Conference Publications

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 20 of 5983
  • Item
    A web scraping approach towards cryptocurrency investigations
    (2025-06) Mawhayi, B; Botha, Johannes G; Leenen, L
    The investigation of cryptocurrency crimes is still in its infancy with no standardised process or methodology to follow. This paper describes research that forms part of a broader project led by the second author (Botha, et al., 2025). The broader project’s aim is to develop a methodology to follow when conducting cryptocurrency crime investigations. One of the steps in the proposed methodology is web scraping. The authors of this paper present a detailed exploration of web scraping techniques within the broader context of the proposed investigation methodology. In this paper, the focus is on developing a well-structured methodology for scraping social media platforms and online forums to gather data related to fraudulent activities; the goal is to find posts that include references to the wallet address of interest. This exploration uses an iterative approach; for every new cryptocurrency wallet address discovered or revealed through on-chain analysis, a parallel path is followed by scraping the Internet. If a mention of the cryptocurrency address should be discovered it is considered to be a key finding, creating a pivot point in the investigation. From a pivot point, further open-source intelligence (OSINT) techniques will be applied, though this aspect falls beyond the scope of this paper. If no relevant information or link is found, the scraping path will not be pursued, and the investigation proceeds with on-chain analysis to identify additional wallet addresses. Additionally, challenges encountered in web scraping, such as handling platform restrictions, ensuring data accuracy, and managing large volumes of data, are addressed. The goal of the proposed methodology is to enhance data extraction and analysis efficiency contributing to the proposed methodology for investigating cryptocurrency scams.
  • Item
    Enhancing digital wallet security: A systematic comparison of passwordless and risk-based authentication approaches
    (2025-12) Mthethwa, Sthembile N; Ndhlovu, Nomalisa; Myaka, Zanele S; Ntshangase, Sthembile N; Shadung, Lesiba D; Singano, Zothile
    The dynamic nature of the digital landscape necessitates robust security measures for the use of digital wallets, with authentication being pivotal in ensuring both user safety and system integrity. Traditionally, password-based authentication has been the predominant method employed. However, it is also the primary target for cyber attackers, with numerous successful breaches resulting from compromised credentials. Despite the availability of alternative methods, passwords continue to be the preferred choice. This paper examines various authentication techniques—such as passwordless, behavioral, continuous, and adaptive authentication—emphasizing their respective advantages and disadvantages. Additionally, it discusses the challenges associated with the implementation of these methods and outlines key considerations for organisations prior to adoption. Specifically for digital wallets, passwordless and risk-based authentication methods are identified as the most appropriate. Future research will focus on testing and comparing the effectiveness of these two methods by simulating attacks to determine which provides greater security.
  • Item
    Evaluation of guidance, navigation, and control algorithms for hydrogen-powered multi-aircraft systems
    (2025-09) Makhubo, Mamokete; Ndebele, Bright B; Ragimana, Phumudzo
    This paper presents a modular digital-twin framework to compare inner-loop attitude controllers: geometric PD (“PID”), discrete Linear-Quadratic Regulator (LQR), and a movepenalized linear Model Predictive Controller (MPC), for a heavy-lift T30-class quadcopter intended for hydrogen propulsion study. The twin couples 6-DoF rigid-body dynamics, actuator mixing, motor/ESC lag, a bus-level electrical model, and stochastic wind (OrnsteinUhlenbeck) with look-ahead guidance on a sharp lawnmower survey. To isolate controller effects, task difficulty is equalized by autotuning a single scalar so that the achieved cross-track Root-Mean-Squared Error (RMSE) lies in a 2.6 ± 0.25 m band. The tuned controllers then run identical 600 s simulations under the same wind seed and retimed speeds. On the equalized run, PID and LQR achieve 2.45 m and 2.55 m RMSE, respectively, while MPC settles at 3.13 m due to its move penalty and finite horizon. All three deliver survey-class performance with mean bus power ≈ 4.8 kW and peaks in the 7–8 kW range, but MPC reduces energy per meter by approximately 2.3% at the cost of relaxed lateral accuracy. A 10-seed Monte Carlo confirms this trade: PID/LQR remain in-band for 90%/80% of seeds, while MPC consistently lowers energy per meter with similar mean power but gentler peaks. For hydrogen-electric UAVs, these metrics map directly to propulsion co-design, where energy per meter informs hydrogen mass and range, peak power sets stack/buffer sizing, and actuator smoothness affects balanceof-plant transients. The results show that controller selection is not only a matter of tracking accuracy but also an energy-management lever: PID/LQR suit survey tolerance, while MPCstyle penalization favours endurance and balance-of-plant stability.
