Profile of Agozie Eneh (Ph.D)

A passionate and highly personable individual, working as an information technology solutions services provider with extensive experience in computer networking and systems analysis and design together with several years of experience in teaching and research in various universities both at graduate and postgraduate levels.

E D U C A T I O N

2003 – 2007

MIDDLESEX UNIVERSITY,
LONDON

  • PHD
    Computer Network Security

2003 – Date awarded

MIDDLESEX UNIVERSITY,
LONDON

  • MSc Computer Network
    (Distinction)

UNIVERSITY OF NIGERIA

  • MBA (Management, 2000)
  • PGD (Management, 1998)
  • BSC (Computer Science, 1995)

 

W O R K E X P E R I E N C E

University of Nigeria Nsukka
Senior Lecturer in Computer Science.  2009 – PRESENT
– Development and administration of Courses; teaching and administration of examinations. Courses involved are; Algorithms, Network design, Network Security, Software Quality Assurance, Operations Research, Database Management Systems, etc.
SoftScience Technologies
Eecutive Systems Analyst.                    1998 – PRESENT
– Creating and developing business leads, managing and executing various IT projects of clients, such BMC Health Services with the installation of various computer based diagnostic equipment and facilities, which involve OCT, Visual Field Monitor, A and B Scans, Fundus Camera, and laser machines. Together with dialysis machines and workstations.
– Coordinate research in both academic and industry sectors to meet with various interests and needs of clients.
– Supervise and monitor productivity levels of systems and ensure clients’ satisfaction across various channels and avenues of service.

 

R E F E R E N C E

Prof Collins Udanor
Phone: +234 8061338765
Email :collins.udanor@unn.edu.ng
Department of Computer Science, UNN.
Prof Dr. Enver Ever
Phone: +903926612961
Email : eever@metu.edu.tr
Middle East Tech University

 

Teaching and Professional Experience:

The teaching roles and experience include but not limited to the following courses; Operations Research, Optimization (Shortest path problems, Network flow, Minimum cost flow, Linear and dynamic programming, and inventory management systems), telecommunications and networks, network and Internet security, ethical hacking, digital forensics, network risk assessment, business continuity planning and implementation, management and strategic information systems, online databases, algorithms, and operations research.


Date: March, 2018 to date Post: Visiting Professor
Courses in Coal City University include: Database Management Systems, Computer Networks and Communication, Computer programming
Date: November, 2009 to date Post: Senior Lecturer
Currently, the courses in the University of Nigeria include: Database Management Systems, Computer Networks, Network Security, Algorithms, and Operations Research, etc. These courses are taught both at undergraduate and postgraduate levels
Date: July, 2007 to January, 2008 Post: Senior Lecturer
Coventry University, UK: Assigned to teach Ethical Hacking, Digital Forensics, and Network Security.
Date: October, 2003 to May, 2007 Post: Lecturer,
The modules taught in Middlesex University include; network design, network security, and security management in Middlesex University. Others were object oriented programming using Java, Project management, and management information systems in Rhazes Institute of Management Sciences.

Research Skills

Research interest is inspired by the fact that despite the multiplicity of highly published protocols for authentication, attacks continue to evolve against authentication solutions, and thereby hinder the trust on e-transactions. By the research work on developing pre-emptive authentication protocols, some problems and limitations of developing a fully automatic multi-dimensional protocol analysis system have been identified. The development of protocols with attack resistant capability, through adequate intruder definition in protocol analysis systems, is highly significant and therefore, forms the epicenter of my research and scholarly activity.

Some Conferences and Workshops Attended

S/NName of Conference, place held and dateTitle of paper read and full author list
1.4th International Network Conference INC’04, Plymouth, UK. 2004A three-way authentication framework for IEEE 802.11b networks, ISBN 1-84102-125-3, pp 345-352 Eneh, H. A., Singh, H., and Gemikonakli, O
2.Proceedings of International Conference on Applied Computing IADIS’05, Algarve, Portugal, 2005Analysis of security protocols for authentication in distributed systems, Eneh, H. A. and Gemikonakli, O
3.The 3rd International Workshop on Security in Information Systems, ICEIS WOSIS’05, Miami, USA, 2005 (Presenter)An approach for the analysis of security standards for authentication in distributed systems, Eneh, H. A. and Gemikonakli, O
4.International Conference of Technology, Knowledge and Society. University of California, Berkeley, USA, February, 2005The Analysis of Security Standards for Authentication in Distributed Systems. Authors: Agozie Eneh and Dr. Gemikonakli, O
5.Proceedings of 5th Annual Security conference’06. Las Vegas, Nevada, USA, April
2006.
Towards the modeling of authentication protocol attacker Eneh, H. A., Gemikonakli, O., and Comley, R.
6.The 5th Annual Security conference’06. Las Vegas, Nevada, USA, April 2006.Secure electronic commerce authentication protocols in economically deprived communities. Eneh, H. A., Gemikonakli, O., and Comley, R.
7.Proceedings of PREP 2005 Conference, Lancaster, UK, 2005,A methodology for analysis of security standards for authentication in distributed information processing systems. Eneh, H. A.
8.The Ninth International Symposium on Frontiers of Information Systems and Network Applications, In conjunction with the 27th IEEE International Conference on Advanced Information and Networking Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.Modelling Attacker with Deciding Security Properties by Induction and Deduction, Kirsal, Y., Eneh, A, Gemikonakli, O., and Mostarda, L.

