Prati
Jan Eloff
Jan Eloff
Professor in Computer Science (Cyber security) University of Pretoria
Potvrđena adresa e-pošte na up.ac.za - Početna stranica
Naslov
Citirano
Citirano
Godina
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1 (2), 1-11, 2005
10142005
A framework and assessment instrument for information security culture
A Da Veiga, JHP Eloff
Computers & security 29 (2), 196-207, 2010
6752010
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
4512007
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
4282002
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
3122001
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
Computers & security 28 (3-4), 189-198, 2009
2612009
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
2472013
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2382003
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
2101997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1972003
What makes an effective information security policy?
K Höne, JHP Eloff
Network security 2002 (6), 14-16, 2002
1972002
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1952006
Using machine learning to detect fake identities: bots vs humans
E Van Der Walt, J Eloff
IEEE access 6, 6540-6549, 2018
1912018
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1852003
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1762005
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1741999
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1421993
Information security culture-validation of an assessment instrument
A Da Veiga, N Martins, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
1192007
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
ACM International Conference Proceeding Series 75, 221-221, 2004
1072004
Risk analysis modelling with the use of fuzzy logic
WG De Ru, JHP Eloff
Computers & Security 15 (3), 239-248, 1996
1071996
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20