  • Item
    Top crypto scams in 2022-2024: Analysing trends, tactics, and regulatory responses
    (2025-05) Botha, Johannes G; Luoma-Aho, V , V Leenen; Leenen, L
    The digital society has proven to be vulnerable in different ways, and many of these vulnerabilities manifest only once something intangible or tangible is misused or destroyed. One such vulnerable area is the financial markets, especially in the realm of cryptocurrencies. These rapidly growing cryptocurrency markets have in recent years not only attracted a wave of new investors but have also created fertile ground for fraudulent activities [19]. Many individuals in this new terrain find both valid and false information on cryptocurrencies, making it challenging to verify facts. Further, as generative Artificial Intelligence continues to improve, microtargeting and personalisation of digital content become easily accessible to the masses. As digital assets gain mainstream acceptance, the allure of high returns has drawn many individuals into a complex and often opaque financial landscape. Unfortunately, this environment has also given rise to an alarming increase in cryptocurrency scams, which exploit investor naivety and market volatility.
  • Item
    Integrating Sentinel-1 and Sentinel-2 derived parameters for assessing wetland carbon in the Grassland Biome of South Africa
    (2025-09) Ngebe, S; Naidoo, L; Van Deventer, Heidi; Tsele, P
    Accurate estimation of above-ground biomass (AGB) and teal carbon stocks in wetlands remains a challenge due to seasonal variability and the complex interactions between vegetation structure, soil moisture, and hydrological dynamics. Previous studies have demonstrated the value of Sentinel-1 and -2 predictors for seasonal modelling of AGB in various wetland types but remains poorly quantified in African palustrine systems. This study assessed the potential of combining Sentinel-1 and -2 data with Random Forest (RF) modelling to estimate AGB and associated carbon stocks in a palustrine wetland in South Africa. Five modelling scenarios which included the fusion of optical and radar derived parameters were constructed for both summer and winter using RF %IncMSE-based important variable selection. Results demonstrated that combined Sentinel-1 and -2 images and RF models achieved consistently high predictive performance, with R2 > 0.9; where summer (R2 = 0.941, Root Mean Square Error [RMSE] = 18.29 g m-2, relative Root mean square error [relRMSE] = 14.95%) and winter (R2 = 0.928, RMSE = 29.79 g m-2, relRMSE = 16.42%). These findings highlight the robustness of multi-sensor approaches for seasonal wetland AGB estimation and provide a valuable foundation for monitoring their seasonal dynamics for improved carbon accounting strategies.
  • Item
    Development of a quantum-safe public key infrastructure for South Africa using qualitative method
    (2025-07) Ntshangase, Cynthia S; Baruni, Kedimotse P; Lefophane, Samuel
    This research analyses public key infrastructure frameworks from various countries to identify primary components and specifications, aiding South Africa in establishing a secure infrastructure. It outlines best practices and security considerations to be adapted, influenced by technological advancements. PKI framework development for the top seven countries with good cybersecurity posture was reviewed, namely, United States, United Kingdom, Saudi Arabia, Estonia, South Korea, Spain, and Singapore. The outcome of the study indicates that the main components of the PKI to be considered before, during and after development are policies, people involved, procedures, software, hardware, and services. The study improves knowledge for officials and policymakers managing national infrastructure.