 

Some Publications

S/NSome Publications
1.A. H. Eneh, C. N.Udanor, N. I. Ossai, A. A. Obayi, C. H. Ugwuishiwu, and G. E. Okereke, Towards an Improved Internet of Things Sensors Data Quality for a Smart Aquaponics System Yield Prediction, MethodsX, Volume 11, 102436, 2023, https://.doi.org/10.1016/j.mex.2023.102436, (Thomson Reuters JCR Impact Factor= 1.9).
2.Kirsal-Ever, Y., Eneh, A., Gemikonakli, O., and Mostarda, L. (2014), Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal using CSP and Rank Functions,KSII Transactions on Internet and Information Systems,Vol 8, No 12, December, 2014. Pages 4604 – 4623. (Thomson Reuters JCR Impact Factor= 1.5).
3.C. N. Udanor, N. I. Ossai, E. O. Nweke, B. O. Ogbuokiri, A. H. Eneh, C. H. Ugwuishiwu, S. O. Aneke, A. O. Ezugwu, P.O. Ugwuoke, Arua Christiana (2022). An Internet of Things Labelled Datasets for Aquaponics Fish Pond Water Quality Monitoring System, Data in Brief, Volume 43, 2022, 108400, https://www.sciencedirect.com/science/article/pii/S2352340922005972 (Thomson Reuters JCR Impact Factor=1.2).
4.Eneh, H. A. and Gemikonakli, O. (2006), Pre-emptive Authentication Protocol Design and Analysis: Hope for Secure Communication in Societies with Economic Deprivation, International Journal of Technology, Knowledge, and Society, Vol 1, Issue 5, 2006. Pages 35 – 42.(Scimago Journal Rank =0.11)
5.Emmanuel C. Ukekwe and Eneh, A.H. (2022), Design and Implementation of A 3-Task Construct for Managing Redundant Files, Journal of Theoretical and Applied Information Technology, Vol 100 (4), PP. 971 – 979, 28th February, 2022. Available at www.jatit.org (Scimago Journal Rank =0.17)
6.Arinze, Uchechukwu Christian; Longe, Olumide Babatope; Eneh, A.H. (2020). Regulatory Perspective on Nuclear Cyber security: The Fundamental Issues. International Journal of Nuclear Security (IJNS), Vol. 6, No. 1, pp. 1-35. Available on the web at: https://trace.tennessee.edu/ijns/vol6/iss1/3 (Scimago Journal Rank =0.108)
7.C. H. Ugwuishiwu1, O.A. Ayegbusi, A. H. Eneh, J. Ujah (2020). Towards Physical Implementation of Quantum Computation. International Journal of Advanced Trends in Computer Science and Engineering. 9(5) 7936 – 7944. Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse147952020.pdf https://doi.org/10.30534/ijatcse/2020/147952020. (Scimago Journal Rank=0.13)
8.Eneh, A. H. and Arinze, U. C (2017) Comparative Analysis and Implementation of Dijkstra’s Shortest Path Algorithm for Emergency Response and Logistics Planning, Nigerian Journal of Technology (NIJOTECH), Vol 36, No 3, July 2017, Pages 876-888.

 

Conferences and Learned Societies Activities:

a. The 5th Annual Security conference’06. Las Vegas, Nevada, USA, April 2006
b. PGNET conference’05. Liverpool, June 2005,
c. PREP 2005 Conference, Lancaster, UK, 2005
d. 3rd International Workshop on Security in Information Systems, ICEIS WOSIS’05, Miami, USA, May 2005
e. International Conference on Technology, Knowledge, and Society, Berkeley, California, February 2005
f. International Conference on Applied Computing IADIS’05, Algarve, Portugal
g. 4th International Network Conference INC’04, Plymouth, UK,
h. ISTEAMS Multidisciplinary Cross-Border Conference, University of Ghana, Legon, October, 2017.
i. The 13th International Conference on Interactive Mobile Communication Technologies and Learning
(IMCL2019), Thessaloniki, Greece, 31st October to 1st November, 2019 (Paper Presenter)
j. ISTEAMS Multidisciplinary Cross-Border Conference, University of Ghana, Legon, June, 2022

Grants and Fellowships:

Apache Web Services Grant: Awarded to Concurrency Research Group (Headed by Prof. Richard Bornat), School of Computing Science, Middlesex University. The grant was for the analysis of the security and concurrency problems of the Apache Web Server.
Awards and Honours:
Name of Award: Lecturer of the Year 2010 and 2011
Awarding Body: NACOSS

 

Email: agozie.eneh@unn.edu.ng or agozieene@yahoo.com

Phone: +234-9091144625