Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
- Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
- Johan van NiekerkNoroff University College / Nelson Mandela UniversityVerified email at nmmu.ac.za
- Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
- Siddharth KazaTowson UniversityVerified email at towson.edu
- Dr. Nader Sohrabi safaManchester Metropolitan UniversityVerified email at mmu.ac.uk
- Allen ParrishExecutive Director, Alabama Cyber Institute, The University of AlabamaVerified email at ua.edu
- Herbert MattordProfessor of Cybersecurity, Kennesaw State UniversityVerified email at kennesaw.edu
- Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
- Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu