Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Opeyemi OsanaiyeAssociate Professor, Nile University of NigeriaVerified email at nileuniversity.edu.ng
Gerhard de JagerUniversity of Cape TownVerified email at uct.ac.za
Guy - Alain Lusilao-ZodiAssociate Professor, Namibia University of Science and TechnologyVerified email at nust.na
Keith L FergusonCouncil for Scientific and Industrial ResearchVerified email at csir.co.za
Uyoata Etuk UyoataModibbo Adama UniversityVerified email at mautech.edu.ng
Smart Charles LubobyaUniversity of ZambiaVerified email at unza.zm
HENRY OHIZEFUT Minna, Electrical and Electronics EngineeringVerified email at futminna.edu.ng
Elizabeth Mukhwana OkumuLecturer, Kabarak University, KenyaVerified email at kabarak.ac.ke
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
Amakan Elisha AgoniInstitute of Electrical Electronics EngineerVerified email at ieee.org
Louis CoetzeeArtificial Intelligence Accenture South AfricaVerified email at accenture.com
Lindelweyizizwe ManqeleDurban University of TechnologyVerified email at dut.ac.za
Ackim ZuluUniversity of Zambia; Newcastle UniversityVerified email at unza.zm
George SibiyaCSIRVerified email at csir.co.za
Etienne BarnardNorth-West University, South AfricaVerified email at nwu.ac.za
Quentin WilliamsOxford University, CSIRVerified email at csir.co.za
Ramoni AdeogunAssociate Professor, Aalborg UniversityVerified email at es.aau.dk
Prof. Antoine BagulaUniversity of the Western Cape, South AfricaVerified email at uwc.ac.za
Promise Sthembiso MvelaseUNISA School of Computing(Dept of Computer Science)Verified email at unisa.ac.za
Prof. Nomusa DlodloRhodes UniversityVerified email at ru.ac.za