Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au
- Joey Jansen van VuurenDepartment Computer Science Tshwane University of TechnologyEmail verificata su tut.ac.za
- S H Basie B von SolmsUniversity of JohannesburgEmail verificata su uj.ac.za
- Barry IrwinNoroff University College, Rhodes UniversityEmail verificata su ru.ac.za
- Chang-Tsun LiProfessor of Cyber Security at Deakin University, AustraliaEmail verificata su deakin.edu.au
- Rossouw Von SolmsNelson Mandela UniversityEmail verificata su nmmu.ac.za
- Johnny BothaCSIREmail verificata su csir.co.za
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyEmail verificata su swin.edu.au
- Martin S OlivierProfessor of Computer Science, University of PretoriaEmail verificata su cs.up.ac.za
- HS VenterProfessor and HoD of Computer Science, University of PretoriaEmail verificata su cs.up.ac.za