Follow
Jan Eloff
Jan Eloff
Professor in Computer Science (Cyber security) University of Pretoria
Verified email at up.ac.za - Homepage
Title
Cited by
Cited by
Year
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1 (2), 1-11, 2005
10022005
A framework and assessment instrument for information security culture
A Da Veiga, JHP Eloff
Computers & security 29 (2), 196-207, 2010
6682010
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
4482007
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
4262002
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM systems Journal 40 (3), 666-682, 2001
3112001
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
Computers & security 28 (3-4), 189-198, 2009
2602009
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
2382013
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2352003
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
2101997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1962003
What makes an effective information security policy?
K Höne, JHP Eloff
Network security 2002 (6), 14-16, 2002
1962002
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1932006
Using machine learning to detect fake identities: bots vs humans
E Van Der Walt, J Eloff
IEEE access 6, 6540-6549, 2018
1892018
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1822003
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1752005
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1731999
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1421993
Information security culture-validation of an assessment instrument
A Da Veiga, N Martins, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
1172007
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
ACM International Conference Proceeding Series 75, 221-221, 2004
1072004
Risk analysis modelling with the use of fuzzy logic
WG De Ru, JHP Eloff
Computers & Security 15 (3), 239-248, 1996
1071996
The system can't perform the operation now. Try again later.
Articles 1–20