Jan H. P. Eloff

Affiliations:
  • University of Pretoria, South Africa


According to our database1, Jan H. P. Eloff authored at least 121 papers between 1983 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Classifying social media bots as malicious or benign using semi-supervised machine learning.
J. Cybersecur., 2023

2022
CBAC4C: conflict-based VM isolation control for cloud computing.
Int. Trans. Oper. Res., 2022

Feature selection using Benford's law to support detection of malicious social media bots.
Inf. Sci., 2022

Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches.
IEEE Access, 2022

2021
Digital forensics supported by machine learning for the detection of online sexual predatory chats.
Digit. Investig., 2021

2020
Discovering "Insider IT Sabotage" based on human behaviour.
Inf. Comput. Secur., 2020

Analysing Drivers' Preferences for Privacy Enhancing Car-to-Car Communication Systems: A Study from South-Africa.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

2019
Identity deception detection: requirements and a model.
Inf. Comput. Secur., 2019

A Machine Learning Approach to Detect Insider Threats in Emails Caused by Human Behaviours.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

2018
Semi-automated Usability Analysis through Eye Tracking.
South Afr. Comput. J., 2018

Cyber-security: Identity deception detection on social media platforms.
Comput. Secur., 2018

Using Machine Learning to Detect Fake Identities: Bots vs Humans.
IEEE Access, 2018

Are Attributes on Social Media Platforms Usable for Assisting in the Automatic Detection of Identity Deception?.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Big data science for predicting insurance claims fraud.
Proceedings of the 2017 Information Security for South Africa, 2017

Identity Deception Detection on Social Media Platforms.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Towards Optimized Security-aware (O-Sec) VM Placement Algorithms.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Near-Miss Analysis and the Availability of Software Systems.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Securing Cloud Computing's Blind-spots using Strong and Risk-based MFA.
Proceedings of the CONF-IRM 2016, 2016

2014
CBAC4C: Conflict Based Allocation Control for Cloud.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Integrated digital forensic process model.
Comput. Secur., 2013

2012
Evaluating usage control deterrents.
South Afr. Comput. J., 2012

Improving system availability with near-miss analysis.
Netw. Secur., 2012

Towards trust and reputation for e-commerce in collectivist rural Africa.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

GUI 4D - The Role and the Impact of Visual, Multimedia and Multilingual User Interfaces in ICT Applications and Services for Users Coming from the Bottom of the Pyramid - First Concepts, Prototypes and Experiences.
Proceedings of the Expanding the Frontiers of Visual Analytics and Visualization, 2012

2011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.
South Afr. Comput. J., 2011

Proposing a Digital Operational Forensic Investigation Process .
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

UML Modelling Of Network Warfare Examples.
Proceedings of the Information Security South Africa Conference 2011, 2011

A Budget Model for Information Security.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

2010
A framework and assessment instrument for information security culture.
Comput. Secur., 2010

A security privacy aware architecture and protocol for a single smart card used for multiple services.
Comput. Secur., 2010

Editorial.
Comput. Secur., 2010

Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective.
Proceedings of the Information Security South Africa Conference 2010, 2010

2009
Adapting usage control as a deterrent to address the inadequacies of access controls.
Comput. Secur., 2009

Building access control models with attribute exploration.
Comput. Secur., 2009

Information security: The moving target.
Comput. Secur., 2009

BC3I - Towards Requirements Specification for Preparing an Information Security Budget.
Proceedings of the Information Security South Africa Conference 2009, 2009

2008
Standardising vulnerability categories.
Comput. Secur., 2008

SMSSec: An end-to-end protocol for secure SMS.
Comput. Secur., 2008

Towards a Framework for a Network Warfare Capability.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

UML Modelling of Digital Forensic Process Models (DFPMs).
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Considerations Towards a Cyber Crime Profiling System.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Information Security Governance Framework.
Inf. Syst. Manag., 2007

Web services access control architecture incorporating trust.
Internet Res., 2007

Enhancing Optimistic Access Controls with Usage Control.
Proceedings of the Trust, 2007

A Trust and Context Aware Access Control Model for Web Services Conversations.
Proceedings of the Trust, 2007

Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis.
Proceedings of the New Approaches for Security, 2007

Simulating adversarial interactions between intruders and system administrators using OODA-RR.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007

An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Defining a Trusted Service-Oriented Network Environment.
Proceedings of the The Second International Conference on Availability, 2007

2006
Uncovering identities: A study into VPN tunnel fingerprinting.
Comput. Secur., 2006

Trust Model Architecture: Defining Prejudice by Learning.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

A Framework for Web Services Trust.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Using Image Steganography for Decryptor Distribution.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Using IT Benchmarking Principles to Design an Information Security Benchmark Model.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Framework for a Digital Forensic Investigation.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Applying Machine Trust Models to Forensic Investigations.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Analysis of Web Proxy Logs.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

