The Department of Computer Science is established to offer various Degree, Diploma and Certificate Programs in the area of Computer science.
To be the Department of choice in the entire University for the provision of quality education, training and research for sustainable national and global development.
The mission of the Department of Computer Science is to generate, transmit and preserve high quality knowledge by promoting independent and interactive learning, a scientific inquiry culture and striving for diverse national and global development in pure and applied research in sciences and technology, while seeking to integrate these various perspectives.
The Department’s activities will be guided by the following core values:
a. Passion for excellence and devotion to duty
b. Integrity, transparency and accountability
c. Social fairness
f. Prudent utilization of resources
g. Corporate citizenship
h. Customer focus
a. Teaching and examining
b. Research and publication
c. Extension and outreach activities
d. Advisory and consultancy services
e. Promoting access to higher education and training
YEARS POSITION HELD
2013-Present Chairman of Department of Computer Science
2012-Present Lecturer, Computer Science and ICT
2009-2013 Co-ordinator Computer Science and ICT
2009-2012 Assistant Lecturer, Computer Science
RECENT SELECTED PUBLICATIONS
1 Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2017).Vulnerability Analysis of 802.11 Authentication and Encryption protocols: CVSS Based Approach. In: International Research Journal of Computer Science. [Online] Vol. 4(6),pp16-23. Available at: http://www.irjcs.com/.
2 Mwathi, D., Okelo-Odongo., W. and Opiyo. E. (2016). Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach. In:International Research Journal of Computer Science. [Online] Vol. 3(5), pp.47-52. Available at: http://www.irjcs.com/.
3 Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2016). Algorithm for Selection of EAP Authentication Method for Use In A Public WLAN. In: Journal of Emerging Trends in Computing and Information Sciences. [Online] Vol 7(6), pp.311-316. Available at: http://www.cisjournal.org/.
4 Benard, O., David, G.M.(2014). Implementing Security on virtualized network storage environment. International Journal of Education and Research.2(4)1-10 Online www.ijern.com
5 Nathan, M.,David ,G.(2013).School ICT Policy, a Factor Influencing Implementation of Computer Studies Curriculum in Secondary Schools. Journal of Education and Practice.4(28)197-202 Online www.iiste.org
6 Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2014). Wireless LAN (WLAN) hacking tools in developing countries. In: W.Okelo-Odongo, E. Opiyo, and E.Ayienga (Eds), Trends in distributed computing applications: Real life ongoing research work,pp 125-136.University of Nairobi: School of computing and informatics. ISBN 978-9966-074-13-3.
7 Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2014). ). Dangerous wireless local area network (WLAN) risks students & university employees need to know about. In: W.Okelo-Odongo, E. Opiyo, and E.Ayienga (Eds), Trends in distributed computing applications: Real life ongoing research work, pp. 76-84, University of Nairobi: School of computing and informatics. ISBN 978-9966-074-13-3.
8 Mwathi (2019). A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY . IJIRIS::International Journal of Innovative Research in Information Security, Volume VI, 20-28.
9 Mwathi (2019). WLAN SECURITY: A TRUSTED COMPUTING BASE APPROACH. IRJCS:: International Research Journal of Computer Science, Volume VI, 15-20. doi://10.26562/IRJCS.2019.JACS10084
1. Participated in developing a national research fund (NRF) infrastructure proposal that eventually won a research grant of about Kes 67 Million for GC-ICP-MS/MS equipment.
2. Attracted direct engineering support (DES) from KENET worth Kes 525,680 which helped in building ICT human capacity and optimization of our ICT network which improved access to internet and other network services offered to our students and staff.
1. Promotion of Basic, Technical and higher education in the community by participating in academic forums
2. Member of board of governors and board of management in TIVET institutions and secondary schools
1. Computer Networks Security
2. Networks and Distributed Computing
3. Database Systems and Data Mining technologies
4. Human Computer interfaces Design and evaluation
5. Technology adoption