal of Computer Network and Information Security 15 (2), 48-61, 2023 | 1 | 2023 |
Techniques to Control Memory Hogging by Web Browsers: An in-Depth Review H Kamau, S McOyowo, H Okoyo International Journal of Computer Applications Technology and Research, 185-192, 2018 | 1 | 2018 |
A Review of Availability Mechanisms in Dynamic Cloud Computing Environments MJ Msagha, HO Okoyo, OSJ McOyowo IJERT, 2015 | 1 | 2015 |
Measuring thickness of thin metallic films with the use of laser probing technique VA Komotskii, MV Kuznetsov, SM Okoth Discrete and Continuous Models and Applied Computational Science, 2005 | 1 | 2005 |
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure JM Msagha, HO Okoyo, SJO McOyowo 1st-Africa 2020 Conference Proceedings, IEEE Xplore, 2020 | | 2020 |
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure JM Msagha, HO Okoyo, SJO McOyowo 2019 IEEE AFRICON, 2019 | | 2019 |
A Remote Access Security Model based on Logical Vulnerability Management S Ndichu, S McOyowo, H Okoyo, C Wekesa International Journal of Information Technology and Computer Science (IJITCS …, 2019 | | 2019 |
Characteristics of Reflection on Surface Acoustic Waves from the Edge of a Substrate Measured Using Laser Beam Probing Technique in conjunction with Stationary Reference Gratings VA Komostkii, SM Okoth Scientific Journal, Series Physics 1 (13), 54-59, 2015 | | 2015 |
Technique and results of measuring surface-acoustic-wave reflection coefficients with the use of laser sounding VA Komotskii, SM Okoth, YM Sokolov Journal of Communications Technology and Electronics 52 (8), 932-937, 2007 | | 2007 |