On Lattices in Access Control Models.
Proceedings of the Conceptual Structures: Inspiration and Application, 2006

2005
Autonomous trust for web services.
Internet Res., 2005

An access control framework for web services.
Inf. Manag. Comput. Security, 2005

An overview of image steganography.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

A new Access Control model based on the Chinese Wall Security Policy Model.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Foiling an Attack - Defeating IPSec Tunnel Fingerprinting.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Metadata for trust in service-oriented architectures.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
Proceedings of the Advances in Digital Forensics, 2005

Exploring Forensic Data with Self-Organizing Maps.
Proceedings of the Advances in Digital Forensics, 2005

2004
PIDS: a privacy intrusion detection system.
Internet Res., 2004

Vulnerability forecasting - a conceptual model.
Comput. Secur., 2004

Towards Web Service access control.
Comput. Secur., 2004

Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics.
Proceedings of the ICEIS 2004, 2004

2003
Evaluating vulnerability scanners using harmonised vulnerability categories.
South Afr. Comput. J., 2003

A taxonomy for information security technologies.
Comput. Secur., 2003

Security and human computer interfaces.
Comput. Secur., 2003

Information Security Management System: Processes and Products.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Harmonising vulnerability categories.
South Afr. Comput. J., 2002

An access control architecture for XML documents in workflow environments.
South Afr. Comput. J., 2002

Vulnerabilities categories for intrusion detection system.
Comput. Secur., 2002

A Prototype for Assessing Information Technology Risks in Health Care.
Comput. Secur., 2002

Information security policy what do international information security standards say?
Comput. Secur., 2002

Information Security Culture.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Human Computer Interaction: An Information Security Perspectives.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Secure Database Connectivity on the WWW.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
A new approach to risk management in the health-care domain.
South Afr. Comput. J., 2001

Separation of Duty administration.
South Afr. Comput. J., 2001

A framework for access control in workflow systems.
Inf. Manag. Comput. Secur., 2001

Separation of duties for access control enforcement in workflow environments.
IBM Syst. J., 2001

A Framework for the Implementation of Socio-ethical Controls in Information Security.
Comput. Secur., 2001

Access Control in Document-centric Workflow Systems An Agent-based Approach.
Comput. Secur., 2001

Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

E-Commerce Strategy Formulation.
Proceedings of the Towards The E-Society: E-Commerce, 2001

Designing Role Hierarchies for Access Control in Workflow Systems.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
Electronic commerce: the information-security challenge.
Inf. Manag. Comput. Secur., 2000

Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution.
IEEE Intell. Syst., 2000

MASS: Model for an Auditing Security System.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Context-Sensitive Access Control Model and Prototype Implementation.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Security in health-care information systems - current trends.
Int. J. Medical Informatics, 1999

Real-time Risk Analysis on the Internet: a prototype.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1998
Real-time risk analysis using Java concepts.
Inf. Manag. Comput. Secur., 1998

Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
Comput. Secur., 1998

Software source code, visual risk analysis: an example.
Comput. Secur., 1998

The use of real-time risk analysis to enable dynamic activation of countermeasures.
Comput. Secur., 1998

1997
Enhanced Password Authentication through Fuzzy Logic.
IEEE Expert, 1997

Improved system-access control using complementary technologies.
Comput. Secur., 1997

A common criteria framework for the evaluation of information technology systems security.
Proceedings of the Information Security in Research and Business, 1997

A methodology for accrediting a commercial distributed database.
Proceedings of the Information Security in Research and Business, 1997

1996
Risk analysis modelling with the use of fuzzy logic.
Comput. Secur., 1996

Security classification for documents.
Comput. Secur., 1996

Activating dynamic counter measures to reduce risk.
Proceedings of the Information Systems Security, 1996

1995
Classification of objects for improved access control.
Comput. Secur., 1995

Information Security Concepts in Computer Supported Cooperative Work
Proceedings of the Database and Expert Systems Applications, 1995

1994
TOPM: a formal approach to the optimization of information technology risk management.
Comput. Secur., 1994

1993
A comparative framework for risk analysis methods.
Comput. Secur., 1993

International Standards and Organizational Security Needs: Bridging the Gap.
Proceedings of the Computer Security, 1993

MethoDex: A Methodology for Expert Systems Development.
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993

Improved password mechanisms through expert system technology.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1990
Computer security methodology: Risk analysis and project definition.
Comput. Secur., 1990

1989
A methodology for measuring user satisfaction.
Inf. Process. Manag., 1989

Framework of a methodology for the life cycle of computer security in an organization.
Comput. Secur., 1989

1988
Computer security policy: Important issues.
Comput. Secur., 1988

1985
The development of a specification language for a computer security system.
Comput. Secur., 1985

1983
Selection process for security packages.
Comput. Secur., 1983


  Loading...