Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaEmail verificata su up.ac.za
- Steven FurnellUniversity of NottinghamEmail verificata su nottingham.ac.uk
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthEmail verificata su plymouth.ac.uk
- Rossouw Von SolmsNelson Mandela UniversityEmail verificata su nmmu.ac.za
- Roderick MooiSANReN Engineer, Meraka Institute, CSIREmail verificata su csir.co.za
- A. Kayode AdesemowoSOAMS ConsultingEmail verificata su soams.co.za
- Jacques OphoffAbertay UniversityEmail verificata su abertay.ac.uk
- Ryan GossUniversity of Cape TownEmail verificata su goss.co.za
- Markus TschersichGoethe University FrankfurtEmail verificata su m-chair.net
- Darelle van GreunenNelson Mandela UniversityEmail verificata su nmmu.ac.za
- Kerry-Lynn ThomsonNelson Mandela UniversityEmail verificata su mandela.ac.za
- Martin S OlivierProfessor of Computer Science, University of PretoriaEmail verificata su cs.up.ac.za
- Dalenca PottasNelson Mandela UniversityEmail verificata su nmmu.ac.za
Segui
Reinhardt A. Botha
Professor of Information Technology, Nelson Mandela University, Port Elizabeth
Email verificata su nmmu.ac.za