Prof. Kester Quist-Aphetsi
Professor Quist-Aphetsi Kester
Prof. Quist-Aphetsi Kester, PhD(Distinction)-Chairman of CRITAC
Chair of the National Cyber Intelligence and Cyber Defense Research Project


Prof. KESTER QUIST-APHETSI, PhD (Distinction:Highest Honours), MCSFS,MSE, BSC, Dips, Certs, MIET, Fellow UK-HEA, MBCS, RITTECH,M.PMI,Senior ACM, SigAI-ACM, SMIEEE, MISOC, Fellow IETF|ISOC, SM. IEEE COMSOC, SM. IEEE CIS, SM. IEEE Computer, SM.IEEE, SM.IEEE ITS, SM. IEEE SPS, M. SDIWC, M. IAENG, M. WASET, M.SIGSAC M.SIAM, SIGACTACM, MITAG, SIGAIACM, SIGSOFTACM, SM.IEEESA, SM.IEEE QCIT, EIG SCC ACM, CSTA, M.NSBE, M.AAAI, CRITAC ACM, M.IACR, SM.IEEECS, SM.IEEEPES


Expert in:
Cybersecurity and Digital Forensics, Information Security, Artificial Intelligence, Machine Learning, Cryptology, Cyber security, Modelling and Simulation, Blockchain design and implementation, Signal processing, Watermarking, Mathematical Algorithm development for Security systems, Security systems architecture development and engineering, Quantum Cryptographic systems for satellite communications, Cyber Defence and Warfare Technologies etc.


Title and Full Name: Prof. Kester Quist-Aphetsi
E-mail: ceo@critacghana.com;kesterphysics@yahoo.co.uk;kesterphysics@gmail.com ;kquist@ieee.org; kester@acm.org


Profile Summary:
Professor Kester Quist-Aphetsi is a distinguished global Cybersecurity and Artificial Intelligence expert. He has taught Cybersecurity and Digital forensics courses at the undergraduate and post graduate level as well as professionals for more than 10 years. He is a Tier 1 Certified Cybersecurity Professional by the National Cyber Security Authority under Cybersecurity Act, 2020 (Act 1038) with more than a decade of Professional practice. He is the Chair of the National Cyber Intelligence and Cyber Defense Research Project. He is a Professional Member of the Chartered Society of Forensic Sciences and has specialties in Digital Forensics Investigations, Digital Evidence and Malware Analysis. The Chartered Society of Forensic Sciences is a regulated Professional Body of Forensic Sciences. He has expertise in counter cyberterrorism, Cyber Warfare and Cyber Defense as well as an extensive research expertise in cyber weapons. He is a member of DEFCON, the world largest hacker group. He is a Judge at the Global Cyber 9/12 Strategy Challenge held globally under the US Department of State Bureau of Cyberspace and Digital Policy and the Atlantic Council USA. He is a member of the World Wide Web Consortium (W3C) Advisory Committee with responsibilities including reviewing plans for W3C work, electing members of the Advisory Board and the Technical Architecture Group, and participating in the election of the W3C Board of Directors. He was a Chair at the United Nation's International Telecommunication Union Kaleidoscoope academic conference in 2022 and also served on the Awards Committee.The ITU Kaleidoscope events aim to increase the dialogue between experts working on the standardization of Information and Communication Technologies (ICTs) and academia. He has led several scientific research and developments projects and organized top scientific international conferences in the sector of artificial intelligence, cyber security, Data science etc. He has worked, participated, and chaired security activities in countries such as USA, Israel, France, UK, Canada, Spain, India, Malaysia, South Africa etc. He serves on more than 7 committees of United nations International Telecommunications Union as an Expert and has contributed to global standards development at ITU, IEEE, IETF, etc. He is part of United Nations Experts on Artificial Intelligence currently working on AI Diagnostics in Medicine and AI in Emerging Technologies and MIT Technology Review Global Panel member. He is a member of United Nations FG-AI4H Ad-hoc Group on digital technologies for COVID health emergency (AHG-DT4HE) and ITU-T Focus Group of Experts on Environmental Efficiency for Artificial Intelligence and other Emerging Technologies (FG-AI4EE). He is also a member of ACM Elite Future Computing Academy Global Members selected to shape the future of computing with works in AI. He is a specialist in cybersecurity, cryptography, computational intelligence, and signal processing. He has developed various grade encryption protocols, deep and dark web applications, and has been invited to top National Cyber Security Programs in countries such as Israel, United States, China, Russia, Canada, United Kingdom etc. He has given talks and facilitated Cyber Security Training for members of national and international security agencies including the Military, National Security, Criminal Investigative Department members of the police etc. He is a member of IEEE Blockchain Technical Experts and a member of the IEEE Computer Society Special Technical Community on Blockchain and a member of IEEE Standards Committee on development of industrial security standards. He is a member of Open Worldwide Application Security Project(OWASP) in Maryland USA.OWASP is dedicated to helping government agencies and organizations understand and improve the security of their web applications and web services. He is Associate Editor of International Journal of Blockchains and Cryptocurrencies Inderscience Publishers in Switzerland. He served as a Judge (IEEE Computer society selected Judge, USA.) for Upsilon Pi Epsilon Honor Society Awards: This is a global award given to undergraduate and postgraduate students with a minimum GPA of 3.0 out of a possible 4.0 and have extensively contributed to computing field globally. He was the Dean for FoCIS at the Ghana Communications Technology University. He led the development of over 20 Stem programs under his leadership from Diploma to PhD level (Data Science, Cybersecurity, software engineering etc) and obtained accreditation successfully for the fully developed programs. He developed the future blueprint for the Ghana Communications Technology University approved by the Academic board consisting of 3 Colleges, 12 Faculties, 42 Departments, 3 Institutes and 13 Centers.The blueprint also consists of the furure organogram of the University and how it can be implmented to meet national and international goals.He advices other institutions on restructuring and consulted on creation of new undergraduate and post graduate programs etc. He Chairs Undergraduate and post graduate program boards and also Chairs accreditation panels for Ghana’s ministry of Education’s Tertiary Education Commission (GTEC) which is responsible for oversight of education and processing of new accreditation applications for academic programmes and re-accreditation of old programs. He is a security researcher and supervising PhD research projects with the LabSTICC IRIS Team « Pôle d’Excellence Cyber ». The team is deeply involved in several projects related to Cyber Security: the Chair of Naval Cyber Defense, the Cyber SSI CPER project, the joint research laboratory with Airbus Defense & Space etc.
