Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
Johan van NiekerkNoroff University College / Nelson Mandela UniversityVerified email at nmmu.ac.za
Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
Siddharth KazaTowson UniversityVerified email at towson.edu
Dr. Nader Sohrabi safaUniversity of WolverhamptonVerified email at warwick.ac.uk
Allen ParrishExecutive Director, Alabama Cyber Institute, The University of AlabamaVerified email at ua.edu
Herbert MattordProfessor of Cybersecurity, Kennesaw State UniversityVerified email at kennesaw.edu
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu