ISA Researches

  1. Shoniwa, Robert T.R, and Geogen George. “Scanning tool for the detection of images embedded with malicious programs.” Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on. IEEE, 2015.
  2. Marengereke T and K. Sornalakshmi, “Cloud based security solution for android smartphones,” Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on, IEEE, 2015.
  3. Mambodza, W.T. & Nagoormeeran, A.R., 2015. Android mobile forensic analyzer for stegno data. IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2015, (978).
  4. Chakavarika T.,Dr Chaurasia B.K., Dr Gupta S.K. Improved Energy Efficient Key Management Scheme in Wireless Sensor Network, IEEE International Conference on Communication and Signal Processing ICCSP April 2016
  5. Chakavarika T.,Dr Chaurasia B.K., Dr Gupta S.K. Perfomance Evaluation of a Polynomial based Key Management Scheme in Wireless sensor networks, IEEE International Conference on Communication and Signal Processing ICCSP April 2016
  6. Kaushal Kumar, Abhaya, Mukoko, Fungayi Donewell. “PageRank algorithm and its variations: A Survey report.” International Journal of Computer Engineering (IOSR-JCE),  2013
  7. Mukoko, Fungayi Donewell, Abhaya, Kaushal Kumar3, Ankush Jain. “Cloud Based Performance Testing.” Quest Journal of Software Engineering and Simulation, 2013
  8. Wellington Makondo,  Mukoko, Fungayi Donewell, Kumbirayi Nyachionjeka   “Knowledge Transfer of Experienced Testers in Real Operational Setting.International Journal of Electronics Communication and Computer Technology (IJECCT), 2014
  9. Mambodza, Walter T., Shoniwa Robert T.R., and V. M. Shenbagaraman. “Cybercrime in “Credit Card Systems”: Case Study on the 2014 Korean Credit Bureau Data Leak.”, International Journal of Science and Research (IJSR), 2014.
  10. Shoniwa, Robert T.R. and Geogen George. “Design of Application to Detect Images Embedded with Malicious Programs.”, International Journal of Science and Research (IJSR), 2015.
  11. Marengereke T. and K. Sornalakshmi, Automated Malicious Android App Detection using Machine Learning Methods, International Journal of Engineering Development and Research (IJEDR), 2015
  12. Mambodza W., David. I. Fadaraliki, Shepard Chifamba, Tendai Marengereke, Robert Shoniwa E-commerce: new forms of work for wealth creation in Zimbabwe, International Journal of scientific research and management (IJSRM), 2015
  13. Mambodza, W.T., Human factors of securing information to reduce cybercrime activities.IJAERS, 2015
  14. Mambodza, W.T. & Nagoor, M.A., 2015. Anti-forensic : Design and Implementation of an Android Forensic Analyzer. International Journal of Innovative Research in Science, Engineering and Technology, 4(4, April).