He was the lead team member for cyber security and defense at GTUC of the Symposium to Introduce the Participants of the AFRICA ENDEAVOUR (AE) to GTUC Site Cyber Security Technologies, a United States Government Department of Defense sponsored exercise aimed at developing workable concepts for harmonizing Command, Control, Communications, Computers and Information Systems (C4IS) capability among African Armed Forces. He is a Laureate of the Millennium Excellence Awards and the winner of the President's Outstanding Youth Prize for Excellence in Technology. He is an Internet Engineering Task Force (IETF) Fellow. The IETF Fellowship was awarded to him by Internet Society (ISOC) to contribute his technical skills and experience to the work of the IETF in Canada and to promote IETF activities in Africa. IETF is the world’s premier Internet standards setting organization. He was elevated and awarded a Senior Member of IEEE, The institute of Electrical and Electronic Engineering. IEEE is the world's largest technical professional organization for the advancement of technology. He was also awarded a Senior Member of ACM, the Association of Computing Machinery, USA. ACM is the highest computing body in the world that awards the Alan Turing Awards (The Nobel Prize in computing). He is a member of the International Association for Cryptologic Research. He is also a Fellow of the UK Higher Education Academy and an active member of IEEE Experts in Technology and Policy with specializations in internet governance, cybersecurity, and privacy. He was a Scientific Research Ambassador to World Scientific Forum. He had his PhD in Computer Science and Applications with distinction from Université de Bretagne Occidentale, Brest in France, Master of Software Engineering degree from the Open University Malaysia with thesis area in Information Security. He obtained a Bachelor of Science Degree in Physics at the University of Cape Coast, Ghana and acquired Professional Diploma certification with Distinction in Business Management and Administration from the Institute of Commercial Management, United Kingdom as well as Diploma in Project Management. He is a Certified member of the Project Management Institute, PMI, USA. He was Global award (Gold) winner 2010 in Canada Toronto, of the NSBEs’ Consulting Design Olympiad and has been recognized as a Global Consulting Design Engineer. He has won Best Scientific Paper Award in Canada by IEEE 15th International Conference on Computational Science and Its Applications. He was awarded the French government Scholarship and has been awarded research grants in France at the Center of Excellence in Cyber Security. He has also been awarded as the Best Lecturer for Research, Publications and scholarship at the Ghana Technology University College. He has served as a Scientific Judge for Postgraduate Research Competition in Massachusetts, USA. He is a member of the Executive Council of Internet Society and the National Chair for Policy and Research, Internet Society (ISOC) Ghana Chapter, a world-renowned body that provides international leadership in Internet related standards, education, and policy. He is an Ambassador for ACM- Association of Computing Machinery, USA. He is the Chairman of the Executive Council of the Chartered ACM- Association of Computing Machinery Chapter of ACM at CRITAC. He is the chairman of the governing council for the Centre for Research, Information Technology and Advanced Computing-CRITAC. He also served on scientific Technical committees for international conferences, standard committees of IEEE in formulation of global standards, UK Chartered Institute of IT British Computer Society-BCS-UK Forensics group, Institute of Engineering and Technology-IET UK, as well as consulted for Governments on policy documents. He is a member of the European Cooperation in Science and Technology Team of Experts as a consultant and he partake in national, European Commission supported projects, and Inter governmental research projects and also to ensure overall scientific quality in latest scientific and technological developments. The European Cooperation in Science and Technology is the first and widest European intergovernmental network for coordination of nationally funded research activities. He is a Scientific Editorial Board Member, on Computer and Information Engineering, of the World Academy of Science, Engineering and Technology, WASET, USA. He is s member of IAENG, the International Association of Engineers (IAENG) international association for engineers and computer scientists.He serves in the following societies:-Artificial Intelligence,Bioinformatics,Computer Science,Data Mining,Electrical Engineering,Internet Computing and Web Services,Imaging Engineering,Information System Engineering,Scientific Computing,Software Engineering and Wireless Networks. He has worked in various capacities as a lecturer (national and international universities) and Head of Digital Forensics Department, Head of Computer science department, consultant to national and international reputable organizations, and served as a presenter at seminars and workshops both in the academic and social environment. He teaches short courses such as project management, scientific programming, software development etc. and had exposure to social researching as a freelance journalist and a social commentator on current affairs, scientific, economic and socio-political issues on radio, TV and in newspaper. He has supervised research works at both undergraduate and postgraduate level with national and international project/thesis/research supervision experience. He is a scientific journal editor, author, reviewer and advisor of high standard scientific international Journals, member and consultant to international scientific organizations such as IEEE-USA, ACM, CSIEEE, IET-UK, BCS, and was a member of Technology strategic board -UK etc. He was chair at Cambridge University, UK for a Scientific Conference on Mathematical and Simulation, 2015. Chair of European Conference on Computer Modeling and Simulation: Image Processing and Security session in 2013, Manchester and other IEEE, ACM and Springer conferences in countries like Spain, India etc. and have several global, international and institutional recognition and awards to that effect. He has publications in Journals, books, book and conferences. He has delivered talks on security in the Privacy, Defense and Cyber warfare in different countries. He is a research scientist, and he is an associate member and a research scientist at LAB-STICC UMR 6285, a CNRS-Centre for National and Scientific research Laboratory in France at the CID pole and the division of SFIIS (SécuritéFiabilité et Intégrité de l’Information et des Systèmes). He is the Lead Scientist for the Directorate of Information Assurance at CRITAC.


