An Extended Version of the Polybius Cipher TS Kondo, LJ Mselle International Journal of Computer Applications 79 (13), 2013 | 17 | 2013 |
Penetration testing with banner grabbers and packet sniffers TS Kondo, LJ Mselle Journal of Emerging Trends in computing and information sciences 5 (4), 321-327, 2014 | 13 | 2014 |
AI for Anglophone Africa: Unlocking its adoption for responsible solutions in academia-private sector R Sinde, S Diwani, J Leo, T Kondo, N Elisa, J Matogoro Frontiers in Artificial Intelligence 6, 1133677, 2023 | 7 | 2023 |
Practical applicability of user experience capability/maturity models in the development processes of free and open-source software: a systematic literature review KH Phesto Namayala, Tabu Kondo, Majuto Manyilizu Behaviour & Information Technology, 2022 | 7* | 2022 |
The Factors Affecting User Experience Maturity in Free and Open Source Software Community: An Empirical Study PP Namayala, TS Kondo, LJ Mselle International Journal of Human–Computer Interaction 40 (22), 7162-7178, 2024 | 6 | 2024 |
Artificial intelligence in Africa: a bibliometric analysis from 2013 to 2022 TS Kondo, SA Diwani Discover Artificial Intelligence 3 (1), 34, 2023 | 4 | 2023 |
Exploring the status of artificial intelligence for healthcare research in Africa: A bibliometric and thematic analysis TS Kondo, SA Diwani, AS Nyamawe, MM Mjahidi AI and Ethics, 1-22, 2023 | 4 | 2023 |
Personalisation of Moodle Learning Management System for Effective Teaching and Learning in Higher Learning Institutions: A Case of the State University of Zanzibar A Shaame, U El Nabahany, S Yunus, T Kondo, W Maro African Journal of Science Technology Innovation and Development, 2023 | 4 | 2023 |
Results on implementing personal learning environments in Tanzanian secondary schools LJ Mselle, TS Kondo 8th International Conference for Internet Technology and Secured …, 2013 | 4 | 2013 |
Application of fuzzy Delphi technique to identify analytical lenses for determining the preparation of free and open source software projects for user experience maturity PP Namayala, TS Kondo Science of Computer Programming, 2024 | 2 | 2024 |
Deploying computer-based learning under suboptimal conditions LJ Mselle, TS Kondo 2012 International Conference for Internet Technology and Secured …, 2012 | 2 | 2012 |
The impact of teaching computer programming in Tanzanian primary schools H Kilavo, TS Kondo, F Hassan Interactive Learning Environments 32 (3), 1159-1170, 2024 | 1 | 2024 |
Analyzing the institutionalization of free and open source software adoption in Tanzanian higher education institutions P Namayala, T Kondo, L Mselle Journal of ICT Systems 2 (1), 1-18, 2024 | 1 | 2024 |
Investigating the Efficiency of Secret Key Encryption Algorithms with similar key length and block size TS Kondo International Journal of Digital Information and Wireless Communications …, 2020 | 1 | 2020 |
An empirical study on E-learning adoption in Tanzanian secondary schools TS Kondo The University of Dodoma, 2016 | 1 | 2016 |
Against the" Hello World LJ Mselle, TS Kondo International Journal of Computer Applications 95 (26), 17-22, 2014 | 1 | 2014 |
Deploying technology-enhanced learning environments in Tanzanian secondary schools TS Kondo, LJ Mselle International Journal of Computer Applications 975, 8887, 2013 | 1 | 2013 |
Students’ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions A Shaame, T Kondo International Journal of Education and Development using ICT 20 (2), 2024 | | 2024 |
Assessment of Vulnerabilities in Student Records Web-Based Systems for Public and Private Higher Learning Institutions in Tanzania WG Masue, D Ngondya, TS Kondo Journal of ICT Systems 2 (2), 1-28, 2024 | | 2024 |
Quantifying Vulnerabilities: A Systematic Review of the State-of-the-Art Web-Based Systems WG Masue, D Ngondya, TS Kondo Journal of ICT Systems 2 (1), 72-86, 2024 | | 2024 |