Onome Blaise Ohwo

Onome Blaise Ohwo
  • Doctor of Philosophy
  • Lecturer at Babcock University

About

27
Publications
22,901
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
92
Citations
Current institution
Babcock University
Current position
  • Lecturer
Additional affiliations
January 2020 - November 2020
WordBin Limited
Position
  • Consultant
Education
January 2023 - April 2024
Babcock University
Field of study
  • Education
January 2020 - December 2023
Babcock University
Field of study
  • Computer science

Publications

Publications (27)
Conference Paper
The rise of the Internet of Things (IoT) devices in smart homes has raised concerns about privacy breaches and unauthorized access to sensitive data. However, traditional access control mechanisms often fail to address these issues that infringes on the privacy of the users of this technology. This study proposes a privacy-preserving access control...
Article
Full-text available
Information Technology (IT) networks have become a cornerstone of business communication, evolving alongside the Internet, which now facilitates the interconnection of independent IT infrastructures. This interconnectedness has increased the risks of information disclosure and privacy violations, presenting ethical challenges for information securi...
Article
Full-text available
The Domain Name System (DNS) is a critical component of the Internet, and its disruption can significantly affect service quality. To enhance security and protect user privacy, encrypted protocols, such as DNS over TLS (DoT), DNS over Quick UDP Internet Connections (DoQ), and DNS over HTTPS (DoH), have been introduced. This study evaluates the perf...
Article
Full-text available
The rapid industrialization and technological advancements of recent decades have significantly improved various facets of human life but have also intensified air pollution through the emission of harmful gases. Accurate detection of these pollutants, including Carbon Monoxide (CO), Ammonia (NH₃), and Sulfur Dioxide (SO₂), is critical for mitigati...
Article
The present study endeavors to enhance DNS over TLS performance via the development of an Adaptive Transport Layer Security Model (ad-TLSM). DNS over TLS, which employs TLS encryption to safeguard communication between clients and DNS recursive resolvers, suffers from performance issues that pose significant challenges. In response to these issues,...
Article
Full-text available
The Domain Name System (DNS) is an essential component of the internet infrastructure. Due to its importance, securing DNS becomes a necessity for current and future networks. Various DNS security architecture have been developed in order to provide security services; such as DNS over HTTPS (DoH), DNS over TLS (DoT), and DNS over QUIC (DoQ). Unfort...
Article
Full-text available
The goal of gamification is the deployment of game mechanics in real-world context for non-gaming scenarios, to drive motivation and performance regarding a given activity. Preceding research, mostly supports the hypothesis fundamental to this aim. Till date, gamification has continued to find its application in various industries and sectors. Amon...
Article
Full-text available
Global warming, pollution and costs of power production are the major environmental and economic issues faced by the planet today. Many research works have been done and are ongoing to reduce the adverse effects that may arise due to these issues. With these issues plaguing much of the planet, the rapid proliferation of the Internet of Things (IoT)...
Article
Full-text available
Cloud computing is a groundbreaking technique that provides a whole lot of facilities such as storage, memory, and CPU as well as facilities such as servers and web service. It allows businesses and individuals to subcontract their computing needs as well as trust a network provider with its data warehousing and processing. The fact remains that cl...
Article
Full-text available
The security architecture of 4G LTE standardized by Third Generation Partnership Project (3GPP) may deceive Mobile Network Operators (MNOs) into a sense that the network is completely free of threats and risks. 4G LTE has known security and privacy vulnerabilities in its specifications. The 3GPP deferred these threats and risks to the MNO. MNOs are...
Article
Full-text available
Edge computing is currently evolving how information and data is being processed, stored and also delivered to millions of devices digitally connected to the cyber-space. The rise of Internet of Things we now have various devices actively communicating and also sharing, delivering information. Edge computing brings computation and data storage clos...
Article
Full-text available
Cloud Computing is a groundbreaking technique which provides lots of facilities such as storage, memory, CPU and facilities like serve and web service. It allows businesses and individuals to subcontract their computing needs and trust a network provider with its data warehousing and processing. The fact still remains that cloud computing is a reso...
Article
Full-text available
In the beginning, computers were merely standalone systems that could repeat basic computations in a fixed number of times. Later, computers were tailored to compute answers to problems. Algorithms understandable by computers were developed and the task of determining which worked better with respect to run-time and complexity was left to the compu...
Article
Full-text available
Digital communications surveillance is a major security concern in the world at large. End-to-End (E2E) encryption in mobile communication applications delivers confidentiality between users, defending messages against snooping. Several widespread communication tools (WhatsApp, Signal, Telegram, iMessage) have implemented end-to-end encryption, as...
Article
Full-text available
Automata Theory, a theoretical branch of computer science, helps "to understand how machines compute functions and solve problems. An automaton is any machine that uses a specific, repeatable process to convert information into different forms. Gamification is an example of an automaton. The goal of gamification is the implementation of game mechan...
Article
Full-text available
In this paper we have focused a variety of Data mining techniques, approaches and applications areas which has been helpful in the important field of data mining Technologies. Organizations are operated from various geographical locations, and such operation may generate large volumes of data. The data is warehoused and used by corporate decision m...
Article
Brute-force attack is unavoidable in any environment where weak passwords are used to secure sensitive information. In accessing resources via the Internet, the most common means of security is the user's identity and a secret passphrase known as a password. Various means have been researched and developed to mitigate or limit brute-force attack. T...
Article
Full-text available
Mobile broadband utilizing Long-Term Evolution (LTE) has advanced the field of data transmission; with networks capable of providing broadband speeds to mobile broadband users. There has been a sporadic increase in the utilization of Long-Term Evolution (LTE) networks, but due to the rapid growth and utilization of network links and network service...
Article
Full-text available
Communication Systems can be Wired or Wireless and the medium used for communication can be Guided or Unguided. In wired technology, communication or transmission of information is done via a medium (also called guided medium) such as co-axial cables, twisted pair cables and optical fiber links; which guides the propagation from one point to anothe...
Article
Full-text available
Game theory is a mathematical model which deals with interactions between various entities by analyzing the strategies and choices. In today's world, Game Theory is being extensively used in fields like computer science, economics, sociology, political science, and so on, due to its versatile nature and applications in numerous conflicts and proble...
Article
Full-text available
With an end goal to move the computing and networking industries from the present manual arrangement to automated solutions that are coordinated with the rest of the infrastructure, there have been a few developing technologies in the past couple of years, among them are cloud computing and network functions virtualization (NFV). "Comprehensively,...
Article
Full-text available
Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications whic...
Article
Full-text available
In telecommunications, Content Delivery Networks (CDN) main objective is to overcome the essential challenges of the Internet. The core principal at the foundation of this technology is the geographical distribution of contents from servers on the network edge closer to the customers, improving the customer's perceived performance while restricting...
Article
Full-text available
The measure of computerized information being created and put away is expanding at a disturbing rate. This information is classified and handled to distil and convey data to clients crossing various businesses for example, finance, online networking, gaming and so forth. This class of workloads is alluded to as throughput computing applications. Mu...
Article
Full-text available
The occurrence of earthquakes in oceanic trenches can pose a tsunami threat to lives and properties in active seismic zones. Therefore, the knowledge of focal depth, magnitude, and time distribution of earthquakes along the trenches is needed to investigate the future occurrence of earthquakes in the zones. The oceanic trenches studied, were locate...

Network

Cited By