Browser unable to execute script; please use the site map to navigate the site.
Current Postgraduate Students
Doctoral Students
W Hauger (Topic: Forged PDF document examination)
Masters Students (by dissertation)
Richard McFadden (Topic: Document examination using grammars)
Completed Postgraduate Students
Doctoral (Thesis-based)
H Pieterse, PhD, UP, September 2019, Evaluation and Identification of Authentic Smartphone Data
OM Adedayo, PhD, UP, April 2015, Reconstruction in Database Forensics
WJC van Staden, PhD, UP, September 2011, A Model for Compound Purposes and Reasons as Privacy Enhancing Technology in a Relational Database
NJ Croft, PhD, UP, September 2011, On Privacy in Mobile Voice Communication Networks
W Brandi, PhD, UP, September 2011, In Search of Search Privacy
MP Zielinski, PhD, UP, April 2010, On the use of Economic Price Theory to Determine the Optimum Levels of Privacy and Information Utility in Microdata Anonymisation
F-A Lategan, PhD, RAU, September 2002, Enforcing Privacy on the Internet
LCJ Dreyer, PhD, RAU, September 1999, The InfoPriv Model for Information Privacy
CW Rensleigh, DCom, RAU, March 1999, Consultation for Small-Business Computerisation
Masters graduates (Dissertation-based)
W Hauger, MSc, UP, September 2019, Forensic Attribution Challenges During Forensic Examinations of Databases
OO Oyelami, MSc, UP, April 2019, Case Study Research as a Method for Digital Forensic Evidence Examinations
DJJ Kotze, MSc, UP, September 2015, XML Accounting Trail: A model for introducing digital forensic readiness to XML Accounting and XBRL
M-A Fouché, MSc, UP, April 2015, Using depth information to aid stereoscopic image forensics
AS Rakitianskaia, MSc, UP, April 2015, Digital Forensics in Second Life (Co-supervised by Dr AK Cooper)
H Pieterse, MSc, UP, September 2014, Design of a Hybrid Command and Control Mobile Botnet
W Delport, MSc, UP, April 2014, Forensic Evidence Isolation in Clouds
P De Souza, MSc, UP, April 2014, A Chain of Findings for Digital Investigations
HQ Beyers, MEng, UP, April 2014, Database Forensics: Investigating Compromised Database Management Systems (Co-supervisor, supervisor: Prof GP Hancke)
KK Arthur, MSc, UP, September 2010, Considerations towards the Development of a Forensic Evidence Management System
T Neumann, MSc, UP, April 2010, Privacy in Voice-over-IP - Mitigating the Risks at SIP Intermediaries
R Koen, MSc, UP, April 2009, The Development of an Open-source Forensics Platform
JP Delport, MSc, UP, April 2008, Link Layer Topology Discovery in an Uncooperative Ethernet Environment
MA Bihina Bella, MSc, UP, September 2007, A Fraud Management Architecture for Next Generation Networks (Co-supervisor; supervisor: Prof JHP Eloff)
HM Tillwick, MSc, UP, April 2007, Polar: Proxies Collaborating to Achieve Anonymous Web Browsing
M Breedt, MSc, UP, September 2006, Integrating Biometric Authentication into Multiple Applications
ML Slaviero, MSc, UP, April 2005, Secure and Distributed Multicast Address Allocation on IPv6 Networks
NJ Croft, MSc, UP, September 2004, Secure Interoperation of Wireless Networks
WJC van Staden, MSc, RAU, March 2004, The use of a Virtual Machine for Access Control in a Relational Database Management System
K Venter, MSc, RAU, September 2003, A Model for the Dynamic Delegation of Authorization Rights in a Secure Workflow Management System
A Pedroncelli, MSc, RAU, March 2003, Secure Multimedia Databases
G Watt, MSc, RAU, March 2003, A Model for the Secure Management of Supply Chains
W Brandi, MSc, RAU, March 2002, Extensions to the Self Protecting Object Model to Facilitate Integrity in Stationary and Mobile Hosts
HJG Oberholzer, MSc, RAU, September 2001, A Privacy Protection Model to Support Personal Privacy in Relational Databases
A Hardy, MSc, RAU, March 2000, An Implementation and Analysis of the Configurable Security Architecture
PM Boshoff, MSc, RAU, September 1998, Securing Host and Application Information in the TCP/IP Protocol Suite
JS von Solms, MSc, RAU, March 1998, MOFAC: A Model for Fine-Grained Access Control in IT Systems (Co-supervised by Prof SH von Solms)
LCJ Dreyer, MSc, RAU, March 1997, An Infrastructure for Secure Distributed Object-oriented Databases
J van der Merwe, MSc, RAU, March 1996, Objek-georiënteerde en Rolgebaseerde Verspreide Inligtingsekerheid in 'n Oop Transaksieverwerking Omgewing (Co-supervisor, supervisor: Prof SH von Solms)
PW Jansen van Rensburg, MSc, RAU, September 1995, Diskresionêre Sekerheid in Objek Georiënteerde Omgewings
C Kyriakides, MSc, RAU, September 1994, Object-oriented Parallel Paradigms
CW Rensleigh, MCom, RAU, March 1993, Veilige Identifikasietegnieke vir Gebruikers van Rekenaarstelsels
By mini-dissertations following coursework
N Makanya, MIT, UP, September 2015, A Model for Privacy Protection in ERP Systems
M Seedat, MIT, UP, April 2013, Centralized Authentication in Distributed Computing Environments (DCE) using Lightweight Directory Access Protocol (LDAP)
N Wakaba, MIT, UP, September 2012, An Exploratory Investigation on the use of Folksonomies to Improve Link Analysis-based Ranking (Co-supervisor; supervisor: Prof I Fourie)
PJ Helberg, MIT, UP, April 2011, Consistency Analysis of Email
T Bannatyne, MIT, UP, April 2011, Factors that could be used in Forensic Investigations for Identity Matching across and using Social Networks
HG Hlomane, MIT, UP, April 2010, Mobile Communication: The Impact and Challenges of Mobile Communication on the Socio-economic Status and Empowerment of Developing Communities (Co-supervisor: Ms E Venter)
M du Plessis, MIT, UP, September 2009, An Evaluation of Extremist Websites According to Internet User Online Activities (Co-supervisor; supervisor: Prof JJ Britz)
NS Medina Meza, MIT, UP, April 2009, A Model for Direct Recording Electronic Voting Systems
K Scott, MIT, UP, April 2008, An Early Warning System for Phishing Emails and Websites
SL Venter, MIT, UP, September 2006, Facets of Ethics in Proactive Computing (Co-supervisor: Prof JJ Britz)
SH Shongwe, MIT, UP, September 2006, Security Challenges Facing Wireless LAN (WLAN) Public Hotspots
TM Nkwane, MIT, UP, April 2006, Cyber Security of the Power Utilities in South Africa
HN Olinger, MIT, UP, April 2005, Western Privacy and Ubuntu - Influences in the Forthcoming Data Privacy Bill (Co-supervisor; supervisor: Prof JJ Britz)
MMS Bapela, MIT, UP, April 2004, Using mobile Intelligent agents to manage software piracy
RC Joubert, MIT, UP, April 2004, Utilizing Idle time of Linux workstations as a Massively Parallel Supercomputer
AM Maakal, MIT, UP, April 2004, A Cost-effective and Highly available Process Control Network Infrastructure for an Industrial Plant Environment with a Remote Data Centre