Neighbor similarity trust against sybil attack in P2P e-commerce G Wang, F Musau, S Guo, MB Abdullahi IEEE transactions on parallel and distributed systems 26 (3), 824-833, 2014 | 73 | 2014 |
Advanced algorithm for brain segmentation using fuzzy to localize cancer and epilespy region ML Toure, Z Beiji, F Musau, AD Camara 2010 International Conference on Electronics and Information Engineering 2 …, 2010 | 23 | 2010 |
Group formation with neighbor similarity trust in P2P E-commerce F Musau, G Wang, MB Abdullahi Peer-to-Peer Networking and Applications 7, 295-310, 2014 | 19 | 2014 |
Trust and its challenges facing e-government programs in Kenya F Musau, W Cheruiyot, JC Mushi 2011 International Conference on Computer and Management (CAMAN), 1-4, 2011 | 15 | 2011 |
Securing recommendations in grouped P2P e-commerce trust model F Musau, G Wang, S Yu, MB Abdullahi IEEE transactions on Network and Service Management 9 (4), 407-420, 2012 | 8 | 2012 |
Genetic algorithm-enhanced retrieval process for multimedia data F Musau, W Cheruiyot, T Guan-Zheng, C Mushi International Journal of Advancements in Computing Technology, 2011 | 8 | 2011 |
E-Services & devolution: Usage of ICT applications on customer service delivery in machakos county government, Kenya M Egessa International Journal of Management Research & Review, 2016 | 6 | 2016 |
Performance Analysis of Recharging Scheme of M-SaaS through M-banking F Musau, GZ Tan, JC Mushi, C Wilson | 6 | 2011 |
A reliable and secure distributed in-network data storage scheme in wireless sensor networks MB Abdullahi, G Wang, F Musau 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 5 | 2011 |
Using genetic algorithms to optimize web caching in multimedia-integrated e-learning content F Musau, WK Cheruiyot, G Zheng Tan, JC Mushi International Journal of Digital Content Technology and its Applications, 2011 | 5 | 2011 |
Transparent computing: A new paradigm for increased user friendliness in service sharing F Musau, P Obiria Kenyatta University Institutional Repository, 2013 | 3 | 2013 |
Modeling M-SaaS delivery model for threshold-based credit recharging using M-banking JC Mushi, G Tan, F Musau, C Wilson 2011 3rd International Conference on Computer Research and Development 2 …, 2011 | 3 | 2011 |
Neighbor similarity trust against sybil attack in p2p E-commerce F Musau, G Wang, S Guo, MB Abdullahi 2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012 | 2 | 2012 |
Query quality refinement in singular value decomposition to improve genetic algorithms for multimedia data retrieval W Cheruiyot, GZ Tan, F Musau, JC Mushi Multimedia systems 17, 507-521, 2011 | 2 | 2011 |
Similarity formation of groups and key management in dynamic peer to peer e-commerce F Musau, MB Abdullahi 2010 International Conference on Computational Intelligence and Software …, 2010 | 2 | 2010 |
Web Application Development Issues and e-business Software Development Life Cycle P Kiratu, F Musau IJSR, 2018 | 1 | 2018 |
Principals of Trust in Internet Security and Websecure Environment F Musau, W Cheruiyot, JC Mushi, J Modie 2011 International Conference on Computer and Management (CAMAN), 1-4, 2011 | 1 | 2011 |
Effects of IT capability on Performance of Manufacturing Firms in Nairobi City County Kenya L Gitau, D Nzuki, F Musau Technium Soc. Sci. J. 28, 595, 2022 | | 2022 |
Effect of IT Personnel Capability on Performance of Manufacturing Firms in Nairobi City County, Kenya L Gitau, D Nzuki, F Musau International Journal of Innovative Research and Development 10 (7), 2021 | | 2021 |
An Enhanced Service Flow Management Scheme for IEEE 802.16 Broadband Wireless Access Systems JM Mwamafundo, S Kipkorir, F Musau International Journal of Computer Theory and Engineering 4 (4), 484, 2012 | | 2012 |