Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social engineering attack examples, templates and scenarios., , and . Comput. Secur., (2016)An Approach to Governance of CyberSecurity in South Africa., , , and . Int. J. Cyber Warf. Terror., 2 (4): 13-27 (2012)Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward., , and . HCC, volume 386 of IFIP Advances in Information and Communication Technology, page 215-225. Springer, (2012)Modelling of the Complex Societal Problem of Establishing a National Energy Sufficiency Competence., , , and . FUSION, page 1-8. IEEE, (2020)Using an Ontology for Network Attack Planning., , , and . Int. J. Cyber Warf. Terror., 6 (3): 65-78 (2016)Relaxations of semiring constraint satisfaction problems., , and . Inf. Process. Lett., 103 (5): 177-182 (2007)Adversarial Deep Reinforcement Learning for Cyber Security in Software Defined Networks., , and . CoRR, (2023)A Relaxation of a Semiring Constraint Satisfaction Problem Using Combined Semirings., , , and . PRICAI, volume 4099 of Lecture Notes in Computer Science, page 907-911. Springer, (2006)Branch and Bound Algorithms to Solve Semiring Constraint Satisfaction Problems., and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 991-997. Springer, (2008)Exploring the Effects of Subversive Agents on Consensus-Seeking Processes Using a Multi-Agent Simulator., and . SIMULTECH, page 104-114. SCITEPRESS, (2023)