Komminist Weldemariam

According to our database1, Komminist Weldemariam authored at least 57 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Extracting information from newspaper archives in Africa.
IBM Journal of Research and Development, 2017

Modeling user behavior data in systems of engagement.
Future Generation Comp. Syst., 2017

Studying engagement and performance with learning technology in an African classroom.
Proceedings of the Seventh International Learning Analytics & Knowledge Conference, 2017

Towards Blockchain-enabled School Information Hub.
Proceedings of the Ninth International Conference on Information and Communication Technologies and Development, 2017

Roaming Nairobi Roads: Instrumenting Roads under Resource Constraints.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Deploying Large Scale School Census Hub: An Experience Report.
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society Track, 2017

2016
Towards cooperative content downloading for resource-constrained mobile devices.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

2015
An Empirical Evaluation of Web-Based Fingerprinting.
IEEE Software, 2015

Seamless blended learning using the Cognitive Learning Companion: A systemic view.
IBM Journal of Research and Development, 2015

Towards Capturing Learners Sentiment and Context.
Proceedings of the Second ACM Conference on Learning @ Scale, 2015

Capturing Learner's Activity Events from a Mobile Learning System Using Adaptive Event Framework.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Low-power Low-cost Wireless Sensors for Real-time Plant Stress Detection.
Proceedings of the 2015 Annual Symposium on Computing for Development, 2015

FPGuard: Detection and Prevention of Browser Fingerprinting.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Effective detection of vulnerable and malicious browser extensions.
Computers & Security, 2014

FRanC: A Ranking Framework for the Prioritization of Software Maintenance.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Dynamic Analysis of Web Objects.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Rethinking agribusiness models in Africa.
Proceedings of the Symposium on Applied Computing, 2014

Traffic 411: a traffic congestion routing and awareness platform for Nairobi.
Proceedings of the Symposium on Applied Computing, 2014

Monitoring water scarcity risk in Africa.
Proceedings of the Symposium on Applied Computing, 2014

Some Issues in Modeling User Behavior Data in Systems of Engagement.
Proceedings of the Model and Data Engineering - 4th International Conference, 2014

On evaluating and securing firefox for Android browser extensions.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

Twende-twende: a mobile application for traffic congestion awareness and routing.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

From Needs to Services: Delivering Personalized Water Assurance Services in Urban Africa.
Proceedings of the Conceptual Modeling - 33rd International Conference, 2014

TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

OSDC: adapting ODC for developing more secure software.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards a ranking framework for software components.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Protecting Web Browser Extensions from JavaScript Injection Attacks.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Leveraging Raspberry Pi for interactive education.
Proceedings of the Annual Symposium on Computing for Development, 2013

EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages.
Proceedings of the Security and Privacy in Communication Networks, 2012

On the use of goal-oriented methodology for designing agriculture services in developing countries.
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, 2012

Designing distributed agricultural information services for developing countries.
Proceedings of the ACM Annual Symposium on Computing for Development, 2012

Towards an Open Standard Vote Verification Framework in Electronic Voting Systems.
Proceedings of the Seventh International Conference on Availability, 2012

Understanding the Development Trends of Electronic Voting Systems.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Procedural security analysis: A methodological approach.
Journal of Systems and Software, 2011

Formal analysis of an electronic voting system: An experience report.
Journal of Systems and Software, 2011

Vote verification through open standard: A roadmap.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

Early Detection of Security Misconfiguration Vulnerabilities in Web Applications.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Using Formal Methods for Building more Reliable and Secure e-voting Systems.
PhD thesis, 2010

Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework.
Proceedings of the Fourth International Conference on Digital Society, 2010

ICT for Good: Opportunities, Challenges and the Way Forward.
Proceedings of the Fourth International Conference on Digital Society, 2010

Context Information Refinement for Pervasive Medical Systems.
Proceedings of the Fourth International Conference on Digital Society, 2010

A Survey: Electronic Voting Development and Trends.
Proceedings of the Electronic Voting 2010, 2010

Host-based anomaly detection for pervasive medical systems.
Proceedings of the CRiSIS 2010, 2010

Formal Specification and Analysis of an E-voting System.
Proceedings of the ARES 2010, 2010

2009
Development, formal verification, and evaluation of an E-voting system with VVPAT.
IEEE Trans. Information Forensics and Security, 2009

Managing Requirements for E-Voting Systems: Issues and Approaches.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

Navigational Web-Interfaces from Formal Tropos Specification.
Proceedings of the Engineering Societies in the Agents World X, 2009

Experiments and data analysis of electronic voting system.
Proceedings of the CRiSIS 2009, 2009

Formal analysis of attacks for e-voting system.
Proceedings of the CRiSIS 2009, 2009

Supporting Public Administration with an Integrated BPR Environment.
Proceedings of the E-Infrastructures and E-Services on Developing Countries, 2009

2008
Modeling and Analysis of Procedural Security in (e)Voting: The Trentino's Approach and Experiences.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

A Methodology for Assessing Procedural Security: A Case Study in E-Voting.
Proceedings of the 3rd International Conference, 2008

Formal procedural security modeling and analysis.
Proceedings of the CRiSIS '08, 2008

2007
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach.
Proceedings of the E-Voting and Identity, First International Conference, 2007


  Loading...