Name
Papers
Collaborators
JAN H. P. ELOFF
91
76
Citations 
PageRank 
Referers 
733
117.29
1375
Referees 
References 
581
354
Search Limit
1001000
Title
Citations
PageRank
Year
Cbac4c: Conflict-Based Vm Isolation Control For Cloud Computing00.342022
Analysing Drivers' Preferences for Privacy Enhancing Car-to-Car Communication Systems - A Study from South-Africa.00.342020
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings00.342020
Identity deception detection: requirements and a model.00.342019
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers00.342019
A Machine Learning Approach to Detect Insider Threats in Emails Caused by Human Behaviours.00.342019
Cyber-security: Identity deception detection on social media platforms.20.402018
Using Machine Learning to Detect Fake Identities: Bots vs Humans.40.412018
Semi-automated Usability Analysis through Eye Tracking00.342018
Identity Deception Detection On Social Media Platforms00.342017
Towards Optimized Security-Aware (O-Sec) Vm Placement Algorithms00.342017
Securing Cloud Computing's Blind-spots using Strong and Risk-based MFA.10.352016
Near-Miss Analysis and the Availability of Software Systems.00.342016
CBAC4C: Conflict Based Allocation Control for Cloud00.342014
Integrated digital forensic process model160.992013
Towards trust and reputation for e-commerce in collectivist rural Africa.00.342012
Evaluating usage control deterrents.00.342012
Improving system availability with near-miss analysis.00.342012
UML Modelling Of Network Warfare Examples.00.342011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.00.342011
Proposing a Digital Operational Forensic Investigation Process .00.342011
A Budget Model for Information Security.00.342011
Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective.00.342010
BC3I - Towards Requirements Specification for Preparing an Information Security Budget.00.342009
Building access control models with attribute exploration100.662009
Considerations Towards a Cyber Crime Profiling System30.532008
Towards a Framework for a Network Warfare Capability00.342008
UML Modelling of Digital Forensic Process Models (DFPMs)30.572008
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008233.462008
Web Services Access Control Architecture Incorporating Trust30.532007
An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report10.372007
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis00.342007
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa454.732007
Using IT Benchmarking Principles to Design an Information Security Benchmark Model00.342006
Analysis of Web Proxy Logs20.452006
Framework for a Digital Forensic Investigation191.752006
Applying Machine Trust Models to Forensic Investigations30.482006
A Framework for Web Services Trust20.392006
On lattices in access control models20.482006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa313.612006
Autonomous Trust For Web Services30.432005
Exploring Forensic Data with Self-Organizing Maps90.942005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa347.022005
A new Access Control model based on the Chinese Wall Security Policy Model10.382005
Metadata for trust in service-oriented architectures00.342005
An overview of image steganography523.392005
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment00.342005
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting00.342005
An access control framework for web services10.412005
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics40.452004
  • 1
  • 2