See PRO editionSee PRO edition
See other templatesSee other templates

Dr. Felix Musau

dr_felix_musau

Name: Felix Musau
Title/Qualifications:
Dr.
Department/Unit/Section:
Computing &Information Technology
Contact Address:
P.o Box 43844-00100, Nairobi, Kenya
Position:
Lecturer
Download Full CV

Research Interests: Computer and network security Trust in Mobile Ad Hoc Networks, Security of Wireless Sensor Networks and semantic web technology, Internet of Things, Digital Image processing and Image Recognition, ICT for development.

Research and Publications
  1. Felix Musau, Guojun Wang, Shui Yu, and Muhammad Bashir Abdullahi, “Securing Recommendations in Grouped P2P E-Commerce Trust Model,” IEEE Transactions on Network and Service Management, 14 pages (Accepted, September 2012).
  2. Felix Musau, Guojun Wang, and Muhammad Bashir Abdullahi, “Group Formation with Neighbor Similarity Trust in P2P E-Commerce,” Peer-to-Peer Networking and Applications (Springer), Published online on November 10, 2011, DOI: 10.1007/s12083-011-0116-4.
  3. Felix Musau, Guojun Wang, and Muhammad Bashir Abdullahi, “Group Formation with Neighbor Similarity Trust in P2P E-Commerce,” Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), pp. 835-840, November 16-18, 2011, Changsha, China.
  4. Felix Musau, Guojun Wang, Song Guo, and Muhammad Bashir Abdullahi, “Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce,” 9th IEEE International Conference on Autonomic and Trusted Computing (ATC 2012), Japan, pp. 1-8.
  5. Felix Musau and Muhammad Bashir Abdullahi, “Similarity Formation of Groups and Key Management in Dynamic Peer to Peer E-commerce,” Proc. of CiSE, IEEE, 2010, ISBN:978-1-4244-5391-7, pp.1 – 4.
  6. Felix Musau, Cheruiyot Wilson, and Joseph Mushi, “Trust and its challenges facing E-Government programs in Kenya,” Proc. of CAMAN, IEEEE, 2010.
  7. Felix Musau, Cheruiyot Wilson, and Jospeh Cosmas Mushi, “Principles of trust in internet security and webscure environment,”Proc. of CAMAN, IEEE, 2010.
  8. Felix Musau, Walugembe Hussein, Frans David, and Wilson Cheruiyot, “Trust Transaction Algorithm in Dynamic P2P E-commerce Environments,”Proc. of CAMAN, IEEE, 2012, pp. 4231-4234.
  9. Felix Musau, Shenbing Ren, Shouyi Yu. Security of Internet transactions , National Chinese Computer Engineering Journal, 2003.
  10. Muhammad Bashir Abdullahi, Guojun Wang, and Felix Musau, “A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks,” Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), pp. 548-555, November 16-18, 2011, Changsha, China.
  11. Wilson Cheruiyot, Guan_Zheng Tan, Felix Musau, and Joseph Mushi “Query

Last Updated on Thursday, 23 October 2014 07:46

Kenyatta University School of Engineering...ISO 9001:2008 Certified

Copyright © 2013 Kenyatta University. All Rights Reserved