  • Item
    Federated learning for privacy-preserving energy management in distributed power systems
    (2025-08) Nelufule, Nthatheni
    The Internet of Things has introduced the concept of Decentralized Energy Markets which enables peer-to-peer trading. This technology, together with federated learning and blockchain technology, is transforming the integration of renewable energy into smart grids and microgrids by improving efficiency, security, and consumer autonomy. This article presents a systematic review of the literature that synthesizes recent advances in decentralized market frameworks, transactive energy systems, and blockchain-based solutions for secure, transparent energy trading. The findings have revealed that high computational costs, reliance on simplified models, insufficient cybersecurity analysis, and lack of real-world validation persist limits the real applicability of these technologies in real-world applications. The article has proposed some potential solutions such as lightweight blockchain protocols, adaptive optimization algorithms, and large-scale field trials to ensure scalability, sustainability, and resilience. This review underscores the potential of decentralized markets to revolutionize energy systems, particularly in a decentralized grid.
  • Item
    Security concerns related to the use of artificial intelligence powered meeting assistants
    (2025-11) Mutemwa, Muyowa; Maduma, Mary P; Nefale, Vhuthu
    Online meetings have become common and popular, ever since COVID19 lockdowns. Post COVID19, most companies have retained the use of online meetings because they are more convenient, allow for multitasking, and are more cost-effective than in-person meetings because they can offer features such as recording video and/or audio, transcripts, and recap for attendees that were not able to attend or for future record keeping. However, there are many challenges to online meetings such as the online meetings fatigue with participants failing to keep track of key objectives and action items. Thus, the use of artificial intelligence for online meetings has become a common phenomenon. Artificial Intelligence (AI) powered meetings assistant tools have the ability to apply machine learning techniques to simply, summarize, extract objectives and actions from the meetings, thus allowing employees to focus on the critical aspects of their daily jobs schedules such as being creative, solving problems, and so on. However, with the advent of these meeting powered AI tools there are security concerns. This paper aims to explore such security concerns. In order to review these security concerns, the paper look at two sample tools, one that is enabled and billed at a user level, and the other that is enabled and billed at an organization or business unit level. Finally, the paper concludes with recommendations that can be used as guidelines on how organizations can safely authorize the use of the meeting powered AI tools in the workplace without compromising security or creating new security risks.
  • Item
    The case for integrating the IDP with the NRSS: Enhancing road safety through strategic planning
    (2025-07) Chirwa, Mary; Marole, Busisiwe C; Ngobeni, Ntombifuthi
    This paper explores the integration of South Africa’s Integrated Development Plan (IDP) with the National Road Safety Strategy (NRSS) to enhance road safety outcomes. South Africa faces a significant road safety crisis, with high rates of fatalities attributed to poor infrastructure, risky driving behaviours, and inadequate enforcement of traffic laws. The study emphasizes the importance of strategic planning, infrastructure improvements, community engagement, and the alignment of municipal and national safety goals. The methodology includes a comprehensive document review focusing on ten critical aspects such as legislation and policy alignment, infrastructure planning, capacity building, technology integration, monitoring and evaluation, safety measures, community engagement, education campaigns, focus on vulnerable road users, and funding allocation. These aspects were derived through a thematic analysis of key policy frameworks, including the NRSS 2016–2030, the Global Plan for the Decade of Action for Road Safety 2021–2030, and South Africa’s IDP guidelines. Additionally, a comparative analysis of international best practices, particularly Sweden’s Vision Zero and the Netherlands’ Sustainable Safety approach, provides actionable insights for South Africa. Key recommendations include strengthening legislative frameworks, improving road infrastructure, enhancing capacity building, leveraging technology, establishing robust monitoring systems, implementing effective safety measures, fostering community engagement, focusing on vulnerable road users, securing dedicated funding, and learning from successful international models. By adopting these strategies, South Africa can significantly reduce road fatalities and create safer environments for all road users.
