An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond P Danquah, OB Longe African Journal of Computing & ICTs 4 (2), 37-48, 2011 | 34 | 2011 |
Cyber deception and theft: An ethnographic study on cyber criminality from a Ghanaian perspective P Danquah, OB Longe Journal of Information Technology Impact 11 (3), 169-182, 2011 | 34 | 2011 |
Action speaks louder than words-understanding cyber criminal behavior using criminological theories F Wada, O Longe, P Danquah The Journal of Internet Banking and Commerce 17 (1), 1-12, 2012 | 32 | 2012 |
Security operations center: a framework for automated triage, containment and escalation P Danquah Journal of Information Security 11 (4), 225-240, 2020 | 16 | 2020 |
Public key infrastructure: an enhanced validation framework P Danquah, H Kwabena-Adade Journal of Information Security 11 (4), 241-260, 2020 | 12 | 2020 |
Predicting cyber-attack using cyber situational awareness: The case of independent power producers (IPPs) HM Akwetey, P Danquah arXiv preprint arXiv:2202.01778, 2022 | 10 | 2022 |
A maximum entropy classification scheme for phishing detection using parsimonious features EO Asani, A Omotosho, PA Danquah, JA Ayoola, PO Ayegba, OB Longe TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (5 …, 2021 | 9 | 2021 |
Deindividuation, Anonymity and Unethical Behavior in Cyber Space – Explorations in the Valley of Digital Temptations OLDUE Paul Danquah COMPUTING AND INFORMATION SYSTEMS JOURNAL 16 (1), 46-55, 2012 | 8* | 2012 |
A novel cryptographic key technique QADP Kester Adaptive Science & Technology (ICAST), 2012 IEEE 4th International …, 2012 | 7 | 2012 |
Critical Infrastructure Cybersecurity Challenges: IoT in Perspective AH Matey, P Danquah, G Asampana International Journal of Network Security & Its Applications 13 (4), 41-58, 2021 | 5 | 2021 |
An experimental assessment of LiFi data communication V Gordon, P Danquah Ghana Journal of Science 61 (1), 73-87, 2020 | 5 | 2020 |
Critical infrastructure cybersecurity challenges: Iot in perspective HM Akwetey, P Danquah, I Asampana arXiv preprint arXiv:2202.12970, 2022 | 4 | 2022 |
Towards a theory for explaining socially-engineered cyber deception and theft P Danquah, OB Longe, JD Lartey, PE Tobbin Modern Theories and Practices for Cyber Ethics and Security Compliance, 44-58, 2020 | 4 | 2020 |
Just another Harmless Click of the Mouse? An Empirical Evidence of Deviant Cyber Space Behaviour Using an Online Trap P Danquah, OB Longe, F Totimeh African Journal of Computing and ICT 5 (3), 49-56, 2012 | 3 | 2012 |
INFORMATION SECURITY PRACTICES AND IT DISASTER RECOVERY READINESS: AN ASSESSMENT OF GHANAIAN GOVERNMENT MINISTRIES. P Danquah, S Bekoe, F Prikutse Information Technologist 16 (2), 2019 | 2 | 2019 |
Enhanced Security Assessment Method for USSD Based Mobile Applications P Danquah, QA Kester 2019 International Conference on Computer, Data Science and Applications …, 2019 | 2 | 2019 |
Beyond E-Mail Headers: An Ethnography Based Model for Counteracting Socially Engineered Cyber Deception P Danquah, OD Ogunsanwo, OB Longe African Journal of Computing & ICT 6 (5), 9-26, 2013 | 2 | 2013 |
A Critical Assessment of Information Technology Disaster Recovery Strategies in Ghanaian Banks ASBAC Danquah P. Pentvars Journal 7 (No. 1,2 &3), 58-75, 2013 | 2 | 2013 |
An empirical assessment of information security best practices and information technology disaster recovery readiness in Ghanaian micro-finance sector P Danquah, S Bekoe, V Gordon International Journal of Business Continuity and Risk Management 12 (1), 42-61, 2022 | 1 | 2022 |
A simulated comparison of performance beyond inherent metrics for Open Shortest Path First (OSPF) and Exterior Gateway Routing Protocol (EIGRP) P Danquah, V Gordon, B Peh | 1 | |