A case study on web application security testing with tools and manual testing LS Dukes, X Yuan, F Akowuah 2013 Proceedings of IEEE Southeastcon, 1-6, 2013 | 59 | 2013 |
Real-time adaptive sensor attack detection in autonomous cyber-physical systems F Akowuah, F Kong 2021 IEEE 27th real-time and embedded technology and applications symposium …, 2021 | 27 | 2021 |
Physical invariant based attack detection for autonomous vehicles: Survey, vision, and challenges F Akowuah, F Kong 2021 Fourth International conference on connected and autonomous driving …, 2021 | 20 | 2021 |
Recovery-by-learning: Restoring autonomous cyber-physical systems from sensor attacks F Akowuah, R Prasad, CO Espinoza, F Kong 2021 IEEE 27th International conference on embedded and real-time computing …, 2021 | 13 | 2021 |
A survey of security standards applicable to health information systems F Akowuah, X Yuan, J Xu, H Wang International Journal of Information Security and Privacy (IJISP) 7 (4), 22-36, 2013 | 13 | 2013 |
Protecting Sensitive Data in Android SQLite Databases Using TrustZone F Akowuah, A Ahlawat, W Du Proceedings of the 2018 International Conference on Security & Management …, 2018 | 11 | 2018 |
Testing the security vulnerabilities of openemr 4.1. 1: a case study F Akowuah, J Lake, X Yuan, E Nuakoh, H Yu Journal of Computing Sciences in Colleges 30 (3), 26-35, 2015 | 8 | 2015 |
An overview of laws and standards for health information security and privacy F Akowuah, X Yuan, J Xu, H Wang Proceedings of the International Conference on Security and Management (SAM), 1, 2012 | 6 | 2012 |
XML in health information systems J Brewton, X Yuan, F Akowuah Proceedings of the International Conference on Bioinformatics …, 2012 | 6 | 2012 |
A survey of US laws for health information security & privacy F Akowuah, X Yuan, J Xu, H Wang International Journal of Information Security and Privacy (IJISP) 6 (4), 40-54, 2012 | 3 | 2012 |
Standards and Guides for Implementing Security and Privacy for Health Information Technology FE Akowuah, J Land, X Yuan, L Yang, J Xu, H Wang Security and Privacy Management, Techniques, and Protocols, 214-236, 2018 | 2 | 2018 |
Work in Progress: Emerging From Shadows: Optimal Hidden Actuator Attack to Cyber-Physical Systems MK Miji, M Liu, F Akowuah, F Kong IEEE Real-Time and Embedded Technology and Applications Symposium, 2024 | | 2024 |
Variable Window and Deadline-Aware Sensor Attack Detector for Automotive CPS F Akowuah, K Fletcher, F Kong 2023 IEEE 26th International Symposium on Real-Time Distributed Computing …, 2023 | | 2023 |
Real-time Adaptive Sensor Attack Detection and Recovery in Autonomous Cyber-physical Systems FE Akowuah Syracuse University, 2021 | | 2021 |
Assessing the security posture of OpenEMR using CAPEC attack patterns FE Akowuah North Carolina Agricultural and Technical State University, 2013 | | 2013 |
2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS)| 978-1-6654-0386-3/20/$31.00© 2021 IEEE| DOI: 10.1109/RTAS52030. 2021.00069 S Ahmed, F Akowuah, SF Aktar, Z Allen, JH Anderson, S Andrei, ... | | |
2021 IEEE 27th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)| 978-1-6654-4188-9/21/$31.00© 2021 IEEE| DOI: 10.1109/RTCSA52859 … T Abdelzaher, F Akowuah, AN Amalou, S Andrei, M Asavoae, A Bar-Hen, ... | | |
Realizing the Potential of Attack Patterns for Secure Software Development X Yuan, F Akowuah, H Yu | | |
Assessing the security posture of OpenEMR using CAPEC attack patterns Francis Enoch Akowuah North Carolina A&T State University FE Akowuah, G Dozier, H Yu, S Sarin, X Yuan, J Xu | | |