关注
Joseph Kizza
Joseph Kizza
在 utc.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Guide to computer network security
JM Kizza, W Kizza, Wheeler
Springer, 2013
4642013
Ethical and social issues in the information age
JM Kizza
Springer New York, 2003
3652003
Computer network security
JM Kizza
Springer Science & Business Media, 2005
1332005
Computer network security and cyber ethics
JM Kizza
McFarland, 2014
912014
Discovering topics from dark websites
L Yang, F Liu, JM Kizza, RK Ege
2009 IEEE symposium on computational intelligence in cyber security, 175-179, 2009
512009
Civilizing the Internet: Global concerns and efforts toward regulation
JM Kizza
McFarland, 1998
311998
Network Intrusion Detection Based on Bayesian Networks.
A Cemerlic, L Yang, JM Kizza
SEKE, 791-794, 2008
302008
Workplace surveillance
JM Kizza, J Ssanyu
Electronic monitoring in the workplace: controversies and solutions, 1-18, 2005
292005
Ethics in computing
JM Kizza
Cham: Springer, 2016
222016
Feige-fiat-shamir zkp scheme revisited
JM Kizza
International Journal of Computing and ICT Research 4 (1), 9-19, 2010
222010
System intrusion detection and prevention
JM Kizza
Guide to computer network security, 295-323, 2024
202024
Social and ethical effects of the computer revolution
JM Kizza
McFarland & Company, Inc. Publishers, 1996
191996
Fine-grained reputation-based routing in wireless ad hoc networks
L Yang, JM Kizza, A Cemerlic, F Liu
2007 IEEE Intelligence and Security Informatics, 75-78, 2007
172007
Ethical, privacy, and security issues in the online social network ecosystems
JM Kizza, JM Kizza
Ethics in Computing: A Concise Module, 227-253, 2016
152016
Mobile money technology and the fast disappearing African digital divide
JM Kizza
African Journal of Science, Technology, Innovation and Development 5 (5 …, 2013
142013
Securing the information infrastructure
J Kizza, F Migga Kizza
IGI Global, 2007
142007
Building a strong undergraduate research culture in African universities
JM Kizza
International Journal of Computing and ICT Research 5 (2), 1-80, 2011
122011
Technology and academic dishonesty–Part I: A focus on students
JM Kizza
International Journal of Computing and ICT Research 3 (1), 7-10, 2009
112009
Computer and network forensics
JM Kizza
Computer Network Security, 347-385, 2005
112005
Cyber crimes and hackers
JM Kizza
Computer Network Security, 131-162, 2005
112005
系统目前无法执行此操作,请稍后再试。
文章 1–20