Research: Supervision

Completed Honours, MSc and PhD students

Note that some students might be co-supervised by my colleagues. Student names are listed in reverse chronological order according to completion date.

Honours students (by mini-dissertation)

  • NTULI, N.; 2010; "Using Wireless Sensor Networks for Home Security Systems".
  • MPEPO, M.; 2009; "Bridging the security gap at nodes during secure communication".
  • MOUTON, F.; 2008; "Securing Wireless Sensor Networks".
  • TOPACO, D.; 2007; "Trust in Radio Frequency Identification".
  • KOEN, R.; 2006; "Group Guard: Protecting personal possessions in public places".
  • RUNJI, M.L.; 2006; "The Application of a Trusted Node for Logging in a Wireless Ad Hoc Network to Support Forensics".
  • WOLMARANS, C.; 2006; "Implementing an Electronic Voting Protocol to Ensure HIV/AIDS Patient Anonymity and Service Provider Accountability".
  • RUNJI, M.L.; 2005; "The application of a Dedicated Observation Node in a wireless ad-hoc network to facilitate forensics".
  • TSHIVHASE, F.E.; 2005; "Implementing Application and Network Security using Aspect-oriented Programming".
  • CHAUKE, P.; 2005; “An Investigation into Anti-Forensic Techniques”.
  • MOKHONOANA, P.M.; 2005; “Audio Steganography”.
  • VON ABO, R.; 2005; “Cyber Logging: Capturing the Events of a Digital Investigation”.
  • OYOMNO, W.; 2005; “Speech Fingerprinting in Fixed-Phrase Speaker Verification System to deter Replay Attacks”.
  • MCLEAN, M.; 2004; “A Comparative Overview of Biometric Identification Techniques and the Applications in a Corporate Environment”.
  • ARTHUR, K.; 2004; "An Investigation into Computer Forensic Tools".
  • ELS, J.; 2004; "Developing a Computer Forensic Tool".
  • BEHINA, M.; 2004; “A Taxonomy for Intrusion Detection Systems and Vulnerability Scanners”.
  • PILLAI, M.; 2003; "State of the art in Intrusion Detection Systems".

MIT students (by mini-dissertation)

  • VAN ARKEL, T.; 2011; "The identification and protection of personal information in databases in order to comply with the South African Protection of Personal Information Bill".
  • DALA, P.; 2008; "The Market Value of the Certified Information Systems Auditor (CISA), Certified Infromation Security Manager (CISM) and Certified Information Security Practitioner (CISSP) Certifications in the South African Job Marketplace".
  • VAN ROOYEN, A.; 2008; "Implementation of Information Security Management in South African Organisations".
  • NARE, S.; 2007; "Security policy and IT investments: An investigation into the Impact of their causality towards overall security investment".
  • VENTER, F.; 2007; "Preparing For Digital Forensic Investigations".
  • PEREIRA, C.F.E.; 2007; "A Holistic Approach for the Implementation of an Information Security Program to Ensure Value Creation and it’s Preservation within the Organisation".
  • ANANIAS, K.; 2006; "Building a Dynamic and Adaptive Security Awareness Information and Training Program: A Case Study on Rwanda".
  • KINANI, L.N.; 2006; "The Introduction and Adoption of Secure Electronic Banking in a Developing Country (The Case of Uganda)".
  • MUHIZI, I.B.; 2006; "Evaluation of Information Security Risks of Rwandan Parastatals: A Case of the Rwanda Revenue Authority (RRA)".
  • GROBLER, D.C.; 2003; “Towards an adaptive, agent-based Web Services model for workflow automation in Enterprise Application Integration”.

MSc students (by dissertation)

  • MOUTON, F.; 2011; "Digital Forensic Readiness for Wireless Sensor Network Environments".
  • ARTHUR, K.K.; 2010; "Concepts, Techniques, and Challenges within Log Correlation".
  • ROSSUDOWSKI, A.M.; 2008; "Smart Card Architecture for Dynamic and Secure Authentication".
  • WOJCIK, M.; 2007; "Evaluation criteria for trust models with specific reference to prejudice filters".
  • LI, Y.L.; 2007; "An Approach towards Standardising Vulnerability Categories".
  • ABDULLAH, H.; 2006; "A Risk Analysis and Risk Management Methodology for Mitigating Wireless Local Area Networks (WLANs) Intrusion Security Risks".
  • FEI, B.K.L.; 2006; "Data Visualisation in Digital Forensics".

PhD students (by thesis)

  • REDDY, K.; 2012; "On Digital Forensic Readiness for Information Privacy Incidents".

 

 

 

   
 
 

Maintained by Hein Venter
Last updated on 2012/01/24 11:21:58 AM