  • Item
    Quantum computing education availability in South Africa
    (2025-07) Featherstone, Coral; Lourens, Roger L
    Quantum computing (QC) education in South Africa is gaining momentum through formal initiatives within universities, and research institutions. This study explores the availability of QC courses for South African students, assessing their target levels, prerequisites, and structure. By analysing prospectus documents, course content, and university websites across all 26 public universities, the study finds that only three institutions — WITS, UKZN, and SUN — explicitly provide QC modules. Many universities offer quantum physics as part of their physics curricula but do not extend this into standalone QC courses. These findings highlight gaps in course visibility, challenges with cross-departmental coordination, and missed opportunities to make QC education easier to find and access. The results aim to support prospective students, educators, and policy-makers in strengthening national QC capability.
  • Item
    National critical information infrastructure protection through cybersecurity: A national government perspective
    (2024-03) Mkhwanazi, Dephney T; Futcher, L
    The South African national government is forging ahead with digitalisation plans to enhance socioeconomic growth in the country. However, digitalisation is accompanied by detrimental cybersecurity risks that may potentially exacerbate the vulnerability of the National Critical Information Infrastructure (NCII) of South Africa to cyber-attacks. Therefore, the envisaged digitalisation benefits in South Africa may be offset by the increased cybersecurity risk on the NCII of the country. Through a theoretical literature review, this study aims to investigate digitalisation and identify the cybersecurity risks it poses to the National Critical Information Infrastructure of South Africa, from a national government policy perspective. A gap has been identified in Information and Communications Technology for Development (ICT4D) research studies that researchers tend to focus on the implementation of ICTs while neglecting the policy aspect that is meant to direct and control the implementation of ICTs. Therefore, this study bridges this gap by approaching digitalisation and cybersecurity from a national government policy perspective. The output of this study is a National Critical Information Infrastructure Protection (through Cybersecurity) Conceptual Framework (NCIIP-CF) that is applicable to all spheres of government (local, provincial or national) as policy makers. The NCIIP-CF demonstrates an approach that embeds cybersecurity in the digitalisation process for the national government of South Africa, thus enabling an NCII that is resilient to cybersecurity risks.
  • Item
    Internal aircraft cavity bay tests in the medium speed wind tunnel (MSWT)
    (2024-08) Mashilangwako, Kgoane J
    Continuous improvements in the wind tunnel facility capability gives a corresponding improvement and expansion on the types of tests that can be performed, and the accuracy, precision and quality of the data one can get from a wind tunnel test.
  • Item
    Linear least squares parameter inference for the SIR epidemiology model
    (2025-11) Van Wyk, MA; McDonald, Andre M; Ngwako, MT; Nyandoro OT, OT; Zhang, F, MA McDonald
    Accurate and early estimation of Susceptible-Infected-Recovered (SIR) epidemiology model parameters in infectious epidemics can enhance planning and resource allocation, thereby mitigating the adverse impacts on affected populations. Focusing on the basic SIR epidemiology model, in this paper we examine the scenario of known incidence rate (e.g., cases per day). Even though the SIR model is nonlinear, we obtain an exact least squares solution that is linear in simple algebraic functions of the SIR model’s parameters, the infection rate, recovery rate and total population. Linear least squares solutions lend themselves to be applied to only a selected time period, to the censoring of unreliable measurements such as obvious outliers as well as to enable iterative update of the parameter estimates as new data (i.e., measurements) become available. We present numerical results for both simulated and real-world COVID-19 data to demonstrate the practical utility and accuracy of the proposed method. The proposed method demonstrates advantages over state-of-the-art approaches while also providing reliable parameter estimates.
  • Item
    Towards an ontology-driven approach for contextualized cybersecurity awareness
    (2025) Veerasamy, Namosha; Khan, Zubeida; Mahlasela, Oyena N; Mtshali, Mamello L; Marengwa, Matshidiso S; Badenhorst, Danielle P
    Traditional training in the form of classrooms and on-site sessions require that participants are present at a specific time and place. Furthermore, traditional learning compels learners to follow a set schedule and does not provide any leeway for those that struggle to understand certain ideas or those that may want to progress faster. While some platforms have been developed to assist with cyber security awareness and digital literacy, they may not offer the benefit of contextualized learning. A “one-size fits all” strategy may not be the best in this rapidly evolving cyber landscape we live in. To assist in solving this problem, a research study was conducted on existing training techniques. This was used to propose an ontology-based solution for cybersecurity awareness that can be applied to certain sectors whereby contextualization is a critical need.
