|
Research:
Supervision
Completed Honours, MSc and PhD students
Note that some students might be
co-supervised by my colleagues. Student names are listed in reverse
chronological order according to completion date.
Honours students (by
mini-dissertation)
- NTULI, N.; 2010; "Using Wireless Sensor
Networks for Home Security Systems".
- MPEPO, M.; 2009; "Bridging the security gap
at nodes during secure communication".
- MOUTON, F.; 2008; "Securing Wireless Sensor
Networks".
- TOPACO, D.; 2007; "Trust in Radio Frequency
Identification".
- KOEN, R.; 2006; "Group Guard: Protecting
personal possessions in public places".
- RUNJI, M.L.; 2006; "The Application of a
Trusted Node for Logging in a Wireless Ad Hoc Network to Support Forensics".
- WOLMARANS, C.; 2006; "Implementing an
Electronic Voting Protocol to Ensure HIV/AIDS Patient Anonymity and Service
Provider Accountability".
- RUNJI, M.L.; 2005; "The application of a
Dedicated Observation Node in a wireless ad-hoc network to facilitate
forensics".
- TSHIVHASE, F.E.; 2005; "Implementing
Application and Network Security using Aspect-oriented Programming".
- CHAUKE, P.; 2005; “An Investigation into
Anti-Forensic Techniques”.
- MOKHONOANA, P.M.; 2005; “Audio Steganography”.
- VON ABO, R.; 2005; “Cyber Logging: Capturing
the Events of a Digital Investigation”.
- OYOMNO, W.; 2005; “Speech Fingerprinting in
Fixed-Phrase Speaker Verification System to deter Replay Attacks”.
- MCLEAN, M.; 2004; “A Comparative Overview of
Biometric Identification Techniques and the Applications in a Corporate
Environment”.
- ARTHUR, K.; 2004; "An Investigation into
Computer Forensic Tools".
- ELS, J.; 2004; "Developing a Computer
Forensic Tool".
- BEHINA, M.; 2004; “A Taxonomy for Intrusion
Detection Systems and Vulnerability Scanners”.
- PILLAI, M.; 2003; "State of the art in
Intrusion Detection Systems".
MIT students (by
mini-dissertation)
- VAN ARKEL, T.; 2011; "The identification and
protection of personal information in databases in order to comply with the
South African Protection of Personal Information Bill".
- DALA, P.; 2008; "The Market Value of the
Certified Information Systems Auditor (CISA), Certified Infromation Security
Manager (CISM) and Certified Information Security Practitioner (CISSP)
Certifications in the South African Job Marketplace".
- VAN ROOYEN, A.; 2008; "Implementation of
Information Security Management in South African Organisations".
- NARE, S.; 2007; "Security policy and IT
investments: An investigation into the Impact of their causality towards
overall security investment".
- VENTER, F.; 2007; "Preparing For Digital
Forensic Investigations".
- PEREIRA, C.F.E.; 2007; "A Holistic Approach
for the Implementation of an Information Security Program to Ensure Value
Creation and it’s Preservation within the Organisation".
- ANANIAS, K.; 2006; "Building a Dynamic and
Adaptive Security Awareness Information and Training Program: A Case Study
on Rwanda".
- KINANI, L.N.; 2006; "The Introduction and
Adoption of Secure Electronic Banking in a Developing Country (The Case of
Uganda)".
- MUHIZI, I.B.; 2006; "Evaluation of
Information Security Risks of Rwandan Parastatals: A Case of the Rwanda
Revenue Authority (RRA)".
- GROBLER, D.C.; 2003; “Towards an adaptive,
agent-based Web Services model for workflow automation in Enterprise
Application Integration”.
MSc students (by
dissertation)
- MOUTON, F.; 2011; "Digital Forensic
Readiness for Wireless Sensor Network Environments".
- ARTHUR, K.K.; 2010; "Concepts, Techniques,
and Challenges within Log Correlation".
- ROSSUDOWSKI, A.M.; 2008; "Smart Card
Architecture for Dynamic and Secure Authentication".
- WOJCIK, M.; 2007; "Evaluation criteria for
trust models with specific reference to prejudice filters".
- LI, Y.L.; 2007; "An Approach towards
Standardising Vulnerability Categories".
- ABDULLAH, H.; 2006; "A Risk Analysis and
Risk Management Methodology for Mitigating Wireless Local Area Networks (WLANs)
Intrusion Security Risks".
- FEI, B.K.L.; 2006; "Data Visualisation in
Digital Forensics".
PhD students (by
thesis)
- REDDY, K.; 2012; "On Digital Forensic
Readiness for Information Privacy Incidents".
|