Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Joey Jansen van VuurenDepartment Computer Science Tshwane University of TechnologyVerified email at tut.ac.za
S H Basie B von SolmsUniversity of JohannesburgVerified email at uj.ac.za
Barry IrwinNoroff University College, Rhodes UniversityVerified email at ru.ac.za
Chang-Tsun LiProfessor of Cyber Security at Deakin University, AustraliaVerified email at deakin.edu.au
Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
Johnny BothaCSIRVerified email at csir.co.za
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
HS VenterProfessor and HoD of Computer Science, University of PretoriaVerified email at cs.up.ac.za