Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Derrick KourieProf (Emeritus), Computer Science, Pretoria Univ; Research Associate, Stellenbosch UnivVerified email at fastar.org
Lisa ThompsonUniversity of PretoriaVerified email at up.ac.za
Linda MarshallLecturer of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
Hugo LotrietProfessor, University of South Africa, School of Computing.Verified email at unisa.ac.za
Paul E. BlackNISTVerified email at nist.gov
Marlene HolmnerLecturer of Information Science, University of Pretoria.Verified email at up.ac.za
Hossana TwinomurinziUniversity of JohannesburgVerified email at uj.ac.za
Machdel MattheeAssociate Professor in Information Systems, University of PretoriaVerified email at up.ac.za
Janet LiebenbergNorth-West UniversityVerified email at nwu.ac.za
Loek CleophasAssistant Professor, TU Eindhoven; and Research Fellow, Stellenbosch UniversityVerified email at acm.org
Bruce W. WatsonNational Security Centre of ExcellenceVerified email at bruce-watson.com
Fritz SolmsSolmsTC, Stellenbosch UniversityVerified email at solms.co.za
Stacey Omeleze BarorComputer Science, University of PretoriaVerified email at cs.up.ac.za
Leila GoosenProfessor of Computer Science Education, University of South AfricaVerified email at unisa.ac.za
Sylvia StuurmanAssistant Professor of Computer Science, Open University of the NetherlandsVerified email at ou.nl
Ina SchaeferKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Christoph StallmannDepartment of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Estelle TaylorProfessor, Computer Science and Information Systems, Potchefstroom Campus, NWUVerified email at nwu.ac.za
Martina JordaanUniversity of PretoriaVerified email at up.ac.za