Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Opeyemi OsanaiyeSenior Lecturer, Nile University of NigeriaVerified email at nileuniversity.edu.ng
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Gerhard de JagerUniversity of Cape TownVerified email at uct.ac.za
Guy - Alain Lusilao-ZodiAssociate Professor, Namibia University of Science and TechnologyVerified email at nust.na
Keith L FergusonCouncil for Scientific and Industrial ResearchVerified email at csir.co.za
Uyoata UyoataModibbo Adama UniversityVerified email at mautech.edu.ng
HENRY OHIZEFUT Minna, Electrical and Electronics EngineeringVerified email at futminna.edu.ng
Elizabeth Mukhwana OkumuLecturer, Kabarak University, KenyaVerified email at kabarak.ac.ke
Smart Charles LubobyaUniversity of ZambiaVerified email at unza.zm
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science LabVerified email at cybersciencelab.com
Amakan Elisha AgoniInstitute of Electrical Electronics EngineerVerified email at ieee.org
Louis CoetzeeArtificial Intelligence Accenture South AfricaVerified email at accenture.com
Lindelweyizizwe ManqeleDurban University of TechnologyVerified email at dut.ac.za
Ackim ZuluUniversity of Zambia; Newcastle UniversityVerified email at unza.zm
George SibiyaCSIRVerified email at csir.co.za
Etienne BarnardNorth-West University, South AfricaVerified email at nwu.ac.za
Quentin WilliamsOxford University, CSIRVerified email at csir.co.za
Ramoni AdeogunAssociate Professor, Aalborg UniversityVerified email at es.aau.dk
Adeyemi Abel AjibesinProfessor: American University of NigeriaVerified email at aun.edu.ng
Prof. Antoine BagulaUniversity of the Western Cape, South AfricaVerified email at uwc.ac.za