Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaVerified email at up.ac.za
- Victor R. KebandeAsst Professor of Cyber & IT Security, Blekinge Institute of Technology, SwedenVerified email at bth.se
- Richard Adeyemi IkuesanComputing and Applied Technology, College of Technological Innovation, Zayed University, Abu DhabiVerified email at zu.ac.ae
- Nickson M. KarieSenior Lecturer-Cybersecurity and Forensics, Curtin University, Australia.Verified email at curtin.edu.au
- Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
- Francois MoutonNoroff University College, University of the Western CapeVerified email at noroff.no
- Dr Aleksandar ValjarevicHELP AG, Dubai, UAEVerified email at helpag.com
- Avinash SinghDepartment of Computer Science, University of PretoriaVerified email at cs.up.ac.za
- Stacey Omeleze BarorComputer Science, University of PretoriaVerified email at cs.up.ac.za
- M M EloffUnisaVerified email at unisa.ac.za
- George SibiyaCSIRVerified email at csir.co.za
- Dr M.T. DlaminiUniversity of Pretoria, Department of Computer Science & CSIR, Defence & Security, South AfricaVerified email at up.ac.za
- kigwana ivansResearch student, University of Pretoria - South AfricaVerified email at cs.up.ac.za
- Thomas FogwillCSIRVerified email at csir.co.za
- Lehlogonolo P.I. LedwabaNGEI, Council for Scientific and Industrial ResearchVerified email at csir.co.za
- Philip TrenwithKing Price InsuranceVerified email at kingprice.co.za
- shukor razakUniversiti teknologi malaysiaVerified email at utm.my
- Mazleena SallehAssociate ProfessorVerified email at fsksm.utm.my
- Dagney EllisonStudent, University of PretoriaVerified email at tuks.co.za
- Sheunesu M MakuraUniversity of PretoriaVerified email at up.ac.za
Follow