An overview of image steganography. T Morkel, JHP Eloff, MS Olivier ISSA 1 (2), 1-11, 2005 | 1014 | 2005 |
A framework and assessment instrument for information security culture A Da Veiga, JHP Eloff Computers & security 29 (2), 196-207, 2010 | 675 | 2010 |
An information security governance framework AD Veiga, JHP Eloff Information systems management 24 (4), 361-372, 2007 | 451 | 2007 |
Information security policy—what do international information security standards say? K Höne, JHP Eloff Computers & security 21 (5), 402-409, 2002 | 428 | 2002 |
Separation of duties for access control enforcement in workflow environments RA Botha, JHP Eloff IBM systems Journal 40 (3), 666-682, 2001 | 312 | 2001 |
Information security: The moving target MT Dlamini, JHP Eloff, MM Eloff Computers & security 28 (3-4), 189-198, 2009 | 261 | 2009 |
Integrated digital forensic process model MD Kohn, MM Eloff, JHP Eloff Computers & Security 38, 103-115, 2013 | 247 | 2013 |
Security and human computer interfaces J Johnston, JHP Eloff, L Labuschagne Computers & Security 22 (8), 675-684, 2003 | 238 | 2003 |
Enhanced password authentication through fuzzy logic WG De Ru, JHP Eloff IEEE Expert 12 (6), 38-45, 1997 | 210 | 1997 |
Information security management: a new paradigm JHP Eloff, M Eloff Proceedings of the 2003 annual research conference of the South African …, 2003 | 197 | 2003 |
What makes an effective information security policy? K Höne, JHP Eloff Network security 2002 (6), 14-16, 2002 | 197 | 2002 |
Framework for a Digital Forensic Investigation. M Köhn, MS Olivier, JHP Eloff ISSA, 1-7, 2006 | 195 | 2006 |
Using machine learning to detect fake identities: bots vs humans E Van Der Walt, J Eloff IEEE access 6, 6540-6549, 2018 | 191 | 2018 |
A taxonomy for information security technologies HS Venter, JHP Eloff Computers & Security 22 (4), 299-307, 2003 | 185 | 2003 |
Information security architecture JHP Eloff, MM Eloff Computer Fraud & Security 2005 (11), 10-16, 2005 | 176 | 2005 |
Security in health-care information systems—current trends E Smith, JHP Eloff International journal of medical informatics 54 (1), 39-54, 1999 | 174 | 1999 |
A comparative framework for risk analysis methods JHP Eloff, L Labuschagne, KP Badenhorst Computers & Security 12 (6), 597-603, 1993 | 142 | 1993 |
Information security culture-validation of an assessment instrument A Da Veiga, N Martins, JHP Eloff Southern African Business Review 11 (1), 147-166, 2007 | 119 | 2007 |
An approach to implement a network intrusion detection system using genetic algorithms MM Pillai, JHP Eloff, HS Venter ACM International Conference Proceeding Series 75, 221-221, 2004 | 107 | 2004 |
Risk analysis modelling with the use of fuzzy logic WG De Ru, JHP Eloff Computers & Security 15 (3), 239-248, 1996 | 107 | 1996 |