383 results on '"Eloff, Jan"'
Search Results
2. Analysing Drivers’ Preferences for Privacy Enhancing Car-to-Car Communication Systems : A Study from South-Africa
3. A SYNTHESIS OF RESEARCH ON INSIDER THREATS IN CYBERSECURITY.
4. Discovering “Insider IT Sabotage” based on human behaviour
5. Software Failures: An Overview
6. Practical Demonstration of Conducting a Near-Miss Analysis Investigation for Software Failures
7. A Methodology for Investigating Software Failures Using Digital Forensics and Near-Miss Analysis
8. A Well-Defined Model for Near-Miss Detection and Prioritisation
9. An Architecture for a Near-Miss Management System (NMS)
10. Near-Miss Analysis: An Overview
11. Introduction
12. Identity deception detection: requirements and a model
13. Towards an Interdisciplinary Master’s Degree Programme in Big Data and Data Science: A South African Perspective
14. Information Security Innovation
15. Fingerprinting Network Sessions for the Discovery of Cyber Threats
16. Using digital forensics to improve software reliability
17. Transaction Based Risk analysis - Using Cognitive Fuzzy Techniques
18. Classifying social media bots as malicious or benign using semi-supervised machine learning
19. Software Failure Investigation
20. A Methodology for Investigating Software Failures Using Digital Forensics and Near-Miss Analysis
21. Software Failures: An Overview
22. Introduction
23. A Well-Defined Model for Near-Miss Detection and Prioritisation
24. Practical Demonstration of Conducting a Near-Miss Analysis Investigation for Software Failures
25. Near-Miss Analysis: An Overview
26. An Architecture for a Near-Miss Management System (NMS)
27. Analysis of Web Proxy Logs
28. Applying Machine Trust Models to Forensic Investigations
29. A Framework for Web Services Trust
30. Secure Database Connectivity on the WWW
31. E-commerce strategy formulation
32. Erratum to: Information Security for Global Information Infrastructures
33. Erratum to: Information Security Management amp; Small Systems Security
34. HPI Future SOC Lab – Proceedings 2018
35. PIDS: a privacy intrusion detection system
36. A framework for access control in workflow systems
37. Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
38. HPI Future SOC Lab – Proceedings 2017
39. Information Security Innovation
40. Erratum to: Advances in Information Security Management & Small Systems Security
41. Erratum to: Information Security for Global Information Infrastructures
42. Information Warfare
43. Erratum to: Information Security Management amp; Small Systems Security
44. Cognitive fuzzy modeling for enhanced risk assessment in a health care institution
45. Access control in document-centric workflow systems - an agent-based approach
46. TOPM: a formal approach to the optimization of information technology risk management
47. Semi-automated Usability Analysis through Eye Tracking
48. Using Machine Learning to Detect Fake Identities: Bots vs Humans
49. Introduction
50. A hybrid PKI-IBC based ephemerizer system
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.