SELECTED EDUCATIONAL QUALIFICATIONS/ PROFESSIONAL QUALIFICATIONS/ SHORT COURSES
Doctorat en Informatique en Applications/PhD in Computer Science and Applications with Distinction (Highest Honours) (2015) with Specialization in Cryptography, Watermarking and Cryptanalysis, European University of Brittany, in France at the Université de Bretagne Occidentale in France: Information Security, France
PgCert Higher Education Professional Practice (2013-2014) Coventry University, UK
Master of Software Engineering (2011) With Specialization in Security of Real-Time Software Systems Open University of Malaysia (OUM), Malaysia.
Bachelor of Science in Physics, University with Specialization in Computational Physics. of Cape Coast, UCC, Ghana
Certificate in Online Teaching (2013) by Centre for Online Learning and Teaching (COLT), GTUC, Ghana
Certificate in Cyber Law (2013) Deemed University at the Indian Law Institute.
Diploma in Business Management and Administration (Distinction) of ICM- UK (2007-2008) The Institute of Commercial Management in the United Kingdom,
Certificate in Academic Leadership (2012) Coventry University, UK
Assessor Certificate (2016) City and Guilds of London City, UK
External Verification Certificate (2017) City and Guilds of London City, UK
Qualification Approval Certificate (2017) City and Guilds of London City, UK
Qualification Assurance Certificate (2017) City and Guilds of London City, UK
Certificate in Professional Wireless Communications (2017), IEEE Communications Society IEEE USA
2008(November): Seven HP Online Courses Certification at in
Linux101
Linux Systems Administration: 301
Network Storage
Networking 101
Infrastructure Virtualization: Deployment
Firewalls
Data Protection: Back up to tape, Disk, and the Network
2008(September): Eleven HP Online Courses Certification at in
Network Administration
Linux Administration 201
Servers 101
Storage Networks
Microsoft Windows Server 2008
Power and cooling in the Data Center
Computer programming
Introduction in XML
EPR: Resource Planning Solutions
Advance Microsoft Word 2007
Infrastructure Virtualization: Planning
2007-2008: Advance Diploma in Computer Systems Administration at SIMTEK, Center for Computer Studies at Cape Coast in the Central Region, Ghana.
2007-2008: Advance Diploma in Hardware Engineering at SIMTEK, Center For Computer Studies at Cape Coast in the Central Region, Ghana.
2008(August): Five HP Online Courses Certification at in
Microsoft Excel 2007
Protection against Spam, Spyware and Viruses
Repair of Windows Vista PC
Repair of Windows XP PC
Personal Computer Data Storage 101
2007(October): A Course Certificate in Data Management and Data Analysis,
EPIDATA, SPSS and MS-PowerPoint. This was facilitated by the
Department of Mathematics and Statistics at the University of Cape Coast, Ghana, through the Mathematics Student Association of Ghana.
2007(Oct-Dec): A Computer Programming Certificate in Programming, Database
System Applications, Software Development and Website Development.
University of Cape Coast, Ghana.


SELECTED GRANTS and AWARDS
IEEE Senior Member, IEEE, USA 2019
Senior Member of the IEEE Signal Processing Society IEEE, USA 2019
Senior Member of the IEEE Power and Energy Society IEEE, USA 2019
SIGSOFT ACM Senior Members - 2018
ACM Senior Member, Association of Computing Machinery, USA 2018
Fellow IETF|ISOC. The IETF Fellowship awarded by Internet Society (ISOC) for IETF in Canada 2018
Senior Member of the IEEE Computational intelligence Society IEEE, USA 2019
Overall Best Faculty for Research, Publication and Scholarship, Ghana Technology University College, Ghana
Best Scientific Paper in Computational Science ICCSA 2015 IEEE, Canada
Fellow UK Higher Education Academy 2014
Highest Honors, PhD (Distinction) with in Computer Science, Universite Bretagne Occidental, Brittany, France.
Center for Excellence in Cyber security, Lab-STICC UMR CNRS 6285Travel Grant to Canada for Scientific presentation in Calgary, Canada.
French Government Scholarship for PhD at University of Brest 2013
Travel Grant for World Science Forum held at Baku by the Government of Azerbaijan and UNESCO 2014
CNRS-Le Centre national de la recherche scientifique Travel Grant for IEEE conference in Pretoria 2013
Grant for Researchwork by CNRS in France,Lab-STICC UMR CNRS 6285 CID pole and team SFIIS (Sécurité Fiabilité et Intégrité de l’Information et des Systèmes)
The 2010 Global Consulting Design Olympiad CDO First-Place Winners with the Gold as a Global Consulting Engineer.
