Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Joey Jansen van VuurenDepartment Computer Science Tshwane University of TechnologyVerified email at tut.ac.za
- S H Basie B von SolmsUniversity of JohannesburgVerified email at uj.ac.za
- Barry IrwinNoroff University College, Rhodes UniversityVerified email at ru.ac.za
- Chang-Tsun LiProfessor of Cyber Security at Deakin University, AustraliaVerified email at deakin.edu.au
- Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
- Johnny BothaCSIRVerified email at csir.co.za
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
- HS VenterProfessor and HoD of Computer Science, University of PretoriaVerified email at cs.up.ac.za