Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Opeyemi OsanaiyeAssociate Professor, Nile University of NigeriaEmail verificata su nileuniversity.edu.ng
- Gerhard de JagerUniversity of Cape TownEmail verificata su uct.ac.za
- Guy - Alain Lusilao-ZodiAssociate Professor, Namibia University of Science and TechnologyEmail verificata su nust.na
- Keith L FergusonCouncil for Scientific and Industrial ResearchEmail verificata su csir.co.za
- Uyoata UyoataAalborg UniversityEmail verificata su mautech.edu.ng
- Smart Charles LubobyaUniversity of ZambiaEmail verificata su unza.zm
- HENRY OHIZEFUT Minna, Electrical and Electronics EngineeringEmail verificata su futminna.edu.ng
- Elizabeth Mukhwana OkumuLecturer, Kabarak University, KenyaEmail verificata su kabarak.ac.ke
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphEmail verificata su uoguelph.ca
- Amakan Elisha AgoniInstitute of Electrical Electronics EngineerEmail verificata su ieee.org
- Louis CoetzeeArtificial Intelligence Accenture South AfricaEmail verificata su accenture.com
- Lindelweyizizwe ManqeleDurban University of TechnologyEmail verificata su dut.ac.za
- Ackim ZuluUniversity of Zambia; Newcastle UniversityEmail verificata su unza.zm
- George SibiyaCSIREmail verificata su csir.co.za
- Etienne BarnardNorth-West University, South AfricaEmail verificata su nwu.ac.za
- Quentin WilliamsOxford University, CSIREmail verificata su csir.co.za
- Ramoni AdeogunAssociate Professor, Aalborg UniversityEmail verificata su es.aau.dk
- Dr. A. Abel AjibesinAmerican University of NigeriaEmail verificata su aun.edu.ng
- Prof. Antoine BagulaUniversity of the Western Cape, South AfricaEmail verificata su uwc.ac.za
- Promise Sthembiso MvelaseUNISA School of Computing(Dept of Computer Science)Email verificata su unisa.ac.za