Folgen
Jan Eloff
Jan Eloff
Professor in Computer Science (Cyber security) University of Pretoria
Bestätigte E-Mail-Adresse bei up.ac.za - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1 (2), 1-11, 2005
9332005
A framework and assessment instrument for information security culture
A Da Veiga, JHP Eloff
Computers & security 29 (2), 196-207, 2010
6302010
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
4332007
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
4052002
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
3062001
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
Computers & security 28 (3-4), 189-198, 2009
2482009
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2332003
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
2242013
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
2061997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1932003
What makes an effective information security policy?
K Höne, JHP Eloff
Network security 2002 (6), 14-16, 2002
1892002
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1842006
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1772003
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1662005
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1621999
Using machine learning to detect fake identities: bots vs humans
E Van Der Walt, J Eloff
IEEE access 6, 6540-6549, 2018
1592018
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1391993
Information security culture-validation of an assessment instrument
A Da Veiga, N Martins, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
1132007
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1052004
Risk analysis modelling with the use of fuzzy logic
WG De Ru, JHP Eloff
Computers & Security 15 (3), 239-248, 1996
1031996
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20