Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaVerified email at up.ac.za
Marlien HerselmanCSIRVerified email at csir.co.za
Adele BothaChief Researcher CSIR MerakaVerified email at csir.co.za
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Elmarie KritzingerProfessor, University of South Africa, School of ComputingVerified email at unisa.ac.za
Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
Jacques OphoffAbertay UniversityVerified email at abertay.ac.uk
Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Benson ZendaGIS SpecialistVerified email at kzncogta.gov.za
Khangwelo MurongaCouncil for Scientific and Industrial Research (South Africa)Verified email at csir.co.za
Maria JakovljevicResearch Fellow, Department of Science and Technology, College of Education, University of SouthVerified email at flamewave.net
Keshnee PadayacheeUNISAVerified email at unisa.ac.za
Elisha Oketch OcholaUniversity of South Africa, College of Science, Engineering & Technology, School of ComputingVerified email at unisa.ac.za
Nico MartinsResearch professor of Industrial and organisational psychology, Unisa
Colin PilkingtonRetired
Jan H. KroezeRetired professor from School of Computing, University of South Africa
Lyudmila AstakhovaSouth Ural State University (Южно-Уральский государственный университет), Высшая школа электроники и компьютерных наук, кафедра защиты информацииVerified email at susu.ru
Paulus SwartzUniversity of South Africa (UNISA)