Smart-bot technology: Conversational agents role in maternal healthcare support K Mugoye, H Okoyo, S Mcoyowo 2019 IST-Africa Week Conference (IST-Africa), 1-7, 2019 | 24 | 2019 |
A Remote Access Security Model based on Vulnerability Management S Ndichu, S McOyowo, H Okoyo, C Wekesa Modern Education & Computer science Press, 2020 | 23 | 2020 |
Driver behaviour profiling using dynamic Bayesian network JI Obuhuma, HO Okoyo, SO McOyowo Modern Education and Computer Science, 2018 | 14 | 2018 |
Real-time driver advisory model: Intelligent transportation systems J Obuhuma, H Okoyo, S Mcoyowo 2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018 | 12 | 2018 |
A domains approach to remote access logical vulnerabilities classification S Ndichu, S McOyowo, H Okoyo, C Wekesa MECS: http://www. mecspress. org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5. pdf., 2019 | 7 | 2019 |
A software agent for vehicle driver modeling JI Obuhuma, HO Okoyo, SO McOyowo 2019 IEEE AFRICON, 1-8, 2019 | 4 | 2019 |
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling JI Obuhuma, HO Okoyo, SO McOyowo Int. J. Inf. Technol. Comput. Sci, 2019 | 3 | 2019 |
Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques MJ Mbogholi, HO Okoyo, OSJ McOyowo IJCSMC, 2018 | 3 | 2018 |
Addressing Node Failures Using Node Management & Cluster Management Techniques in Cloud Computing MJ Mbogholi, HO Okoyo, OSJ McOyowo IJCSMC, 2018 | 2 | 2018 |
MAS architectural model for dialog systems with advancing conversations K Mugoye, H Okoyo, S McOyowo International Journal of Scientific Research, 2018 | 2 | 2018 |
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods S Ndichu, S McOyowo, H Okoyo, C Wekesa International Journal of Computer Network and Information Security 15 (2), 48-61, 2023 | 1 | 2023 |
Techniques to Control Memory Hogging by Web Browsers: An in-Depth Review H Kamau, S McOyowo, H Okoyo International Journal of Computer Applications Technology and Research, 185-192, 2018 | 1 | 2018 |
Towards Clean Information and Communication Technology Campaign in Public Universities in Kenya EO Obare, HO Okoyo, M Oginda, CM Ratemo | 1 | 2015 |
A Review of Availability Mechanisms in Dynamic Cloud Computing Environments MJ Msagha, HO Okoyo, OSJ McOyowo IJERT, 2015 | 1 | 2015 |
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructures MJ MBOGHOLI, HO OKOYO, SJO McOYOWO 2020 IST-Africa Conference (IST-Africa), 1-12, 2020 | | 2020 |
Towards Logically Progressive Dialog for Future TODS to Serve in Complex Domains K Mugoye, HO Okoyo, SO Mc Oyowo International Journal of Scientific Research in Computer Science …, 2019 | | 2019 |
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure JI Obuhuma, HO Okoyo, SO McOyowo 2019 IEEE AFRICON, 2019 | | 2019 |
A Synaptic Logic Neuron Model HO Okoyo PQDT-Global, 1998 | | 1998 |
External Factors In Evaluating The Implementation of Green ICT In Universities In Kenya. EO Obare, HO Okoyo, DR Moses Oginda, M Cyprian | | |