Mercy Chitauro

Mercy Chitauro's picture

Staff Details

Telephone Number: 
+264 61 207 2039
mbere [at] nust [dot] na
Office Location: 
Information Technology House
PhD.: Comp. Sci. (NUST); MIT.: Comp. Net.; B.Sc.: Comp. Sci. & Math. (UZ); PGCHE (NUST); CCNA, CCNP (R+S); CCNA, CCNP, CCNA Security and Cyber security operations instructor.

Networks, Network Security

Research Interest: 
Critical Infrastructure Security, Network Security, Child online protection
Selected Publications: 
  1. Bere, M., Bhunu Shava, F., Gamundani, A. M., & Nhamu, I. (2015, August 8). How Advanced Persistent Threat Exploit Humans. IJCSI, 12(4), in print. doi:IJCSI-2015-12-4-10601.
  2. Gamundani, A.M., Bhunu-Shava, F., Bere, M., & Kandjimi, H. (2015). A preliminary survey on child online protection initiatives: A focus on Namibia. International Research Journal of Computer Science. Ref No. IRJCS/RS/Vol.2/Issue4/APJCS10090.
  3. Namukuwa, R., Chitauro, M., & Bhunu Shava, F (2021). "Existing Optimal Water Network designs for addressing demand and supply needs for NamWater," 2021 IST-Africa Conference (IST-Africa),  pp. 1-9.
  4. Namukuwa, R., Chitauro, M. & Bhunu Shava, F. (2022). Evaluation of security techniques used to secure current optimised water network. In the proceedings of the 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC).
  5. Nawa, E., Chitauro, M., & Bhunu Shava, F. (2022). Assessing Patterns of Cybercrimes Associated with Online transactions in Namibia Banking institutions’ cyberspace. In the proceedings of the 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC).
  6. Nakasole, N., Chitauro, M., & Hamunyela, S. (in press). Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes. IEEE
  7. Chitauro, M., Muyingi, H., John, S. & Chitauro, S. (2020). A Bio-Immunology Inspired Industrial Control System Security Model. In the proceedings of First International Conference on Sustainable Technologies for Computational Intelligence, 29 -30 March, Jaipur, Rajasthan, India;
  8. Chitauro, M., Muyingi, H., John, S., & Chitauro, S. (2019). A survey of APT defence techniques. Reading: Academic Conferences International Limited. Retrieved from
  9. Chitauro, M., Gamundani, A.M., Bhunu Shava, F., Nhamu, I., Chitauro, S & Phillips, A. (2020). Overcoming Barriers: Enhancing Cyber Security Education and Awareness Through Cloud Based Cyber Security Competitions. In Proceedings of UbuntuNet-Connect 2019, 31 October – 1 November, Antananarivo, Madagascar.
  10. Gamundani, A., Bhunu-Shava, F., & Bere, M. (2019). A digital economy technology intergration model incorporating the cyber security layer. Reading: Academic Conferences International Limited. Retrieved from
  11. Maoneke, P.B., Bhunu Shava, F., Gamundani, A.M., Bere-Chitauro, M & Nhamu, I (2018). ICTs Use and Cyberspace Risks Faced By Adolescents in Namibia. In the proceedings of AfriCHI: The 2nd African Conference for Human Computer Interaction, Windhoek, Namibia, 3-7 December 2018.
  12. Chitauro S.; Chitauro M.; & Jere, N. (2017) Cloud Computing a Solution to Internet Services Downtime at Namibian Institutions of Higher Learning. Proceedings of International Congress on Information and Communication  Technology (ICICT) to be held on 12 – 13 December 2016, Kuala Lumpur, Malaysia .
  13. Bere-Chitauro, M; Muyingi H; Gamundani, A; Chitauro, S. (2015). Advanced Persistent Threat Model for Testing Industrial Control System Security Mechanisms. Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 438. Springer, Singapore.
  14. Bere M. (2015)“A Preliminary Review of ICS Security Frameworks and Standards Vs. Advanced Persistent Threats,” . Proceedings of the 10th International Conference on Cyber Warfare and Security held on the 24th to the 25th of March 2015 in South Africa. ISBN 978-1-910309-97-1. pg 407-414.
  15. Bere, M. (2015) Initial Investigation of Industrial Control System (ICS) Security Using Artificial Immune System (AIS). Proceedings of International Conference on Emerging Trends in Network and Computer Communication held on 18- 21 May 2015 in Namibia. Pages: 79 - 84, DOI: 10.1109/ETNCC.2015.7184812.
  16. Bhunu Shava, F., Bere, M, Nhamu, I., & Gamundani, A.M. (2015). Designing Knowledge Based Economy model for developing countries with a focus on security. Proceedings of the Sanord 2015 conference, NUST, Windhoek, Namibia, 1-3 Dec.
Notable Achievements: 

Best PhD researcher 2015

Best MIT student class of 2012

Back to Top