Lab-STICC CNRS-Le Centre national de la recherche scientifique Travel Grant for IEEE/Springer conference in Malaysia 2014
Management Information Technology Team at the Ghana-Second Urban Environmental Sanitation Project Institutional Strengthening Component Nordic Development Fund (NDF) in Sekondi-Takoradi, Ghana


Selected Executive and Scientific Leadership Service
General Chair, 2021 International Conference on Cyber Security and Internet of Things published by IEEE Computer Society, USA
Editor in Chief, 2021 International Conference on Cyber Security and Internet of Things published by IEEE Computer Society, USA
Publications Chair, 2021 International Conference on Cyber Security and Internet of Things published by IEEE Computer Society, USA
General Chair, 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), published by IEEE Computer Society, USA
Editor in Chief, 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), published by IEEE Computer Society, USA
Publications Chair, 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), published by IEEE Computer Society, USA
Judge (IEEE Computer society selected Judge, USA.) for 2020 Upsilon Pi Epsilon Honor Society Awards: This is a global award given to undergraduate and postgraduate students with a GPA of 3.0 out of a possible 4.0 minimum and have extensively contributed to computing field.
Judge (IEEE Computer society selected Judge, USA.) for 2019 Upsilon Pi Epsilon Honor Society Awards: This is a global award given to undergraduate and postgraduate students with a GPA of 3.0 out of a possible 4.0 minimum and have extensively contributed to computing field.
Co-General Chair, IEEE 2019 AFRICON International Conference. IEEE Region 8 flagship conference on the African continent IN areas of Communications, Networks, Electronics, Energy, Mobile Computing, Cloud Computing, Software, Engineering, Nanotechnology. Published by IEEE, USA
Chair of Plications, IEEE 2019 AFRICON International Conference. IEEE Region 8 flagship conference on the African continent IN areas of Communications, Networks, Electronics, Energy, Mobile Computing, Cloud Computing, Software, Engineering, Nanotechnology. Published by IEEE, USA
Editor in Chief, IEEE 2019 AFRICON International Conference. IEEE Region 8 flagship conference on the African continent IN areas of Communications, Networks, Electronics, Energy, Mobile Computing, Cloud Computing, Software, Engineering, Nanotechnology. Published by IEEE, USA
Chair of Technical Programs Committee, IEEE 2019 AFRICON International Conference. IEEE Region 8 flagship conference on the African continent IN areas of Communications, Networks, Electronics, Energy, Mobile Computing, Cloud Computing, Software, Engineering, Nanotechnology. Published by IEEE, USA
National Vice Chairman of IEEE Ghana Section, 2019-2020
Editorial Board member, 2019 AFRICON International Conference.
Chairman of IEEE Computer Society, Ghana Chapter, 2019
Chairman of IEEE Communications Society, Ghana Chapter, 2019
General Chair, 2019 2019 International Conference on Computing and its Applications (ICCA). Published by Procedia Computer Science Journal, Elsevier
Editor in Chief, 2019 International Conference on Computing and its Applications (ICCA). Published by Procedia Computer Science Journal, Elsevier
Publications Chair, 2019 International Conference on Computing and its Applications (ICCA), Published by Procedia Computer Science Journal, Elsevier
General Chair, 2019 International Conference on Cyber Security and Internet of Things published by IEEE Computer Society, USA
Editor in Chief, 2019 International Conference on Cyber Security and Internet of Things published by IEEE Computer Society, USA
Publications Chair, 2019 International Conference on Cyber Security and Internet of Things published by IEEE Computer Society, USA
General Chair, 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), published by IEEE Computer Society, USA
Editor in Chief, 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), published by IEEE Computer Society, USA
Publications Chair, 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), published by IEEE Computer Society, USA
General Chair, 2019 International Conference on Computer, Data Science and Applications (ICDSA), Conference ISBN: 978-1-7281-0481-2, IEEE, USA
Editor in Chief, 2019 International Conference on Computer, Data Science and Applications (ICDSA), Conference ISBN: 978-1-7281-0481-2, IEEE, USA
Publications Chair, 2019 International Conference on Computer, Data Science and Applications (ICDSA), Conference ISBN: 978-1-7281-0481-2, IEEE, USA
General Chair, 2019 International Conference on Communications, Signal Processing and Networks (ICCSPN) Conference ISBN: 978-1-7281-0484-3, IEEE, USA
Editor in Chief, 2019 International Conference on Communications, Signal Processing and Networks (ICCSPN) Conference ISBN: 978-1-7281-0484-3, IEEE, USA
Publications Chair, 2019 International Conference on Communications, Signal Processing and Networks (ICCSPN) Conference ISBN: 978-1-7281-0484-3, IEEE, USA
General Chair, 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT), Conference ISBN: 978-1-7281-0487-4, IEEE, USA
Editor in Chief, 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT), Conference ISBN: 978-1-7281-0487-4, IEEE, USA
Publications Chair, 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT), Conference ISBN: 978-1-7281-0487-4, IEEE, USA
General Chair, 2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), University of Ghana, Legon, Ghana.
Editor in Chief , 2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), University of Ghana, Legon, Ghana.
Chairman of IEEE Computer Society, Ghana, 2018
Chairman of IEEE Communications Society, Ghana, 2018
Chair of Internet Engineering Task Force (IETF) group at CRITAC, Ghana, 2018
Publications Chair, 2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), University of Ghana, Legon, Ghana.
Editorial Board Member of Information Engineering and Applied Computing ,an international Open Access journal of Whioce Publishing Pte. Ltd in Singapore
Scientific Book Reviewer, Springer.
Associate Editor of International Journal of Blockchains and Cryptocurrencies Inderscience Publishers.
