Jan Eloff
Jan Eloff
Deputy Dean: Research, University of Pretoria
Verified email at up.ac.za - Homepage
Title
Cited by
Cited by
Year
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1 (2), 1-11, 2005
7932005
A framework and assessment instrument for information security culture
A Da Veiga, JHP Eloff
Computers & Security 29 (2), 196-207, 2010
5262010
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
3652002
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
3612007
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM Systems Journal 40 (3), 666-682, 2001
2972001
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2252003
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
Computers & security 28 (3-4), 189-198, 2009
2232009
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
1931997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1742003
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
1642013
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1632003
What makes an effective information security policy?
K Höne, JHP Eloff
Network security 2002 (6), 14-16, 2002
1602002
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1562006
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1561999
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1522005
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1341993
Analyzing security requirements as relationships among strategic actors
EY Lin Liu, J Mylopoulos
1302002
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1042004
SMSSec: An end-to-end protocol for secure SMS
JLC Lo, J Bishop, JHP Eloff
Computers & Security 27 (5-6), 154-167, 2008
982008
Information security culture-validation of an assessment instrument
A Da Veiga, N Martins, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
972007
The system can't perform the operation now. Try again later.
Articles 1–20