Jan Eloff
Jan Eloff
Deputy Dean: Research, University of Pretoria
Vahvistettu sähköpostiosoite verkkotunnuksessa up.ac.za - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1, 2, 2005
7242005
A framework and assessment instrument for information security culture
A Da Veiga, JH Eloff
Computers & Security 29 (2), 196-207, 2010
4032010
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
3132002
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
2972007
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
2672001
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2112003
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
computers & security 28 (3-4), 189-198, 2009
1972009
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
1741997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1532003
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1451999
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1402003
What makes an effective information security policy?
K Höne, JHP Eloff
Network Security 2002 (6), 14-16, 2002
1382002
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1242005
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1241993
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1202006
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
1172013
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
972004
SMSSec: an end-to-end protocol for secure SMS
JLC Lo, J Bishop, JHP Eloff
Computers & Security 27 (5-6), 154-167, 2008
892008
Risk analysis modelling with the use of fuzzy logic
WG De Ru, JHP Eloff
Computers & Security 15 (3), 239-248, 1996
851996
Information security culture-validation of an assessment instrument
N Martins, A Da Veiga, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
782007
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20