Editorial Board Member of Computer Simulation in Application, an international Open Access journal of Whioce Publishing Pte. Ltd in Singapore
Chairman of Programs, IEEE CS TCCLS Sponsored International Rural and Elderly Health Informatics Conference (IREHI), 2018
Advisory Board member, Coliba Group. Ghana, 2018.
Chairman of Convocation, Ghana Technology University College, 2018
Chairman of the Board of Convocation, Ghana Technology University College, 2018
Editorial Board Member of International Journal of Blockchains and Cryptocurrencies Inderscience Publishers.
Chair, 2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), University of Ghana, Legon, Ghana.
Chair of Internet Society (ISOC), CRITAC Caucus, Ghana.
Editorial Board member,2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), University of Ghana, Legon, Ghana
Chairman for IEEE Virtual Events Program in Africa on Smart Grid at CRITAC Ghana, Cape Coast 2017
Chairman for IEEE Virtual Events Program in Africa on Smart Grid at Ghana Technology University Ghana, Accra2017
Chairman for IEEE Virtual Events Program in Africa on Big Data at CRITAC Ghana, Cape Coast2017
Chairman for IEEE Virtual Events Program in Africa on Big Data at Ghana Technology University Ghana, Accra2017
Editorial Board member, the International Conference on Education, Technology and Entrepreneurship (ICETE), Ghana Technology University, College, 2016
Chairman of the IEEE Technical Programs for International Conference, ICAST 2018, 2017
Board member of the Ghana National Mixed Martial Arts Federation, 2017
Chairman of the IEEE Professionals IEEE, Ghana Section, 2016
Chairman for IEEE Virtual Events Program in Africa on Green ICT at Ghana Technology University Ghana, Accra2016
IEEE Expert in Technology and Policy Member with specializations in Internet Governance, Cybersecurity, and Privacy
Scientific Expert for European Cooperation in Science and Technology which on latest scientific and technological developments at the European level
Chairman of the Executive Council of CRITAC ACM
Chairman of Research and Policy, ISOC
Chairman of the Governing Council of CRITAC
Scientific Panel Judge, Postgraduate Research Competition, Massachusetts, USA. 2016
Chair of a Session, International Conference on Advances in Computing, Communications and Informatics India 2015
Scientific Judge NSBE Convention 2015 Boston, Massachusetts, USA
Scientific Chair, International Conference on Mathematical and Simulation, Cambridge University, UK, 2014
Chair of European Conference on Computer Modelling and Simulation, Manchester, UK, 2013
Scientific Editorial Board Member, on Computer and Information Engineering, of the World Academy of Science, Engineering and Technology, WASET, USA
Scientific Chair, International Conference on Artificial Intelligence, Modelling and Simulation., Madrid, Spain 2014
Scientific Chair, International Symposium on Security in Computing and Communications, India 2013
Scientific Chair, World Congress in Computer Science, Computer Engineering, & Applied Computing, Las Vegas, Nevada, USA, 2015
Vice Chair, University Academic Conference Programs Committee, Ghana Technology University, College.


SELECTED PUBLICATIONS
1. Xenya, Michael Christopher, and Kester Quist-Aphetsi. "Decentralized Distributed Blockchain Ledger for Financial Transaction Backup Data." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 34-36. IEEE, 2019.
2. Asare, Bismark Tei, Kester Quist-Aphetsi, and Laurent Nana. "Using RC4 and Whirlpool for the Encryption and Validation of Data in IoT." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 114-117. IEEE, 2019.
3. Owusu, Prince Kelvin, and Kester Quist-Aphetsi. "Computer Aided Education for Early Childhood: A Focus for Text and Object Identification." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 24-27. IEEE, 2019.
4. Xenya, Michael Christopher, and Kester Quist-Aphetsi. "A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 11-14. IEEE, 2019.
5. Quist-Aphetsi, Kester, and Henry Blankson. "A Hybrid Data Logging System Using Cryptographic Hash Blocks Based on SHA-256 and MD5 for Water Treatment Plant and Distribution Line." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 15-18. IEEE, 2019.
6. Quist-Aphetsi, Kester, and Michael Christopher Xenya. "Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 88-92. IEEE, 2019.
7. Quist-Aphetsi, Kester, Bismark Tei Asare, and Laurent Nana. "Centralised Nodal Block Ledger for Remote Edge Devices in IoT." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 19-23. IEEE, 2019.
8. Quist-Aphetsi, Kester, Bismark Tei Asare, and Laurent Nana. "IoT Node-Node Secure Communication Using RIPEMD-128 and DES." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 62-65. IEEE, 2019.
9. Asare, Bismark Tei, Kester Quist-Aphetsi, and Laurent Nana. "Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 101-104. IEEE, 2019.
10. Quist-Aphetsi, Kester, and Michael Christopher Xenya. "Securing Medical IoT Devices Using Diffie-Hellman and DES Cryptographic Schemes." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 105-108. IEEE, 2019.
11. Quist-Aphetsi, Kester, and Isaac Baffour Senkyire. "Validating of Digital Forensic Images Using SHA-256." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 118-121. IEEE, 2019.
12. Simpson, Grace, and Kester Quist-Aphetsi. "A Centralized Data Validation Approach for Distributed Healthcare Systems in Dew-Fog Computing Environment Using Blockchain." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 1-4. IEEE, 2019.
13. Xenya, Michael Christopher, Crentsil Kwayie, and Kester Quist-Aphesti. "Intruder Detection with Alert Using Cloud Based Convolutional Neural Network and Raspberry Pi." In 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), pp. 46-464. IEEE, 2019.
