Jan Eloff
Jan Eloff
Deputy Dean: Research, University of Pretoria
Verified email at up.ac.za - Homepage
Title
Cited by
Cited by
Year
An overview of image steganography.
T Morkel, JHP Eloff, MS Olivier
ISSA 1 (2), 2005
7722005
A framework and assessment instrument for information security culture
A Da Veiga, JHP Eloff
Computers & Security 29 (2), 196-207, 2010
4882010
Information security policy—what do international information security standards say?
K Höne, JHP Eloff
Computers & security 21 (5), 402-409, 2002
3542002
An information security governance framework
AD Veiga, JHP Eloff
Information systems management 24 (4), 361-372, 2007
3432007
Separation of duties for access control enforcement in workflow environments
RA Botha, JHP Eloff
IBM Systems Journal 40 (3), 666-682, 2001
2912001
Security and human computer interfaces
J Johnston, JHP Eloff, L Labuschagne
Computers & Security 22 (8), 675-684, 2003
2162003
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
computers & security 28 (3-4), 189-198, 2009
2142009
Enhanced password authentication through fuzzy logic
WG De Ru, JHP Eloff
IEEE Expert 12 (6), 38-45, 1997
1881997
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1672003
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1562003
What makes an effective information security policy?
K Höne, JHP Eloff
Network security 2002 (6), 14-16, 2002
1552002
Security in health-care information systems—current trends
E Smith, JHP Eloff
International journal of medical informatics 54 (1), 39-54, 1999
1541999
Framework for a Digital Forensic Investigation.
M Köhn, MS Olivier, JHP Eloff
ISSA, 1-7, 2006
1492006
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
1482013
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1452005
A comparative framework for risk analysis methods
JHP Eloff, L Labuschagne, KP Badenhorst
Computers & Security 12 (6), 597-603, 1993
1341993
Analyzing security requirements as relationships among strategic actors
EY Lin Liu, J Mylopoulos
1302002
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1022004
SMSSec: An end-to-end protocol for secure SMS
JLC Lo, J Bishop, JHP Eloff
Computers & Security 27 (5-6), 154-167, 2008
972008
Information security culture-validation of an assessment instrument
A Da Veiga, N Martins, JHP Eloff
Southern African Business Review 11 (1), 147-166, 2007
952007
The system can't perform the operation now. Try again later.
Articles 1–20