Jan H. P. Eloff
Orcid: 0000-0003-4683-2198Affiliations:
- University of Pretoria, South Africa
According to our database1,
Jan H. P. Eloff
authored at least 123 papers
between 1983 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
Proceedings of the 9th International Conference on Internet of Things, 2024
2023
Classifying social media bots as malicious or benign using semi-supervised machine learning.
J. Cybersecur., 2023
2022
Int. Trans. Oper. Res., 2022
Feature selection using Benford's law to support detection of malicious social media bots.
Inf. Sci., 2022
Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches.
IEEE Access, 2022
2021
Digital forensics supported by machine learning for the detection of online sexual predatory chats.
Digit. Investig., 2021
2020
Inf. Comput. Secur., 2020
Analysing Drivers' Preferences for Privacy Enhancing Car-to-Car Communication Systems: A Study from South-Africa.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020
2019
A Machine Learning Approach to Detect Insider Threats in Emails Caused by Human Behaviours.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
2018
Comput. Secur., 2018
Are Attributes on Social Media Platforms Usable for Assisting in the Automatic Detection of Identity Deception?.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
Proceedings of the 2017 Information Security for South Africa, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the CONF-IRM 2016, 2016
2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
2013
2012
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
GUI 4D - The Role and the Impact of Visual, Multimedia and Multilingual User Interfaces in ICT Applications and Services for Users Coming from the Bottom of the Pyramid - First Concepts, Prototypes and Experiences.
Proceedings of the Expanding the Frontiers of Visual Analytics and Visualization, 2012
2011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.
South Afr. Comput. J., 2011
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
2010
Comput. Secur., 2010
A security privacy aware architecture and protocol for a single smart card used for multiple services.
Comput. Secur., 2010
Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective.
Proceedings of the Information Security South Africa Conference 2010, 2010
2009
Adapting usage control as a deterrent to address the inadequacies of access controls.
Comput. Secur., 2009
BC3I - Towards Requirements Specification for Preparing an Information Security Budget.
Proceedings of the Information Security South Africa Conference 2009, 2009
2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Trust, 2007
Proceedings of the Trust, 2007
Proceedings of the New Approaches for Security, 2007
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007
An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Conceptual Structures: Inspiration and Application, 2006
2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
2004
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics.
Proceedings of the ICEIS 2004, 2004
2003
South Afr. Comput. J., 2003
Information Security Management System: Processes and Products.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
South Afr. Comput. J., 2002
Comput. Secur., 2002
Information security policy what do international information security standards say?
Comput. Secur., 2002
Information Security Culture.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Human Computer Interaction: An Information Security Perspectives.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Secure Database Connectivity on the WWW.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
South Afr. Comput. J., 2001
IBM Syst. J., 2001
A Framework for the Implementation of Socio-ethical Controls in Information Security.
Comput. Secur., 2001
Comput. Secur., 2001
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
Proceedings of the Towards The E-Society: E-Commerce, 2001
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001
2000
Inf. Manag. Comput. Secur., 2000
IEEE Intell. Syst., 2000
MASS: Model for an Auditing Security System.
Proceedings of the Information Security for Global Information Infrastructures, 2000
A Context-Sensitive Access Control Model and Prototype Implementation.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Int. J. Medical Informatics, 1999
Real-time Risk Analysis on the Internet: a prototype.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
1998
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
Comput. Secur., 1998
Comput. Secur., 1998
1997
Comput. Secur., 1997
A common criteria framework for the evaluation of information technology systems security.
Proceedings of the Information Security in Research and Business, 1997
A methodology for accrediting a commercial distributed database.
Proceedings of the Information Security in Research and Business, 1997
1996
Activating dynamic counter measures to reduce risk.
Proceedings of the Information Systems Security, 1996
1995
Proceedings of the Database and Expert Systems Applications, 1995
1994
TOPM: a formal approach to the optimization of information technology risk management.
Comput. Secur., 1994
1993
International Standards and Organizational Security Needs: Bridging the Gap.
Proceedings of the Computer Security, 1993
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1990
Comput. Secur., 1990
1989
Framework of a methodology for the life cycle of computer security in an organization.
Comput. Secur., 1989
1988
1985
Comput. Secur., 1985
1983