14. Waller, Ephraim Nii Kpakpo, Pamela Delali Adablah, and Quist-Aphetsi Kester. "Markov Chain: Forecasting Economic Variables." In 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), pp. 115-1154. IEEE, 2019.
15. Asamoah, Loretta Pinamang, Edwin Worlawoe Amaglo, and Quist-Aphetsi Kester. "Using Bayesian Networks In Analysing Judgement." In 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), pp. 110-1104. IEEE, 2019.
16. Aka, Thierry Blaise Taih Coffi, Amevi Acakpovi, and Kester Quist-Aphetsi. "Performance Evaluation of FBMC Compared to OFDM by Simulation with Matlab." In 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), pp. 51-518. IEEE, 2019.
17. Ofosu, Amoah Emmanuel, Quist-Aphetsi Kester, and Attah Josephine Akosua Anyanewah. "A Cryptographic Algorithm Based On Aes Cipher Andnondeterministic Algorithm Approach For Key Generation." In 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), pp. 105-1054. IEEE, 2019.
18. Acakpovi, Amevi, Isaiah Tefutor, Kester Quist-Aphetsi, Nnamdi Nwulu, Robert Sowah, and Ruhiya Abubakar. "Impact Analysis of Induced FM Radio Interferences on Aeronautical Radio Navigation Systems: Case Study of Kotoka International Airport, Accra-Ghana." In 2019 International Conference on Computing, Computational Modelling and Applications (ICCMA), pp. 19-197. 2019.
19. Sosu, Rexford Nii Ayitey, Kester Quist-Aphetsi, and Laurent Nana. "A Decentralized Cryptographic Blockchain Approach for Health Information System." In International Conference on Computing, Computational Modelling and Applications (ICCMA), Cape Coast, Ghana, pp. 120-1204. 2019.
20. Asare, Bismark Tei, Kester Quist–Aphetsi, and Laurent Nana. "Nodal authentication of IoT data using blockchain." In 2019 international conference on computing, computational modelling and applications (iccma), pp. 125-1254. IEEE, 2019.
21. Kester, Quist-Aphetsi. "An Integrated RoIP Communication Network for Effective Collaboration During Emergency and Disaster Management." In International Conference on e-Infrastructure and e-Services for Developing Countries, pp. 174-185. Springer, Cham, 2016.
22. Kester, Quist-Aphetsi. "Using formal concepts analysis techniques in mining data from criminal databases and profiling events based on factors to understand criminal environments." In International Conference on Computational Science and Its Applications, pp. 480-496. Springer, Cham, 2016.
23. Kester, Quist-Aphetsi. "Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems." In International Conference on e-Infrastructure and e-Services for Developing Countries, pp. 281-291. Springer, Cham, 2016.
24. Kester, Quist-Aphetsi. "A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things." In International Conference on e-Infrastructure and e-Services for Developing Countries, pp. 292-303. Springer, Cham, 2016.
25. Kester, Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and Nii Narku Quaynor. "A Cryptographic Technique for Security of Medical Images in Health Information Systems." Procedia Computer Science, Journal 58 (2015): 538-543.
26. Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., & Quaynor, N. N. (2015). A Cryptographic Encryption Technique of MPEG Digital Video Images Based on RGB Layer Pixel Values. In Pattern Analysis, Intelligent Security and the Internet of Things (pp. 149-157). Springer International Publishing.
27. Kester, Quist-Aphetsi, et al. "A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images." Security in Computing and Communications. Springer International Publishing, 2015. 228-237.
28. Kester, Quist-Aphetsi, et al. "Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image attributes and Visual Cryptography." Computational Science and Its Applications. Springer International Publishing, 2015. 712-724.
29. A Symmetric Key Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Pixel Transposition and Shuffling. Journal USA-Journal of Information Assurance and Security. Vol. 10 Issue 4 P. 192-199 USA
30. Kester, Quist-Aphetsi, et al. "A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images." Security in Computing and Communications. Springer International Publishing, 2015. 228-237.
31. Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., & Quaynor, N. N. (2015). A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. In Security in Computing and Communications (pp. 89-98). Springer International Publishing.
32. Kester, Quist-Aphetsi, Ozoemena Willis Chibueze, and Mohammed DolapoAsisat. "A Surveillance Wireless Camera Sensor Network System for Intrusion Detection Using Image Processing Techniques." ARPN Journal of Engineering and Applied Sciences.VOL. 10, NO. 17, 2015. ISSN 1819-6608.
33. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and NiiNarkuQuaynor. 2015. A Security Technique for Authentication and Security of Medical Images in Health Information Systems. In Proceedings of the 2015 15th International Conference on Computational Science and Its Applications (ICCSA '15). IEEE Computer Society, Washington, DC, USA, 8-13. DOI=http://dx.doi.org/10.1109/ICCSA.2015.8
34. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and NiiNarkuQuaynor. 2015. A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images. In Proceedings of the 2015 17th UKSIM-AMSS International Conference on Modelling and Simulation (UKSIM '15). IEEE Computer Society, Washington, DC, USA, 327-332. DOI=http://dx.doi.org/10.1109/UKSim.2015.101
35. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and NiiNarkuQuaynor. 2015. A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images. In Proceedings of the 2015 17th UKSIM-AMSS International Conference on Modelling and Simulation (UKSIM '15). IEEE Computer Society, Washington, DC, USA, 322-326. DOI=http://dx.doi.org/10.1109/UKSim.2015.85
36. Kester, Q.A., Owusu, P.A., Caulcrick-Odebo, D. and Hatsu, S., 2015. Pharmaceutical Verification and Information System for Authentication of Registered Drugs. International Journal of Emerging Research in Management & Technology ISSN: 2278-9359 (Volume-4, Issue-3)
37. Kester, Quist-Aphetsi, et al. "Feature Based Cryptanalytic Technique for Digital Forensics Analysis of Visual Cryptographic Digital Image Data Based on Formal Concept Analysis." Proceedings of the International Conference on Foundations of Computer Science (FCS). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2015.
