Follow
Joseph Kizza
Joseph Kizza
Verified email at utc.edu
Title
Cited by
Cited by
Year
Guide to computer network security
JM Kizza, W Kizza, Wheeler
Springer, 2013
4572013
Ethical and social issues in the information age
JM Kizza
Springer New York, 2003
3612003
Computer network security
JM Kizza
Springer Science & Business Media, 2005
1362005
Computer network security and cyber ethics
JM Kizza
McFarland, 2014
922014
Discovering topics from dark websites
L Yang, F Liu, JM Kizza, RK Ege
2009 IEEE symposium on computational intelligence in cyber security, 175-179, 2009
522009
Civilizing the Internet: Global concerns and efforts toward regulation
JM Kizza
McFarland, 1998
331998
Network Intrusion Detection Based on Bayesian Networks.
A Cemerlic, L Yang, JM Kizza
SEKE, 791-794, 2008
302008
Workplace surveillance
JM Kizza, J Ssanyu
Electronic monitoring in the workplace: controversies and solutions, 1-18, 2005
292005
Feige-fiat-shamir zkp scheme revisited
JM Kizza
International Journal of Computing and ICT Research 4 (1), 9-19, 2010
232010
Social and ethical effects of the computer revolution
JM Kizza
McFarland & Company, Inc. Publishers, 1996
201996
Ethics in computing
JM Kizza
Cham: Springer, 2016
172016
Fine-grained reputation-based routing in wireless ad hoc networks
L Yang, JM Kizza, A Cemerlic, F Liu
2007 IEEE Intelligence and Security Informatics, 75-78, 2007
172007
Ethical, privacy, and security issues in the online social network ecosystems
JM Kizza, JM Kizza
Ethics in Computing: A Concise Module, 227-253, 2016
152016
System intrusion detection and prevention
JM Kizza
Guide to computer network security, 295-323, 2024
142024
Mobile money technology and the fast disappearing African digital divide
JM Kizza
African Journal of Science, Technology, Innovation and Development 5 (5 …, 2013
142013
Ethical and Secure Computing: A Concise Module
JM Kizza
Springer Nature, 2023
132023
Securing the information infrastructure
J Kizza, F Migga Kizza
IGI Global, 2007
132007
Building a strong undergraduate research culture in African universities
JM Kizza
International Journal of Computing and ICT Research 5 (2), 1-80, 2011
122011
Technology and academic dishonesty–Part I: A focus on students
JM Kizza
International Journal of Computing and ICT Research 3 (1), 7-10, 2009
112009
Cyber crimes and hackers
JM Kizza
Computer Network Security, 131-162, 2005
112005
The system can't perform the operation now. Try again later.
Articles 1–20