


default search action
15th AFRICOMM 2023: Bobo-Dioulasso, Burkina Faso - Part I
- Abdoulaye Séré, Oumarou Sie, Rashid A. Saeed
:
Towards new e-Infrastructure and e-Services for Developing Countries - 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23-25, 2023, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 587, Springer 2025, ISBN 978-3-031-81569-0
Digital Economy, Digital Transformation, e-Government and e-services
- Cynthia Sthembile Ntshangase, Samuel Lefophane, Tanita Singano, Daniel Shadung, Nthabiseng Mokoena, Sthembile Mthethwa:
Digital Identity Frameworks: A Review. 3-18 - Alex Mwotil
, Benjamin Kanagwa, Aminah Zawedde, Thomas E. Anderson, Engineer Bainomugisha:
Cloud Adoption in Low Resource Settings: A Case Study of Higher Education Institutions in Uganda. 19-38 - Wandile T. Mnynadu, Alfredo Terzoli, Hlabishi Kobo:
A Blueprint for South African Public Schools ICT Infrastructure. 39-52 - Tinashe Magwenzi
, Alfredo Terzoli
, Zelalem Shibeshi
:
Re-thinking the Connectivity for Schools Within the Public Education System in South Africa. 53-67 - Othman O. Khalifa, Hariz Naufal Mohd Daud, Elmustafa Sayed Ali, Mamoon M. Saeed
:
Deep Learning Approaches for Object Detection in Autonomous Driving: Smart Cities Perspective. 68-80
ICT Infrastructures for Critical Environmental Conditions
- Rania Salih Abdalla, Elmustafa Sayed Ali
, Sara A. Mahbub, Rania A. Mokhtar, Zeinab E. Ahmed:
Internet of Energy (IoE): A Comprehensive Review of Design, Principles, and Architectural Frameworks. 83-99 - Désiré Guel, Pegdwindé Justin Kouraogo, Boureima Zerbo
, Modeste Dembele:
Enhancing Power Efficiency in NB-IoT Networks: PAPR Reduction in SC-FDMA. 100-112 - Thomas Djotio Ndié, Alphonse Tabué Kamga, Karl Jonas:
Modelling of a Solar Photovoltaic Power Supply for a Wireless Access Point in a Rural Area. 113-130
Wireless Networks
- Douatia Koné, Niangoran Medard Mené, Aladji Kamagaté:
FSO Transmission Link Performance Analysis for Enhancing Internet Infrastructure in Cote D'ivoire. 133-154 - Amado Illy, Youssou Faye, Tiguiane Yélémou
:
Lightweight Authentication System for Software-Defined Wireless Sensor Networks. 155-162 - Thomas Djotio Ndié, Antoine Junior Tsagmo Denkeng, Karl Jonas, Roblex Nana Tchakoute:
A K-Means Based Approach for Optimal Gateway Deployment in LoRaWAN-SIM. 163-178 - Joshua A. Okuthe
:
Assessing the Impact of Web Caching on Resource Utilization in Low Capacity Networks. 179-193 - Thomas Djotio Ndié, Paulin Melatagia Yonta, Ismaël Samaye, Karl Jonas:
Channel Allocation Based K-Medoids in a Wireless Mesh Network. 194-207
E-health
- Seydou Golo Barro, Aly Abdoulaye Guindo, Thioukany David Thera, Irénée Bamogo, Cheick O. Bakayoko:
Digitization of Patient Records in Maxillofacial and Stomatology Surgery: A Case Study of the Maxillofacial and Stomatology Surgery Unit at Sominé Dolo Hospital in Mopti, Mali. 211-226 - Seydou Golo Barro, Irénée Bamogo, Aly Abdoulaye Guindo:
Design of an Electronic Health Record Module in the Pediatrics Department of the Ouahigouya Regional University Hospital Center. 227-246 - Manegaouindé Roland Tougma
, Boureima Zerbo
, Désiré Guel, Pegdwindé Justin Kouraogo:
Emergency Severity Index (ESI), A More Suitable System for Emergencies in Burkina Faso. 247-255
Cybersecurity and Privacy
- Jabu Mtsweni, Muyowa Mutemwa, Mfundo Glenn Masango, Samson Chishiri, Siwe Moyakhe:
The State of Data Breaches in the African Cyberspace: A Trend Analysis Using Social Media and Research Literature. 259-273 - Kodjo Edem Agbezoutsi
, Pascal Urien, Toundé Mesmin Dandjinou:
Advancing Mobile Money Payments Through Blockchain and Interoperability Protocols. 274-287 - Fatiè Daoud Idriss Siéba, Hamadoun Tall, Amado Illy, Tiguiane Yélémou
:
Blackhole Attack Detection and Countermeasure Solution in RPL. 288-295 - Robert Makila Beni
:
Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts. 296-311 - Koffi Kanga
, Beman Hamidja Kamagaté, Raogo Kabore, Souleymane Oumtanaga:
Proposal of Honeypot-Based Data Mining Methods for the Discovery of Intrusions in Big Data Databases. 312-332 - Thuli Mkhwanazi, Avuya Shibambu, Vhuthu Nefale, Jabu Mtsweni, Jackie Phahlamohlaka, Muyowa Mutemwa, Norman Nelufule
:
Potential Cyber Threats to the National Elections in the Digital Age in Africa. 333-350 - Norman Nelufule
, Boitumelo Nkwe, Daniel Shadung, Kele Masemola, Tanita Singano, Japhtalina Mokoena, Zamo Ngubane, Ntombizodwa Thwala:
Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues. 351-367 - Jabu Mtsweni, Precious Maduma, Vhuthu Nefale, Alex Ramantswana, Mfundo Glenn Masango, Muyowa Mutemwa:
Emerging Phishing Attack Trends: A South African Case Study. 368-382 - Mamoon M. Saeed
, Elmustafa Sayed Ali, Othman O. Khalifa, Rania A. Mokhtar:
5G Network Security: Unraveling Vulnerabilities and Innovating Defense Mechanisms. 383-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.