Folgen
Jan Eloff
Jan Eloff
Professor in Computer Science (Cyber security) University of Pretoria
Bestätigte E-Mail-Adresse bei up.ac.za - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1 (2), 1-11, 2005
10022005
A framework and assessment instrument for information security culture
A Da Veiga, JHP Eloff
Computers & security 29 (2), 196-207, 2010
6652010
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
4432007
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
4172002
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
3112001
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
Computers & security 28 (3-4), 189-198, 2009
2602009
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
2382013
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2342003
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
2111997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1972003
What makes an effective information security policy?
K Höne, JHP Eloff
Network security 2002 (6), 14-16, 2002
1952002
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1902006
Using machine learning to detect fake identities: bots vs humans
E Van Der Walt, J Eloff
IEEE access 6, 6540-6549, 2018
1862018
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1812003
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1762005
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1701999
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1421993
Information security culture-validation of an assessment instrument
A Da Veiga, N Martins, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
1182007
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1082004
Risk analysis modelling with the use of fuzzy logic
WG De Ru, JHP Eloff
Computers & Security 15 (3), 239-248, 1996
1061996
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20