An overview of image steganography. T Morkel, JHP Eloff, MS Olivier Issa 1 (2), 1-11, 2005 | 1029 | 2005 |
A framework and assessment instrument for information security culture A Da Veiga, JHP Eloff Computers & security 29 (2), 196-207, 2010 | 682 | 2010 |
An information security governance framework AD Veiga, JHP Eloff Information systems management 24 (4), 361-372, 2007 | 463 | 2007 |
Information security policy—what do international information security standards say? K Höne, JHP Eloff Computers & security 21 (5), 402-409, 2002 | 439 | 2002 |
Separation of duties for access control enforcement in workflow environments RA Botha, JHP Eloff IBM systems Journal 40 (3), 666-682, 2001 | 317 | 2001 |
Integrated digital forensic process model MD Kohn, MM Eloff, JHP Eloff Computers & Security 38, 103-115, 2013 | 262 | 2013 |
Information security: The moving target MT Dlamini, JHP Eloff, MM Eloff Computers & security 28 (3-4), 189-198, 2009 | 259 | 2009 |
Security and human computer interfaces J Johnston, JHP Eloff, L Labuschagne Computers & Security 22 (8), 675-684, 2003 | 243 | 2003 |
Using machine learning to detect fake identities: bots vs humans E Van Der Walt, J Eloff IEEE access 6, 6540-6549, 2018 | 216 | 2018 |
Enhanced password authentication through fuzzy logic WG De Ru, JHP Eloff IEEE Expert 12 (6), 38-45, 1997 | 210 | 1997 |
Framework for a Digital Forensic Investigation. M Köhn, MS Olivier, JHP Eloff ISSA, 1-7, 2006 | 202 | 2006 |
What makes an effective information security policy? K Höne, JHP Eloff Network security 2002 (6), 14-16, 2002 | 198 | 2002 |
Information security management: a new paradigm JHP Eloff, M Eloff Proceedings of the 2003 annual research conference of the South African …, 2003 | 196 | 2003 |
A taxonomy for information security technologies HS Venter, JHP Eloff Computers & Security 22 (4), 299-307, 2003 | 191 | 2003 |
Information security architecture JHP Eloff, MM Eloff Computer Fraud & Security 2005 (11), 10-16, 2005 | 176 | 2005 |
Security in health-care information systems—current trends E Smith, JHP Eloff International journal of medical informatics 54 (1), 39-54, 1999 | 175 | 1999 |
A comparative framework for risk analysis methods JHP Eloff, L Labuschagne, KP Badenhorst Computers & Security 12 (6), 597-603, 1993 | 142 | 1993 |
Information security culture-validation of an assessment instrument A Da Veiga, N Martins, JHP Eloff Southern African Business Review 11 (1), 147-166, 2007 | 120 | 2007 |
SMSSec: An end-to-end protocol for secure SMS JLC Lo, J Bishop, JHP Eloff Computers & Security 27 (5-6), 154-167, 2008 | 117 | 2008 |
Risk analysis modelling with the use of fuzzy logic WG De Ru, JHP Eloff Computers & Security 15 (3), 239-248, 1996 | 109 | 1996 |