关注
Paul Danquah
Paul Danquah
IT Professional
在 itcouncil.net 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond
P Danquah, OB Longe
African Journal of Computing & ICTs 4 (2), 37-48, 2011
342011
Cyber deception and theft: An ethnographic study on cyber criminality from a Ghanaian perspective
P Danquah, OB Longe
Journal of Information Technology Impact 11 (3), 169-182, 2011
342011
Action speaks louder than words-understanding cyber criminal behavior using criminological theories
F Wada, O Longe, P Danquah
The Journal of Internet Banking and Commerce 17 (1), 1-12, 2012
322012
Security operations center: a framework for automated triage, containment and escalation
P Danquah
Journal of Information Security 11 (4), 225-240, 2020
162020
Public key infrastructure: an enhanced validation framework
P Danquah, H Kwabena-Adade
Journal of Information Security 11 (4), 241-260, 2020
122020
Predicting cyber-attack using cyber situational awareness: The case of independent power producers (IPPs)
HM Akwetey, P Danquah
arXiv preprint arXiv:2202.01778, 2022
102022
A maximum entropy classification scheme for phishing detection using parsimonious features
EO Asani, A Omotosho, PA Danquah, JA Ayoola, PO Ayegba, OB Longe
TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (5 …, 2021
92021
Deindividuation, Anonymity and Unethical Behavior in Cyber Space – Explorations in the Valley of Digital Temptations
OLDUE Paul Danquah
COMPUTING AND INFORMATION SYSTEMS JOURNAL 16 (1), 46-55, 2012
8*2012
A novel cryptographic key technique
QADP Kester
Adaptive Science & Technology (ICAST), 2012 IEEE 4th International …, 2012
72012
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective
AH Matey, P Danquah, G Asampana
International Journal of Network Security & Its Applications 13 (4), 41-58, 2021
52021
An experimental assessment of LiFi data communication
V Gordon, P Danquah
Ghana Journal of Science 61 (1), 73-87, 2020
52020
Critical infrastructure cybersecurity challenges: Iot in perspective
HM Akwetey, P Danquah, I Asampana
arXiv preprint arXiv:2202.12970, 2022
42022
Towards a theory for explaining socially-engineered cyber deception and theft
P Danquah, OB Longe, JD Lartey, PE Tobbin
Modern Theories and Practices for Cyber Ethics and Security Compliance, 44-58, 2020
42020
Just another Harmless Click of the Mouse? An Empirical Evidence of Deviant Cyber Space Behaviour Using an Online Trap
P Danquah, OB Longe, F Totimeh
African Journal of Computing and ICT 5 (3), 49-56, 2012
32012
INFORMATION SECURITY PRACTICES AND IT DISASTER RECOVERY READINESS: AN ASSESSMENT OF GHANAIAN GOVERNMENT MINISTRIES.
P Danquah, S Bekoe, F Prikutse
Information Technologist 16 (2), 2019
22019
Enhanced Security Assessment Method for USSD Based Mobile Applications
P Danquah, QA Kester
2019 International Conference on Computer, Data Science and Applications …, 2019
22019
Beyond E-Mail Headers: An Ethnography Based Model for Counteracting Socially Engineered Cyber Deception
P Danquah, OD Ogunsanwo, OB Longe
African Journal of Computing & ICT 6 (5), 9-26, 2013
22013
A Critical Assessment of Information Technology Disaster Recovery Strategies in Ghanaian Banks
ASBAC Danquah P.
Pentvars Journal 7 (No. 1,2 &3), 58-75, 2013
22013
An empirical assessment of information security best practices and information technology disaster recovery readiness in Ghanaian micro-finance sector
P Danquah, S Bekoe, V Gordon
International Journal of Business Continuity and Risk Management 12 (1), 42-61, 2022
12022
A simulated comparison of performance beyond inherent metrics for Open Shortest Path First (OSPF) and Exterior Gateway Routing Protocol (EIGRP)
P Danquah, V Gordon, B Peh
1
系统目前无法执行此操作,请稍后再试。
文章 1–20