Get my own profile
Public access
View all1 article
4 articles
available
not available
Based on funding mandates
Co-authors
Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaVerified email at up.ac.za
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
Roderick MooiSANReN Engineer, Meraka Institute, CSIRVerified email at csir.co.za
A. Kayode AdesemowoSOAMS ConsultingVerified email at soams.co.za
Jacques OphoffAbertay UniversityVerified email at abertay.ac.uk
Ryan GossUniversity of Cape TownVerified email at goss.co.za
Darelle van GreunenNelson Mandela UniversityVerified email at nmmu.ac.za
Markus TschersichGoethe University FrankfurtVerified email at m-chair.net
Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Dalenca PottasNelson Mandela UniversityVerified email at nmmu.ac.za
Follow![Reinhardt A. Botha](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=voDlsYQAAAAJ&citpid=2)
Reinhardt A. Botha
Professor of Information Technology, Nelson Mandela University, Port Elizabeth
Verified email at nmmu.ac.za