Guide to computer network security JM Kizza, W Kizza, Wheeler Springer, 2013 | 464 | 2013 |
Ethical and social issues in the information age JM Kizza Springer New York, 2003 | 365 | 2003 |
Computer network security JM Kizza Springer Science & Business Media, 2005 | 133 | 2005 |
Computer network security and cyber ethics JM Kizza McFarland, 2014 | 91 | 2014 |
Discovering topics from dark websites L Yang, F Liu, JM Kizza, RK Ege 2009 IEEE symposium on computational intelligence in cyber security, 175-179, 2009 | 51 | 2009 |
Civilizing the Internet: Global concerns and efforts toward regulation JM Kizza McFarland, 1998 | 31 | 1998 |
Network Intrusion Detection Based on Bayesian Networks. A Cemerlic, L Yang, JM Kizza SEKE, 791-794, 2008 | 30 | 2008 |
Workplace surveillance JM Kizza, J Ssanyu Electronic monitoring in the workplace: controversies and solutions, 1-18, 2005 | 29 | 2005 |
Ethics in computing JM Kizza Cham: Springer, 2016 | 22 | 2016 |
Feige-fiat-shamir zkp scheme revisited JM Kizza International Journal of Computing and ICT Research 4 (1), 9-19, 2010 | 22 | 2010 |
System intrusion detection and prevention JM Kizza Guide to computer network security, 295-323, 2024 | 20 | 2024 |
Social and ethical effects of the computer revolution JM Kizza McFarland & Company, Inc. Publishers, 1996 | 19 | 1996 |
Fine-grained reputation-based routing in wireless ad hoc networks L Yang, JM Kizza, A Cemerlic, F Liu 2007 IEEE Intelligence and Security Informatics, 75-78, 2007 | 17 | 2007 |
Ethical, privacy, and security issues in the online social network ecosystems JM Kizza, JM Kizza Ethics in Computing: A Concise Module, 227-253, 2016 | 15 | 2016 |
Mobile money technology and the fast disappearing African digital divide JM Kizza African Journal of Science, Technology, Innovation and Development 5 (5 …, 2013 | 14 | 2013 |
Securing the information infrastructure J Kizza, F Migga Kizza IGI Global, 2007 | 14 | 2007 |
Building a strong undergraduate research culture in African universities JM Kizza International Journal of Computing and ICT Research 5 (2), 1-80, 2011 | 12 | 2011 |
Technology and academic dishonesty–Part I: A focus on students JM Kizza International Journal of Computing and ICT Research 3 (1), 7-10, 2009 | 11 | 2009 |
Computer and network forensics JM Kizza Computer Network Security, 347-385, 2005 | 11 | 2005 |
Cyber crimes and hackers JM Kizza Computer Network Security, 131-162, 2005 | 11 | 2005 |