Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Opeyemi OsanaiyeAssociate Professor, Nile University of NigeriaVerified email at nileuniversity.edu.ng
- Gerhard de JagerUniversity of Cape TownVerified email at uct.ac.za
- Guy - Alain Lusilao-ZodiAssociate Professor, Namibia University of Science and TechnologyVerified email at nust.na
- Keith L FergusonCouncil for Scientific and Industrial ResearchVerified email at csir.co.za
- Uyoata UyoataAalborg UniversityVerified email at mautech.edu.ng
- Smart Charles LubobyaUniversity of ZambiaVerified email at unza.zm
- HENRY OHIZEFUT Minna, Electrical and Electronics EngineeringVerified email at futminna.edu.ng
- Elizabeth Mukhwana OkumuLecturer, Kabarak University, KenyaVerified email at kabarak.ac.ke
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
- Amakan Elisha AgoniInstitute of Electrical Electronics EngineerVerified email at ieee.org
- Louis CoetzeeArtificial Intelligence Accenture South AfricaVerified email at accenture.com
- Lindelweyizizwe ManqeleDurban University of TechnologyVerified email at dut.ac.za
- Ackim ZuluUniversity of Zambia; Newcastle UniversityVerified email at unza.zm
- George SibiyaCSIRVerified email at csir.co.za
- Etienne BarnardNorth-West University, South AfricaVerified email at nwu.ac.za
- Quentin WilliamsOxford University, CSIRVerified email at csir.co.za
- Ramoni AdeogunAssociate Professor, Aalborg UniversityVerified email at es.aau.dk
- Dr. A. Abel AjibesinAmerican University of NigeriaVerified email at aun.edu.ng
- Prof. Antoine BagulaUniversity of the Western Cape, South AfricaVerified email at uwc.ac.za
- Promise Sthembiso MvelaseUNISA School of Computing(Dept of Computer Science)Verified email at unisa.ac.za