Projects Based
Research Based

COP Project

Bhunu Shava, F., Gamundani, A.M., Chitauro, M., Nhamu, I.,Mikka, J.,Lloyd, S.,Phyffer,J.,Leoschut, L., & Burton, P. (2016).Voices of Children: An exploratory research study on knowledge, attitudes and practices of information and communication technology(ICT) use and online safety risks by children in Namibia. UNICEF.

Maoneke, P.B., Bhunu Shava, F., Gamundani, A.M., Bere-Chitauro, M & Nhamu, I (2018). ICTs Use and

Cyberspace Risks Faced by Adolescents in Namibia. In the proceedings of AfriCHI: The 2nd African Conference for Human Computer Interaction, Windhoek, Namibia, 3-7 December 2018.


Smart Parking Project

Muchinenyika, S.H., Gamundani, A.M. & Stanley C (2022). Conceptual Design of a Sensorless Smart Parking Payment Solution. 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).

Green Computing Project

Gamundani, A.M., & Muhonde, M.(2015). Assessing

sustainable ICT deployments under resource constrained environments. 2nd Chinhoyi University of

Technology International Research Conference, Chinhoyi–July 20-21 2015, ISSN: 2079-8997. Page 26.


Gamundani, A.M., Phillips, A., & MUYINGI, H.N. (2018).

Privacy Presevation and Security Dilemma:

Relationship proposition for IoT authentication. In

Proceedings of the International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE) (pp. 45). 27-28 July 2018, KIIT University, Bhubaneswar, India.

Gamundani, A. M., Phillips, A., & Muyingi, H.N., (2018). An Overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart Home Applications. In Proceedings of the 11th IEEE International Conference on Internet of Things(iThings-

2018) Halifax, Canada. Http://

Gamundani, A. M., Phillips, A., & Muyingi, H.N., (2018). A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards design

of an authentication architecture for smart home applications. Security and Privacy in Communication Networks, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018, R.Beyah et al (Eds): SecureComm 2018, LNICST 255, Springer, pp.375-390, 2018,

Gamundani, A.M. (2015). An impact review on Internet of Things attacks. International Conference on Emerging Trend in Networks and Computer communications (ETNCC), Windhoek, Country Club

Resort, Namibia, 17-20 May 2015. Page(s):114 – 118, ISBN: 978-1- 4799-7706-

2. jsp?arnumber=7184819

Gamundani, A.M., Chikohora, E. & Gamundani, N.Y.D (2018). Paradigms in the adoption of smart Technologies towards smart university learning spaces: An African context. In Proceedings of

UbuntuNet-Connect. 22-23 November, Hotel verde, Zanzibar, Tanzania.

Gamundani, A. M., & Nekare, L. M. (2018). A Review of New Trends in Cyber Attacks: A Zoom into Distributed Database Systems. In IST-Africa 2018 Conference Proceedings (pp. 1–9). Gaborone: IIMC International Information Management Corporation,


Gamundani, A. M., & Kandjii, D. O. (2016, March). A Review of Cloud Computing Capabilities Towards Building Virtual Learning Centres. In Proceedings of

the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 99). ACM.

Gamundani, A.M. & Kandjii, D.O. Assessing the potential of Cloud Computing deployment for extending Higher

Education provisioning in Namibia (2014). Southern African Society for Education Conference, to be held in Swakopmund, Namibia from 07 - 09 October 2014.

Gamundani, A.M. (2014).An algorithmic Framework security model for Internet of Things. International Journal of Computer Trends and Technology (IJCTT), 12(1), 16-20. doi:10.14445/22312803/IJCTT-

V12P105. ISSN: 2231-2803.

Gamundani, A.M., Bhunu-Shava F., & Bere M., (2019).

A digital economy technology integration model

incorporating the cyber security layer. 14th

International Conference on Cyber Warfare and

Security, ICCWS 2019, pp.65-77

Sibanda, B. K., Iyawa, G. E., & Gamundani, A. M.

(2021). Systematic Review of Plant Pest and Disease Identification Strategies and Techniques in Mobile Apps. In Trends and Applications in Information Systems and Technologies: Volume 2 9 (pp. 491-502). Springer International Publishing.

Makuvaza, A., Singh, D., & Attlee, G. (2021). Deep Neural Network ( DNN ) Solution for Real ‐ time Detection of Distributed Denial of Service ( DDoS ) Attacks in Software Defined Networks ( SDNs ). SN Computer Science, 1–10. 021-00467-1

Gamundani, A.M., Kanyangela, M., & Chitauro, S.(2015). A preliminary assessment of cloud computing E-learning solutions in Namibia. Journal of Multidisciplinary Engineering Science and Technology (JMEST), ISSN: 3159-0040, Vol. 2, Issue 8, August - 2015, Page 1988 - 1993.

Gamundani, A.M., Bhunu-Shava, F., Bere, M., & Kandjimi, H. (2015). A preliminary survey on child online protection initiatives: A focus on Namibia. International Research Journal of Computer Science (IRJCS). ISSN: 2393-9842 Issue 4, Volume

2(April2015). Page 17-22.

Gamundani, A.M., Rupere, T., & Nyambo, B.M. (2013). “A cloud computing architecture for e-learning platform, supporting multimedia content,” (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 11, No.3, March 2013

Kays, R., & Gamundani, A.M. (2020). Policy

implications on ICT integration in Namibian basic education ecosystem. In proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications (pp. 1-7)

Frequently Asked Questions

What is AIoT?

The nexus between Internet of Things (IoT) and Artificial Intelligence formulates the AIoT focus area. When IoT are enabled with AI capabilities, they become inherently intelligent during their operations and interactions, that brings about the unsupervised nature of IoT devices.

Why the focus on Cybersecurity when looking at IoT and AI?

IoT devices increased the capability of connectivity to everyday objects as such the attack surface has been multiplied. It is important that attention is paid to cybersecurity for AI and IoT applications across any domain as they have a two edged sword component on data. Yes there are benefit to reap, but so too are the security concerns that comes with these technologies.

Where does ICT4D fit in?

Information Communication and Technologies for Development (ICT4D) have been generalised in many discussions and loosely applied a terminology in several contexts. ICT4D ensures we focus our application of ICTs to address tangible challenges with a focus on the communities that we are targeting. If not carefully considered ICTs can be the catalyst for extending the digital divide instead of bridging it, they can be the amplifiers of systemic biases instead of curbing them. The main message behind ICT4D is therefore, lets develop solutions with the respective communities and not for them. Personally I will consider proper ICT4D the bedrock of sustainability.

Does application domain matter?

It is important to have a contextual approach when looking at AI and IoT as each domain demands different security requirements, data privacy and governance nuances. Henceforth, the domain of application should be well understood, defined and holistically considered for effective, secure and efficient solutions. At the backdrop of such requirements will be informed and detailed research to aid the decision making processes.