Get my own profile
Public access
View all5 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaVerified email at up.ac.za
- Marlien HerselmanCSIRVerified email at csir.co.za
- Adele BothaChief Researcher CSIR MerakaVerified email at csir.co.za
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Elmarie KritzingerProfessor, University of South Africa, School of ComputingVerified email at unisa.ac.za
- Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
- Jacques OphoffAbertay UniversityVerified email at abertay.ac.uk
- Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
- Khangwelo MurongaCouncil for Scientific and Industrial Research (South Africa)Verified email at csir.co.za
- Benson ZendaGIS SpecialistVerified email at kzncogta.gov.za
- Maria JakovljevicResearch Fellow, Department of Science and Technology, College of Education, University of SouthVerified email at flamewave.net
- Elisha Oketch OcholaUniversity of South Africa, College of Science, Engineering & Technology, School of ComputingVerified email at unisa.ac.za
- Keshnee PadayacheeUNISAVerified email at unisa.ac.za
- Nico MartinsResearch professor of Industrial and organisational psychology, Unisa
- Colin PilkingtonRetired
- Jan H. KroezeRetired professor from School of Computing, University of South Africa
- Lyudmila AstakhovaSouth Ural State University (Южно-Уральский государственный университет), Высшая школа электроники и компьютерных наук, кафедра защиты информацииVerified email at susu.ru
- Paulus SwartzUniversity of South Africa (UNISA)