38. Kester, Quist-Aphetsi, et al. "A Cryptographic, Discrete Cosine Transform and Frequency Domain Watermarking Approach for Securing Digital Images." Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2015.
39. Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., & Quaynor, N. N. (2015). A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images. International Journal of Computer Applications, 119(7).
40. Kester, Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and NiiNarkuQuaynor. "A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems." International Journal of Computer Applications 119, no. 7 (2015).
41. Kester, Q. A., Asisat, M. D., & Chibueze, O. W. (2015). Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication. International Journal of Computer Applications, 123(12).
42. Kapi Noemi Kara, Quist-Aphetsi Kester(2015). The Impact of Effective Project Team Management on Project Team Productivity: A Case Study of Ghana Broadcasting Corporation Education Project. Journal International Journal of Social Sciences Vol. 3 Issue.1
43. Quist-Aphetsi Kester, Nafissath Chidjou, & Asiedu Richard. (2015) Mobile Application Platform Support System for E-learning Management Systems International Journal of Advanced Research in Computer Science and Software Engineering. Vol.5 Issue. 7
44. Kester, Quist-Aphetsi, and Mansah Preko. "Business Intelligence Adoption in Developing Economies: A Case Study of Ghana." International Journal of Computer Applications 127, no. 1 (2015): 5-11.
45. Quist-Aphetsi Kester, William Sam-Aggrey.2015. Open System Architecture Platform for Big Data: An Integrated Emergency Disaster Response System Architecture. Journal International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vol 5 Issue 4 Pages 137-144
46. Kester, Quist-Aphetsi, et al. "A Spatial Domain Watermarking Approach for Digital Images based on Image Features built on Formal Concepts Analysis." International Journal of Computer Applications 119.7 (2015).
47. Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., & Quaynor, N. N. (2014). A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key. International Journal of Computer Applications, 94(19), 19-27.
48. Kester, Q. A., Nana, L., Christine Pascu, A., Gire, S., M Eghan, J., & Narku Quaynor, N. (2014). A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 530-539). Springer Berlin Heidelberg.
49. Kester, Q. A., A hybrid watermarking and cryptographic encryption technicque using D-H and RGB pixel displacement algorithm.(2014) New Challenges in the World Science, BWFYS 9-11.
50. Kester, Q. A., Nana, L., Christine Pascu, A., Gire, S., M Eghan, J., & Narku Quaynor, N. (2014). Feature Based Encryption Technique For Securing Forensic Biometric Image Data Using AES and Visual Cryptography.(2014) IEEE International Conference on Artificial Intelligence, Modelling and Simulation, AIMS2014, Madrid, Spain 1-6.
51. Kester, Q. A., Nana, L., Christine Pascu, A., Gire, S., M Eghan, J., & Narku Quaynor, N. (2014). A New Cryptographic Encryption Algorithm for Securing Digital Images. International Journal of Computer Applications, 94(19), 28-33.
52. Koumadi, K. M., Quist-Aphetsi, K., Sowah, R. A., & Acakpovi, A. An Interference Reduction Strategy for TDD-OFDMA Cellular Systems.(2014) World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering Vol:8 No:1, 2014
53. Quist-Aphetsi Kester and Danquah Paul Asante, A Novel Cryptographic Key Technique 4th IEEE ICAST Conference. vol., no., pp.70-73, 25-27 doi: 10.1109/ICASTech.2012.
54. Kester, Quist-Aphetsi, Ghartey Nana Gyankumah, and Ajibade Ibrahim Kayode. "Using Web Services Standards for Dealing with Complexities of Multiple Incompatible Applications." International Journal of Information Technology and Computer Science 4 (2012).
55. Kester, Quist-Aphetsi, Dr. Koumadi, K.M., Prof. NiiNarku, Quannor. “An integrated geographic information system and marketing information system mode”. International Journal of Advanced Technology and Engineering Research 6( 2012)
56. Kester, Quist-Aphetsi, Dr. Koumadi, K.M., Prof. NiiNarku, Quannor. “Integration of Independent Applications and EAI Systems Using Service Oriented Enterprise Bus and Open System Application Development Standard” International Journal of Information Technology and Computer Science 5 (2013).
57. Allister Lobo, Evelyn Mukwedeya, Thamiso Kgati, Kelvin Guobadia, Billy James Dega , Raymond Kojo Gomashi, Kester Quist - Aphetsi, and Emmanuel B Manful. Implementation of Wi-Fi Network in Rural Areas Using Winbelt- Cantenna Technology. 36th NSBE Annual World Convention in Toronto.
58. Kester, Quist-Aphetsi "A Novel Cryptographic Key-exchange Algorithm- Kester's Cryptographic Key-exchange Algorithm” LAP Lambert Academic Publishing ISBN 978-3-659-28931-6, 108 Pages. 2012
59. Amevi Acakpovi, Quist-Aphetsi Kester, Koudjo Mawuefam Koumadi “Semi-Automatic Car Anti-Theft Design using ATMega168 Microcontroller” International Journal of computer applications. Volume 63 issue 20 pp41-46 .2013
60. Kester, Quist-Aphetsi. "Task level Analysis of Risks within Software Engineering Projects using Graph Theory." International Journal of Science, Engineering and Technology Research, 2.2 (2013): pp: 466-472.
