.- Digital economy, Digital transformation, e-Government and e-services.
.- Digital Identity Frameworks: A Review.
.- Cloud adoption in low resource settings: A case of higher education institutions in Uganda.
.- A Blueprint for South African Public Schools ICT Infrastructure.
.- Re-Thinking the Connectivity for Schools within the Public Education System in South Africa.
.- Deep Learning Approaches for Object Detection in Autonomous Driving: Smart Cities Perspective.
.- ICT infrastructures for critical environmental conditions.
.- Internet of Energy (IoE): A Comprehensive Review of Design, Principles, and Architectural. Frameworks
.- Enhancing Power Efficiency in NB-IoT Networks: PAPR Reduction in SC-FDMA.
.- Modelling of a solar photovoltaic power supply for a wireless access point in a rural area.
.- Wireless networks.
.- FSO Transmission Link Performance Analysis for Enhancing Internet Infrastructure on Côte D'Ivoire.
.- Lightweight authentication system for software-defined wireless sensor networks.
.- A K-means based approach for Optimal Gateway Deployment in LoRaWAN-SIM.
.- Assessing the Impact of Web Caching on Resource Utilization in Low-Capacity Networks.
.- Channel Allocation Based K-Medoids in a Wireless Mesh Network.
.- E-health.
.- Digitization of Patient Records in Maxillofacial and Stomatology Surgery: The Case of the Maxillofacial and Stomatology Surgery Unit at Sominé Dolo Hospital in Mopti, Mali.
.- Design of an Electronic Health Record Module in the Pediatrics Department of the Ouahigouya Regional University Hospital Center.
.- Emergency Severity Index (ESI), a more suitable system for emergencies in Burkina Faso.
.- Cybersecurity and Privacy.
.- The State of Data Breaches in the African Cyberspace: A Trend Analysis Using Social Media and Research Literature.
.- Advancing Mobile Money Payments Through Blockchain and Interoperability Protocols.
.- Blackhole attack detection and countermeasure solution in RPL.
.- Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts.
.- Proposal of honeypot - based datamining methods for discovering intrusions in big data databases.
.- Potential Cyber Threats to the National Elections in the Digital Age in Africa.
.- Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues.
.- Emerging Phishing Attack Trends: A South African Case Study.
.- 5G Network Security: Unraveling Vulnerabilities and Innovating Defense Mechanisms.