Presbyterian College of Education

logo2
Presbyterian College of Education Akropong

PUBLICATIONS

logo2
Dr. Nicholas Apreh Siaw

Siaw, N. A. (2013b). MANAGEMENT OF CHILDHOOD BURNS AND FALL-RELATED INJURIES IN THE NEW JUABEN MUNICIPALITY OF GHANA.

Siaw, N. A. (2014). Risk factors to childhood burns in the New Juaben Municipality of Ghana. Risk, 4(22).

Siaw, N. A., Duodu, E., & Sarkodie, K. S. (2013). Trends in road traffic accidents in Ghana; implications for improving road user safety. International Journal of Humanities and Social Science Invention, 2(11), 31-35.

Siaw, N. A., & Kwofie, S. (2016). Assessment of the effects of the free maternal health policy on maternal health: A case study of new Juaben Municipality, Koforidua, Ghana. International Journal of Business and Social Research, 6(7), 52-62

.

R. Amankwah, J. Chen, P. K. Kudjo, and D. Towey, “An empirical comparison of commercial and open‐source web vulnerability scanners,” Software: Practice and Experience, vol. 50, pp. 1842-1857, 2020.

R. Amankwah, P. K. Kudjo, and S. Y. Antwi, “Evaluation of software vulnerability detection methods and tools: a review,” International Journal of Computer Applications, vol. 169, pp. 22-27, 2017.

[P. K. Kudjo, J. Chen, S. Mensah, R. Amankwah, and C. Kudjo, “The effect of Bellwether analysis on software vulnerability severity prediction models,” Software Quality Journal, vol. 28, pp. 1413-1446, 2020.

[B. Ben-Bright, Y. Zhan, B. Ghansah, R. Amankwah, D. K. Wornyo, and E. Ansah, “Taxonomy and a theoretical model for feedforward neural networks,” International Journal of Computer Applications, vol. 975, p. 8887, 2017.

R. Amankwah, J. Chen, P. K. Kudjo, B. K. Agyemang, and A. A. Amponsah, “An automated framework for evaluating open-source web scanner vulnerability severity,” Service Oriented Computing and Applications, vol. 14, pp. 297-307, 2020.

R. Amankwah, “Predicting Vulnerable Software Components via Bellwethers,” in Trusted Computing and Information Security: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers, 2019, p. 389.

R. Amankwah, J. Chen, A. A. Amponsah, P. K. Kudjo, V. Ocran, and C. O. Anang, “Fast bug detection algorithm for identifying potential vulnerabilities in juliet test cases,” in 2020 IEEE 8th International Conference on Smart City and Informatization (iSCI), 2020, pp. 89-94.

W. Adjardjah, P. K. Kudjo, R. Amankwah, A. A. Okine, and T. Abeo, “A Fuzzy Logic QoE Enhancement VHO Scheme for VLC-RF HetNet in an Indoor Environment,” International Journal of Science, vol. 6, pp. 377-398, 2019.

R. Amankwah, P. K. Kudjo, B. K. Agyman, K. Mensah, B. Brew, and S. Y. Antwi, “An Integrated Approach for Detecting Security Vulnerabilities in Web Applications: A Theoretical Perspective,” International Journal of Computer Applications, vol. 975, p. 8887, 2018.

R. Amankwah, P. K. Kudjo, B. K. Agyman, K. Mensah, B. Brew, and S. Y. Antwi, “A Theoretical Framework for Software Vulnerability Detection based on Cascaded Refinement Network,” International Journal of Computer Applications, vol. 975, p. 8887.

R. Amankwah, “Research on the Improvement of Software Vulnerability Detection and Evaluation Based on Static Analysis and Empirical Study,” 江苏大学, 2021.

P. K. Kudjo, J. Chen, S. Mensah, and R. Amankwah, “Predicting vulnerable software components via bellwethers,” in Chinese Conference on Trusted Computing and Information Security, 2019, pp. 389-407.

R. Amankwah, J. Chen, H. Song, and P. K. Kudjo, “Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites,” Software: Practice and Experience.

R. Amankwah, R. Asianoa, and B. Birago, “Virtualization and Cloud Computing,” International Journal of Computer Applications, vol. 975, p. 8887.

P. A. Sarpong, L. S. Larbi, D. P. Paa, I. B. Abdulai, R. Amankwah, and A. Amponsah, “Performance Evaluation of Open Source Web Application Vulnerability Scanners based on OWASP Benchmark,” Int. J. Comput. Appl., 2021.