Fredrick Mtenzi

Associate Professor

Calculated based on number of publications stored in Pure and citations from Scopus
20032024

Research activity per year

Filter
Conference contribution

Search results

  • 2017

    A software development process for freshman undergraduate students

    Higgins, C., Mtenzi, F., O’Leary, C., Hanratty, O. & McAvinia, C., 2017, Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing - 11th IFIP TC 3 World Conference on Computers in Education, WCCE 2017, Revised Selected Papers. Webb, M. & Tatnall, A. (eds.). Springer New York LLC, p. 599-608 10 p. (IFIP Advances in Information and Communication Technology; vol. 515).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • KiCM: A knowledge-intensive context model

    Lupiana, D. & Mtenzi, F., 14 Feb 2017, 2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016. Institute of Electrical and Electronics Engineers Inc., p. 223-229 7 p. 7856701. (2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Predicting software vulnerability using security discussion in social media

    Queiroz, A., Keegan, B. & Mtenzi, F., 2017, Proceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017. Scanlon, M. & Le-Khac, N-A. (eds.). Curran Associates Inc., p. 628-634 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Citations (Scopus)
  • 2016

    Towards reusable personas for everyday design

    O'Leary, C., Mtenzi, F. & McAvinia, C., 7 May 2016, CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 2915-2922 8 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 07-12-May-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Citations (Scopus)
  • 2014

    Characterisation of knowledge incorporation into solution models for the meal planning problem

    Zanamwe, N., Dube, K., Thomson, J. S., Mtenzi, F. J. & Hapanyengwi, G. T., 2014, Foundations of Health Information Engineering and Systems - 3rd International Symposium, FHIES 2013, Revised Selected Papers. Gibbons, J. & MacCaull, W. (eds.). Springer Verlag, p. 254-273 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8315).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Model for analysing Anti-Phishing Authentication Ceremonies

    Hatunic-Webster, E., Mtenzi, F. & O'Shea, B., 2014, 2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014. Institute of Electrical and Electronics Engineers Inc., p. 144-150 7 p. 7038795. (2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2013

    Adoption and diffusion of open source software in Tanzania: A way forward

    Oreku, G. S. & Mtenzi, F. J., 2013, 2013 IST-Africa Conference and Exhibition, IST-Africa 2013. IEEE Computer Society, 6701748. (2013 IST-Africa Conference and Exhibition, IST-Africa 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Energy overhead of the graphical user interface in server operating systems

    Brotherton, H., McGrory, J., Dietz, J. E. & Mtenzi, F., 2013, SIGUCCS 2013 - Proceedings of the ACM Annual Conference on Special Interest Group on University and College Computing Services. p. 65-68 4 p. (Proceedings ACM SIGUCCS User Services Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Black hat training of white hat resources: The future of security is gaming

    Flood, J., Denihan, M., Keane, A. & Mtenzi, F., 2012, 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012. p. 488-491 4 p. 6470856. (2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Significantly reducing the processing times of high speed photometry data sets using a distributed computing model

    Doyle, P., Mtenzi, F., Smith, N., Collins, A. & O'Shea, B., 2012, Software and Cyberinfrastructure for Astronomy II. 84510C. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8451).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2010

    Accessing sensitive patient information in ubiquitous healthcare systems

    Omary, Z., Mtenzi, F., Wu, B. & O'Driscoll, C., 2010, 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. 5678051. (2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • A secured mobile payment model for developing markets

    Masamila, B., Mtenzi, F., Said, J. & Tinabo, R., 2010, Networked Digital Technologies - Second International Conference, NDT 2010, Proceedings. PART 1 ed. p. 175-182 8 p. (Communications in Computer and Information Science; vol. 87 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Citations (Scopus)
  • Defending privacy: The development and deployment of a darknet

    Mc Manamon, C. & Mtenzi, F., 2010, 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. 5678544. (2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Privacy metrics in ubiquitous computing applications

    Jafari, S., Mtenzi, F., O'Driscoll, C., Fitzpatrick, R. & O'Shea, B., 2010, 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. 5678048. (2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Strictly alphanumeric data: Improving privacy in smart environments

    Lupiana, D., Mtenzi, F., O'Driscoll, C. & O'Shea, B., 2010, 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. 5678045. (2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    An approach for developing comparative security metrics for healthcare organizations

    Jafari, S., Mtenzi, F., Fitzpatrick, R. & O'Shea, B., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. IEEE Computer Society, 5402504. (International Conference for Internet Technology and Secured Transactions, ICITST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Anonymisation vs. pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data

    Tinabo, R., Mtenzi, F. & O'Shea, B., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. IEEE Computer Society, 5402501. (International Conference for Internet Technology and Secured Transactions, ICITST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Challenges to e-healthcare adoption in developing countries: A case study of Tanzania

