• compsciictofficeschukauniversity.jpg
  • computerlab3.jpg
  • computerscience.jpg
  • internscomputer.jpg

Dr. David G. Mwathi

Lecturer/COD Computer Science

Publications

  1. Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2017).Vulnerability Analysis of 802.11 Authentication and Encryption protocols: CVSS Based Approach. In: International Research Journal of Computer Science. [Online] Vol. 4(6),pp16-23. Available at: http://www.irjcs.com/.
  2. Mwathi, D., Okelo-Odongo., W. and Opiyo. E. (2016). Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach. In: International Research Journal of Computer Science. [Online] Vol. 3(5), pp.47-52. Available at: http://www.irjcs.com/.
  3. Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2016). Algorithm for Selection of EAP Authentication Method for Use In A Public WLAN. In: Journal of Emerging Trends in Computing and Information Sciences. [Online] Vol 7(6), pp.311-316. Available at: http://www.cisjournal.org/.
  4. Benard, O., David, G.M.(2014). Implementing Security on virtualized network storage environment. International Journal of Education and Research.2(4)1-10 Online www.ijern.com
  5. Nathan, M.,David ,G.(2013).School ICT Policy, a Factor Influencing Implementation of Computer Studies Curriculum in Secondary Schools. Journal of Education and Practice.4(28)197-202 Onlinewww.iiste.org
  6. Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2014). Wireless LAN (WLAN) hacking tools in developing countries. In: W.Okelo-Odongo, E. Opiyo, and E.Ayienga (Eds), Trends in distributed computing applications: Real life ongoing research work, pp 125-136.University of  Nairobi: School of computing and informatics. ISBN 978-9966-074-13-3.
  7. Mwathi, D., Okelo-Odongo., W. and Opiyo., E. (2014). ). Dangerous wireless local area network (WLAN) risks students & university employees need to know about. In: W.Okelo-Odongo, E. Opiyo, and E.Ayienga (Eds), Trends in distributed computing applications: Real life ongoing research work, pp. 76-84, University of Nairobi: School of computing and informatics. ISBN 978-9966-074-13-3.
  8. Mwathi (2019). A MODEL-BASED APPROACH FOR IMPLEMENTING WLAN SECURITY. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI, 20-28. doi://10.26562/IJIRIS.2019.JAIS10082
  9. Mwathi (2019). WLAN SECURITY: A TRUSTED COMPUTING BASE APPROACH. IRJCS:: International Research Journal of Computer Science, Volume VI, 15-20. doi://10.26562/IRJCS.2019.JACS10084

Please publish modules in offcanvas position.