  • Item
    Municipal readiness level for an ageing and deteriorating pavement network for maintenance prioritisation
    (2025-10) Rampersad, Ashiel; Nkosi, Melusi S; Manganyi, Obey; Mashinini, Jabulani V
    “Municipalities are failing to balance investment in new infrastructure with sound operation and maintenance of existing infrastructure to ensure sustainable service delivery. Inadequate infrastructure maintenance undermines service delivery and contributes to increased backlogs” [1]. The SAICE Infrastructure Report Card rated municipal paved roads as “D-”, and unpaved municipal roads as “E”. Research states that delaying road maintenance is a false economy, as the longer such maintenance is left undone, the higher the eventual cost to restore the road to an acceptable condition. Prompt corrective measures are therefore recommended to minimise losses for all parties involved [2]. This paper presents a straightforward piece of research to access the readiness of municipalities to address their ageing and deteriorating road infrastructure. The research includes a critical review of road deterioration principles and current challenges, a case study to access the awareness practices of municipalities in managing their road infrastructure and a conceptual framework for local road infrastructure management. • Critical Review: Understanding pavement theory, the impact of delaying road maintenance, the challenges in implementing road maintenance, and opportunities for successful maintenance. • Case Study: Review of municipal Integrated Development Plans (IDPs) and finances to understand their threats and challenges, infrastructure awareness, how they prioritise road maintenance and their maintenance expenditure. • Discussion: Potential way forward for local municipalities in the management of their roads. The major threats identified at a local level were road infrastructure deterioration, maintenance budget underfunding and shortage of skills. Furthermore, there are inconsistencies as to the utilisation of their maintenance budget (under-utilised), and prioritising new road construction as opposed to fixing their existing infrastructure.
  • Item
    Mininet and free range routing for hybrid software defined network testing
    (2025) Mnyandu, Wandile T; Terzoli, A; Kobo, Hlabishi I
    While Mininet offers basic support for emulating switching behavior and topologies of legacy Ethernet networks, it is specifically focused on emulating Software Defined Networks (SDN). This focus limits experimentation and realism of legacy Ethernet network (LEN) protocols used, for example, in dynamic routing. In this paper, we develop an extension to Mininet’s functionality using Free Range Routing (FRRouting) protocol suite to enable the emulation of standard, open dynamic routing protocols, particularly Open Shortest Part First (OSPF). FRRouting can run within a network namespace and Mininet nodes are essentially network namespaces. We have incorporated FRRouting into a Mininet topology and investigated the operations of the dynamic routing protocol, OSPF. We found that dynamic routing protocols behaviors such as fault tolerance, routing convergence, and router solicitation can be effectively investigated using this integration.
  • Item
    Unlocking clean aviation in Africa: Challenges to localising hydrogen aviation propulsion in South Africa
    (2025-09) Naidoo, Purusha; Jamison, Kevin A
    The global aviation industry has adopted ICAO’s Long-Term Aspirational Goal (LTAG) to achieve net-zero emissions by 2050. Hydrogen fuel cell propulsion is recognised as a key enabler of zero emission aviation. While South Africa has strong potential for green hydrogen production due to its renewable energy resources, the country does have challenges in localising hydrogen aviation propulsion technologies. This paper explores these challenges through the CSIR’s H2UAV project, which is a hydrogen powered long-endurance unmanned aerial vehicle (UAV) designed to localise aviation hydrogen propulsion expertise, demonstrate hydrogen propulsion feasibility, and support a roadmap toward decarbonisation in aviation. Challenges identified include underdeveloped regulatory frameworks, limited early-stage funding, infrastructure inefficiencies, and a shortage of aerospace product development expertise. This study draws on global hydrogen aviation trends and proposes mechanisms for overcoming these obstacles in emerging economies like South Africa to boost the implementation of low carbon aviation propulsion technologies.