61. Kester, Quist-Aphetsi. "Optimization of Searches on Social Networks using Graph theory and Formal Concepts Analysis." International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2.1 (2013): pp: 293-303.
62. Kester, Quist-Aphetsi. “Visualization and Analysis of Geographical Crime Patterns Using Formal Concept Analysis." International Journal of Science, Engineering and Technology Research 2.1 (2013): pp: 220-225. Web. 15 Jan. 2013
63. Quist-Aphetsi Kester “A Hybrid Cryptosystem Based on Vigenère Cipher and Columnar Transposition Cipher” International Journal of Advanced Technology and Engineering Research (IJATER) Vol 3 Issue 1 pp141-147. 2013.
64. Kester, Quist-Aphetsi. "Application of Formal Concept Analysis to Visualization of the Evaluation of Risks Matrix in Software Engineering Projects." International Journal of Science, Engineering and Technology Research 2.1 (2013): pp:220-225. 2013
65. Kester, Quist-Aphetsi. "A cryptosystem based on Vigenère cipher with varying key." International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1.10 (2012): pp: 108-113. 2013
66. Kester, Quist-Aphetsi. "A cryptographic Image Encryption technique based on the RGB PIXEL shuffling." International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2.2 (2013): pp:848-854. 2013
67. Quist-Aphetsi Kester “The Role of Rural Banks in Providing Mobile Money Services to Rural Poor Communities: An effective integration approach of Rural Banks and existing mobile communications infrastructure”. Mobile Money Uptake in Ghana Conference
68. Quist-Aphetsi Kester “A Cryptographic Image Encryption Technique for Facial-Blurring of Images” International Journal of Advanced Technology and Engineering Research (IJATER)3 2013.
69. Quist-Aphetsi Kester “Image Encryption based on the RGB PIXEL transposition and shuffling” International Journal of Computer Network and Information Security(IJCNIS) 5(2013)
70. Kester, Quist-Aphetsi. “A Design of an Efficient, Robust, Autonomous and a well Coordinated Distributed Network Monitory System for Large Computer Networks." International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2.4 2013
71. Kester, Quist-Aphetsi. “A cryptographic algorithm based on words database." International Journal of Science, Engineering and Technology Research, 2.4 (2013): pp: 0969-0973.
72. Kester, Quist-Aphetsi. ". Using SOA with web services for an effective integration approach of Rural Banks and existing mobile communications infrastructure in Providing Mobile Money Services." International Journal of Science, Engineering and Technology Research, 2.4 (2013): pp: 0979-0984.
73. Kester, Quist-Aphetsi. ". Using SOA with Web Services for effective Integration of Hospital Information Systems via an Enterprise Service Bus." International Journal of Research in Engineering & Advanced Technology (IJREAT), 1.2 (2013): pp: 1-6.
74. Kester, Quist-Aphetsi. " Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concepts Analysis." 2nd CMI and GTUC International Conference on Applications of Mobile Communications in Africa: Prospects and Challenges (2013): pp: 1-12.
75. Kester, Quist-Aphetsi, Ajibade Ibrahim Kayode “Using SOA with Web Services for effective data integration of Enterprise Pharmaceutical Information Systems." International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 3.6 (2013)
76. Kester, Quist-Aphetsi. “A visual Cryptographic Encryption Technique for Securing of Medical Images." International Journal of Emerging Technology and Advanced Engineering (IJETAE), 3.6 (2013): pp:496-500.
77. Quist-Aphetsi Kester, Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data. ." International Journal of Research in Engineering & Advanced Technology (IJREAT), 1.5 (2013): pp: 1-5.
78. Kester, Quist-Aphetsi "A Novel Cryptographic Key-exchange Algorithm- Kester's Cryptographic Key-exchange Algorithm” LAP Lambert Academic Publishing ISBN 978-3-659-28931-6, 108 Pages. Germany. 2012
79. Quist Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and NiiNarkuQuaynor. 2014. A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images. In Proceedings of the 2014 First International Conference on Systems Informatics, Modelling and Simulation (SIMS '14). IEEE Computer Society, Washington, DC, USA, 139-146.
80. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu. A New Hybrid Asymmetric Key-Exchange and Visual Cryptographic Algorithm for Securing Digital Images. 5th IEEE ICAST Conference. Pretoria South Africa 2013.
81. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu. A Novel Cryptographic Encryption Technique of Video Images using Quantum Cryptography for Satellite Communications. 5th IEEE ICAST Conference. Pretoria South Africa 2013.
82. Quist-Aphetsi Kester, A Public-Key Exchange Cryptographic Technique Using Matrix 4th IEEE ICAST Conference. vol., no., pp.78-81, 25-27 doi: 10.1109/ICASTech.2012.6381070 2012.
83. Quist-Aphetsi Kester and Koumadi Koudjo M, Cryptographic Technique for Image Encryption based on RGB PIXEL Displacement 4th IEEE ICAST Conference. 2012. vol., no., pp.74-77, 25-27 doi: 10.1109/ICASTech.2012
84. Kester, Quist-Aphetsi, Ozoemena Willis Chibueze, and Mohammed DolapoAsisat. "A Surveillance Wireless Camera Sensor Network System for Intrusion Detection Using Image Processing Techniques." Mechanical and Mechatronics Engineering-2015 Advanced Research in Material Sciences, Manufacturing, Mechanical and Mechatronic Engineering Technology International Conference, Indonesia.
etc.