George S. Oreku

According to our database1, George S. Oreku authored at least 19 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Applications of Cognitive Intelligence in the Information Retrieval Process and Associated Challenges.
Int. J. Cogn. Informatics Nat. Intell., 2021

2018
Mobile Phone: A Loan Monitoring Tool for Micro Businesses.
Int. J. ICT Res. Afr. Middle East, 2018

2017
Mobile training in micro business: Design science research for frugal innovation.
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017

2016
Mobile Technology in Training Micro Businesses: Users' Requirements and Architectural Design.
Int. J. ICT Res. Afr. Middle East, 2016

2013
A viewpoint of Tanzania e-commerce and implementation barriers.
Comput. Sci. Inf. Syst., 2013

2011
Key complication procedure in data driven ciphers based on controlled substitution-permutation networks.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2009
End User Authentication (EUA) Model and Password for Security.
J. Organ. End User Comput., 2009

State of Tanzania e-readiness and e-commerce: Overview.
Inf. Technol. Dev., 2009

Language based information routing security: policy enforcement.
Int. Arab J. Inf. Technol., 2009

Using Nature to Best Clarify Computer Security and Threats.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Intrusion Detection Based on Data Mining.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
QoS as Means of Providing WSNs Security.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

A load balancing replica placement strategy in Data Grid.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Reliable data aggregation protocol for wireless sensor networks.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

A Two-way Strategy for Replica Placement in Data Grid.
Proceedings of the 2008 International Conference on Grid Computing & Applications, 2008

2007
End user Authentication (EUA).
Proceedings of the WEBIST 2007, 2007

An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos).
Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2007

A Comparative Study of Replica Placement Strategies in Data Grids.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2005
Rethinking E-commerce Security.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005


  Loading...