    Omary, Z., Lupiana, D., Mtenzi, F. & Wu, B., 2009, 2009 1st International Conference on Networked Digital Technologies, NDT 2009. p. 201-209 9 p. 5272067. (2009 1st International Conference on Networked Digital Technologies, NDT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Citations (Scopus)
  • Dataset threshold for the performance estimators in supervised machine learning experiments

    Omary, Z. & Mtenzi, F., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. IEEE Computer Society, 5402500. (International Conference for Internet Technology and Secured Transactions, ICITST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Citations (Scopus)
  • Developing a security framework for VoIP service in IP-based and cellular inter-network environment

    Masamila, B. & Mtenzi, F., 2009, 2009 1st International Conference on Networked Digital Technologies, NDT 2009. p. 280-285 6 p. 5272066. (2009 1st International Conference on Networked Digital Technologies, NDT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • How does politics affect electronic healthcare adoption

    Omary, Z., Mtenzi, F. & Wu, B., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. 5402502. (International Conference for Internet Technology and Secured Transactions, ICITST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Intrusion detection based on data mining

    Oreku, G. S. & Mtenzi, F. J., 2009, 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009. p. 696-701 6 p. 5380620. (8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Investigation and development of a security and forensic analysis teaching environment

    Gleeson, M., Markey, D. & Mtenzi, F., 2009, 2009 1st International Conference on Networked Digital Technologies, NDT 2009. p. 373-378 6 p. 5272139. (2009 1st International Conference on Networked Digital Technologies, NDT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Solving the problem of balancing data usefulness and protection of personal identifiable information using multiple anonymisation techniques

    Tinabo, R., Mtenzi, F., O'Driscoll, C. & O'Shea, B., 2009, 2009 1st International Conference on Networked Digital Technologies, NDT 2009. p. 37-42 6 p. 5272065. (2009 1st International Conference on Networked Digital Technologies, NDT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Taxonomy for ubiquitous computing environments

    Lupiana, D., O'Driscoll, C. & Mtenzi, F., 2009, 2009 1st International Conference on Networked Digital Technologies, NDT 2009. p. 469-475 7 p. 5272068. (2009 1st International Conference on Networked Digital Technologies, NDT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Citations (Scopus)
  • Using nature to best clarify computer security and threats

    Oreku, G. S. & Mtenzi, F. J., 2009, 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009. p. 702-707 6 p. 5380617. (8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2008

    RFID: An ideal technology for ubiquitous computing?

    O'Driscoll, C., MacCormac, D., Deegan, M., Mtenzi, F. & O'Shea, B., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 490-504 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Citations (Scopus)
  • 2007

    A thin client approach to supporting adaptive session mobility

    MacCormac, D., Deegan, M., Mtenzi, F. & O'Shea, B., 2007, Advances in Grid and Pervasive Computing - Second International Conference, GPC 2007, Proceedings. Springer Verlag, p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4459 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Feasibility study for eCommerce and ICT diffusion-adoption in EAC

    Oreku, G. S., Li, J. & Mtenzi, F. J., 2007, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1297-1302 6 p. 4392217. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Implementation of a system to support mobile computing sessions

    MacCormac, D., Deegan, M., Mtenzi, F. & Brendan, 2007, 2007 2nd International Conference on Pervasive Computing and Applications, ICPCA'07. p. 521-526 6 p. 4365499. (2007 2nd International Conference on Pervasive Computing and Applications, ICPCA'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Towards local resource redirection across thin client protocols

    MacCormac, D., Mtenzi, F., Deegan, M., O'Shea, B. & Shoniregun, C., 2007, 2007 2nd International Conference on Digital Information Management, ICDIM. IEEE Computer Society, p. 165-172 8 p. 4444218. (2007 2nd International Conference on Digital Information Management, ICDIM; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2006

    3D alignment in the adaptive software engineering curriculum

    O'Leary, C., Lawless, D., Gordon, D., Carroll, D., Mtenzi, F. & Collins, M., 2006, 36th ASEE/IEEE Frontiers in Education Conference, FIE. 4116837. (Proceedings - Frontiers in Education Conference, FIE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • An optimised implementation of the A∗ algorithm using the STL

    Duggan, B. & Mtenzi, F., 2006, Proceedings of CGAMES 2006 - 8th International Conference on Computer Games: Artificial Intelligence and Mobile Systems. Mehdi, Q. & Elmaghraby, A. (eds.). University of Wolverhampton, p. 86-90 5 p. (Proceedings of CGAMES 2006 - 8th International Conference on Computer Games: Artificial Intelligence and Mobile Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2003

    An Energy Efficient Routing Algorithm With Priority for Mobile Ad Hoc Networks(PDSR)

    Wei, X., Mtenzi, F., Wu, B. & Wan, Y., 2003, Proceedings of the third IASTED International Conference on Wireless and Optical Communications. Hesselink, L. (ed.). p. 628-632 5 p. (Proceedings of the IASTED International Conference on Wireless and Optical Communications; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)