Get my own profile
Public access
View all5 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jan EloffDeputy Dean: Research, University of PretoriaVerified email at up.ac.za
Victor R. KebandeAsst Professor of Cyber & IT Security, Blekinge Institute of Technology, SwedenVerified email at mau.se
Richard Adeyemi IkuesanComputing and Applied Technology, College of Technological Innovation, Zayed University, Abu DhabiVerified email at zu.ac.ae
Nickson M. KarieCyber Security and Forensics Researcher - Edith Cowan UniversityVerified email at ecu.edu.au
Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Francois MoutonNoroff University College, University of the Western CapeVerified email at noroff.no
Dr Aleksandar ValjarevicHELP AG, Dubai, UAEVerified email at helpag.com
Louise LeenenAssociate Professor, University of the Western CapeVerified email at uwc.ac.za
Stacey Omeleze BarorComputer Science, University of PretoriaVerified email at cs.up.ac.za
M M EloffUnisaVerified email at unisa.ac.za
George SibiyaCSIRVerified email at csir.co.za
Mr M.T. DlaminiCSIR, Defence & Security, South AfricaVerified email at cs.up.ac.za
Avinash SinghDepartment of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Thomas FogwillCSIRVerified email at csir.co.za
kigwana ivansResearch student, University of Pretoria - South AfricaVerified email at cs.up.ac.za
Philip TrenwithKing Price InsuranceVerified email at kingprice.co.za
shukor razakUniversiti teknologi malaysiaVerified email at utm.my
Mazleena SallehAssociate ProfessorVerified email at fsksm.utm.my
Lehlogonolo P.I. LedwabaNGEI, Council for Scientific and Industrial ResearchVerified email at csir.co.za
Dagney EllisonStudent, University of PretoriaVerified email at tuks.co.za
Follow