  • Item
    Complex regulatory compliance challenges in a multi-cloud strategy: A South African context
    (2025-11) Mahlasela, Oyena N; Mthethwa, Sthembile N; Manari, Unarine J; Thwala, Ntombizodwa; Mkhwanazi, Dephney T; Dlamini, Thandokuhle M
    This study aims to investigate and analyse South African organisations’ unique compliance and regulatory challenges when adopting a multi-cloud strategy. Multi-cloud refers to the use of multiple cloud computing services from different cloud providers. This approach has gained significant traction as organisations seek to improve service resilience, avoid vendor lock-in, enhance performance, and comply with varying regional and industry-specific requirements. However, multi-cloud adoption introduces added complexity, particularly in the regulation and compliance management. Through a systematic review of existing literature with regards to multi-cloud strategies, the study uncovered and examined some key compliance and regulatory challenges that include data privacy and protection, cybersecurity, data sovereignty, and cross-border data transfers. Based on the uncovered challenges, the study as part of its contribution to the body of knowledge proposes several recommendations for organisations to consider as they effectively make attempts to address compliance and regulatory challenges in a multi-cloud environment. These include conducting a comprehensive legal and regulatory compliance review, putting in place data sovereignty measures, adopting appropriate data governance frameworks, adherence to third party vendor management best practices, and fostering a strong compliance-driven culture.
  • Item
    Design, implementation, and testing of an NB-IoT smart sensor's signal processor for industrial applications
    (2025-11) Mtsotso, Steve; Makhalanyane, Thapelo; Kobo, Hlabishi I
    This work presents the design, implementation, and testing of a signal processor for NB-IoT-enabled smart gas sensor systems for deployment in industrial facilities. The processor is designed with low-cost MOS gas sensors (MQ-6, MQ-7, and MQ-135) and an ATmega328P microcontroller for real-time detection of hazardous gases. Circuits for conditioning the sensor analogue outputs were designed for amplification and filtering, with the goal of accurate digitisation using the microcontroller’s on-board analogue-to-digital converter (ADC). Simulations and experimental testing confirmed the processor’s capability of delivering low-noise, stable, and responsive measurements for deployment in air quality monitoring. Initial attempts at interfacing the processor with the SIM7000E NB-IoT module revealed communication issues, but these are outside the processor and were documented for future correction. Overall, the proposed processor provides a low power, reliable platform for the integration of gas sensing into safety-critical industrial and environmental monitoring systems.
  • Item
    Diversity in a dish: Leveraging organoids to reflect genetic ancestry and sex differences in health and disease
    (2025-09) Soussi, FEL; Piraino, F; Scholefield, Janine; Hoehnel-Ka, S; Kasendra, M
    The interplay between genetic ancestry and biological sex is increasingly recognized as a critical factor influencing health outcomes, treatment efficacy, and drug toxicity. Current research highlights significant disparities in disease susceptibility and therapeutic responses across different ancestral groups and sexes, with underrepresentation of diverse populations in genomic studies impeding progress. Most Genome-Wide Association Studies (GWAS) remain predominantly European, hindering the development of accurate polygenic risk scores (PRS). Additionally, sex-related differences in drug metabolism, immune response, and disease prevalence necessitate sex-stratified analyses. This review underscores the potential of advanced in vitro models, particularly human pluripotent stem cells (hPSCs) and adult stem cell-derived organoids, to bridge these gaps by providing platforms that reflect human genetic diversity and facilitate high-throughput screening. By integrating diverse genetic data and leveraging donor/population-specific organoid models’ researchers can uncover critical genotype-phenotype associations that enhance understanding of health disparities and improve pharmacogenomic applications. To increase reproducibility and throughput, standardized protocols, implementing automation, and employing organoid arrays along with well-controlled pooled populations can streamline workflows and enhance repeatability across studies and geographies. This approach fosters personalized medicine aimed at optimizing treatment efficacy and reducing adverse reactions across diverse populations, promoting equitable healthcare outcomes.