info@chuka.ac.ke | 020 231 0512/ 020 231 0518
info@chuka.ac.ke | 020 231 0512/ 020 231 0518

DR. DAVID GITONGA MWATHI

DR. DAVID GITONGA MWATHI

 Lecturer

Chairman Department of Computer Science

Faculty of Science, Engineering and Technology
Department of Computer Science 

Biography

Teaching

Outputs

Research/PhD

FIELD OF SPECIALIZATION
Computer Science
COMMUNITY SERVICE
1. Promotion of basic, technical and higher education in the community by participating in academic forums
2. Member, board of governors and board of management in TIVET institutions and secondary schools.
WORK EXPERIENCE
2013-Present: Chairman, Department of Computer Science
2012-Present: Lecturer, Computer Science
2009-2012: Assistant Lecturer, Computer Science
EDUCATION
1. Ph.D. in Computer Science
2. MSc (IT) Systems Security and Audit
3. B.Sc. in Computer Science and Engineering

2012-Present: Lecturer, Computer Science
2009-2012: Assistant Lecturer, Computer Science

SCHOLALRLY PUBLICATIONS
1. Mwathi, D., Okelo-Odongo., W. and Opiyo, E. (2017).Vulnerability Analysis of 802.11 Authentication and Encryption protocols: CVSS Based Approach. In: International Research Journal of Computer Science. [Online] Vol. 4(6), pp16-23. Available at: http://www.irjcs.com/.
2. Mwathi, D., Okelo-Odongo., W. and Opiyo. E. (2016). Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach. In: International Research Journal of Computer Science. [Online] Vol. 3(5), pp.47 52. Available at: http://www.irjcs.com/.
3. Mwathi, D., Okelo-Odongo., W. and Opiyo, E. (2016). Algorithm for Selection of EAP Authentication Method for Use in a Public WLAN. In: Journal of Emerging Trends in Computing and Information Sciences. [Online] Vol 7(6), pp.311-316. Available at: http://www.cisjournal.org/.
4. Benard, O., David, G.M. (2014). Implementing Security on virtualized network storage environment. International Journal of Education and Research 2(4)1-10 Online www.ijern.com
5. Nathan, M., David G. (2013). School ICT policy, a factor influencing implementation of computer studies curriculum in secondary schools. J. Education and Practice 4(28)197-202 Online www.iiste.org
6. Mwathi, D., Okelo-Odongo., W. and Opiyo, E. (2014). Wireless LAN hacking tools in developing countries. In: W.Okelo-Odongo, E. Opiyo, and E.Ayienga (Eds), Trends in distributed computing applications: Real life ongoing research work, p. 125-136. University of Nairobi: School of Computing and Informatics. ISBN 978-9966-074-13-3.
7. Mwathi, D., Okelo-Odongo., W. and Opiyo, E. (2014). ). Dangerous wireless local area network (WLAN) risks students & university employees need to know about. In: W.Okelo-Odongo, E. Opiyo, and E.Ayienga (Eds), Trends in distributed computing applications: Real life ongoing research work, pp. 76-84, University of Nairobi: School of computing and informatics. ISBN 978-9966-074-13-3.
8. Mwathi (2019). A model based approach for implementing WLAN security. International Journal of Innovative Research in Information Security, Vol 6, 20-28. doi://10.26562/IJIRIS.2019.JAIS10082
9. Mwathi (2019). WLAN security: A trusted computing base approach: International Research Journal of Computer Science, Volume 6:15-20. doi://10.26562/IRJCS.2019.JACS10084

RESEARCH INTERESTS/ACTIVITIES
Computer Networks Security, Networks and Distributed Computing, Database Systems and Data Mining technologies, Human Computer interfaces Design and evaluation, Technology adoption

Skip to content