Jan H. P. Eloff

ORCID: 0000-0003-4683-2198
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Access Control and Trust
  • Security and Verification in Computing
  • Digital and Cyber Forensics
  • Cybercrime and Law Enforcement Studies
  • Service-Oriented Architecture and Web Services
  • Spam and Phishing Detection
  • Software Engineering Research
  • Privacy, Security, and Data Protection
  • Cybersecurity and Cyber Warfare Studies
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Software System Performance and Reliability
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Misinformation and Its Impacts
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Business Process Modeling and Analysis
  • ICT in Developing Communities
  • Cognitive Science and Mapping
  • Anomaly Detection Techniques and Applications
  • Big Data and Business Intelligence

University of Pretoria
2015-2024

Council for Scientific and Industrial Research
2020

University of South Africa
2020

Zuid-Afrikaans Hospital
1993-2017

Tshwane University of Technology
2015

Empowerment Program
2012

University of Tulsa
2006

South African Reserve Bank
2005

University of Johannesburg
1985-2001

ABSTRACT Information security culture develops in an organization due to certain actions taken by the organization. Management implements information components, such as policies and technical measures with which employees interact that they include their working procedures. Employees develop perceptions exhibit behavior, reporting of incidents or sharing passwords, could either contribute be a threat securing assets. To inculcate acceptable level culture, must govern effectively...

10.1080/10580530701586136 article EN Information Systems Management 2007-10-02

10.1016/j.cose.2008.11.007 article EN Computers & Security 2008-12-12

There are a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date detect fake identities created by humans, especially so SMPs. In contrast, many examples exist cases where bots or computers have detected successfully using machine learning models. the case these models were dependent employing engineered features, such as “friend-to-followers ratio.”These features...

10.1109/access.2018.2796018 article EN cc-by-nc-nd IEEE Access 2018-01-01

Separation of duty, as a security principle, has its primary objective the prevention fraud and errors. This is achieved by disseminating tasks associated privileges for specific business process among multiple users. principle demonstrated in traditional example separation duty found requirement two signatures on check. Previous work requirements often explored implementations based role-based access control (RBAC) principles. These are concerned with constraining associations between RBAC...

10.1147/sj.403.0666 article EN IBM Systems Journal 2001-01-01

10.1016/s0167-4048(03)00006-3 article EN Computers & Security 2003-12-01

The authors have developed a software methodology that improves security by using typing biometrics to reinforce password authentication mechanisms. Typing is the analysis of user's keystroke patterns. Each user has unique way keyboard enter password; for example, each types characters constitute at different speeds. employs fuzzy logic measure biometrics. This reinforcement transparent-indiscernible users while they are entering normal authentication.

10.1109/64.642960 article EN IEEE Expert 1997-11-01

Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day have become a global phenomenon. Zero-day constitute frequent cybersecurity threat, they seek exploit the vulnerabilities of system. Previous studies demonstrated that can compromise for prolonged periods if traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays crucial role in supporting machine learning (ML) based detection systems (NIDS) by monitoring extracting meaningful...

10.1109/access.2022.3187116 article EN cc-by IEEE Access 2022-01-01

10.1016/s1361-3723(05)70275-x article EN Computer Fraud & Security 2005-11-01

Information security management needs a paradigm shift in order to successfully protect information assets. Organisations must change the holistic of security, requiring well-established Security Management System (ISMS). An ISMS addresses all aspects an organisation that deals with creating and maintaining secure environment. Organisational their staff manage cost-effectively can use ISMS. It also help assessment trustworthiness organisation's arrangements by other organisations....

10.5555/954014.954028 article EN South African Institute of Computer Scientists and Information Technologists 2003-09-17

10.1016/s1386-5056(98)00168-3 article EN International Journal of Medical Informatics 1999-04-01

10.1016/s0167-4048(03)00406-1 article EN Computers & Security 2003-05-01

10.1016/s1353-4858(02)06011-7 article EN Network Security 2002-06-01

Human observation and intuition form the basis of any risk assessment. The authors propose a cognitive fuzzy modeling approach to assessment in health care institutions, building on logic's great potential dealing with vague information human common sense intuition.

10.1109/5254.850830 article EN IEEE Intelligent Systems and their Applications 2000-03-01

Abstract Users of online social network (OSN) platforms, e.g. Twitter, are not always humans, and bots (referred to as bots) highly prevalent. State-of-the-art research demonstrates that can be broadly categorized either malicious or benign. From a cybersecurity perspective, the behaviors benign differ. Malicious often controlled by botmaster who monitors their activities perform engineering web scraping attacks collect user information. Consequently, it is imperative classify on basis...

10.1093/cybsec/tyac015 article EN cc-by Journal of Cybersecurity 2023-01-01
Coming Soon ...