Get my own profile
Public access
View all1 article
4 articles
available
not available
Based on funding mandates
Co-authors
- Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaVerified email at up.ac.za
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
- Roderick MooiSANReN Engineer, Meraka Institute, CSIRVerified email at csir.co.za
- A. Kayode AdesemowoSOAMS ConsultingVerified email at soams.co.za
- Jacques OphoffAbertay UniversityVerified email at abertay.ac.uk
- Ryan GossUniversity of Cape TownVerified email at goss.co.za
- Darelle van GreunenNelson Mandela UniversityVerified email at nmmu.ac.za
- Markus TschersichGoethe University FrankfurtVerified email at m-chair.net
- Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
- Martin S OlivierProfessor of Computer Science, University of PretoriaVerified email at cs.up.ac.za
- Dalenca PottasNelson Mandela UniversityVerified email at nmmu.ac.za
Follow
Reinhardt A. Botha
Professor of Information Technology, Nelson Mandela University, Port Elizabeth
Verified email at nmmu.ac.za