Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Jan EloffProfessor in Computer Science (Cyber security) University of PretoriaVerified email at up.ac.za
Brian GreavesUniversity of JohannesburgVerified email at uj.ac.za
Wai Sze LeungLecturer of Academy of Computer Science and Software Engineering, University of JohannesburgVerified email at uj.ac.za
Donovan IsherwoodMaster of IT, University of JohannesburgVerified email at donovanisherwood.com
HS VenterProfessor and HoD of Computer Science, University of PretoriaVerified email at cs.up.ac.za
M M EloffUnisaVerified email at unisa.ac.za
Frans F. BlauwHZ University of Applied SciencesVerified email at hz.nl
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
Duncan Anthony CoulterUniversity of JohannesburgVerified email at uj.ac.za
Carington Mathale PhahlamohlakaUniversity of JohannesburgVerified email at student.uj.ac.za
Manmohan ChaturvediIndian Institute of Technology DelhiVerified email at iitd.ac.in
Follow
Marijke Coetzee
Professor in Computer Science, North-West University
Verified email at nwu.ac.za - Homepage