Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Eloff, JHP
BSc (RAU) BSc Hons (RAU) MSc (RAU) PhD (RAU) - Professor and Head
NRF Rating: B2
Contact Details
Research Interests
Research Output
Contact Details:
Telephone number: 012 420 2361
Fax number: 012 362 5188
E-mail address: eloff@cs.up.ac.za
Research Interests:
Computer and Information Security with specific reference to Distributed Systems Security and Privacy
Research Output:
Research articles in refereed specialist journals:
Izadinia VD, Kourie DG, Eloff JHP: 2006. Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security, 25 (1) / Mar, pp 97-105.
Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. The use of self-organising maps for anomalous behaviour detection in a digital investigation. Forensic Science International, 162 / Jul, pp 33-37.
Obiedkov S, Kourie DG, Eloff JHP: 2006. On lattices in access control models. Lecture Notes in Artificial Intelligence, 4068, pp 374-387.
Morkel T, Eloff JHP, Olivier MS: 2006. Using image steganography for decryptor distribution. Lecture Notes in Computer Science, 4277 / Nov, pp 322-330.
Wojcik M, Eloff JHP, Venter HS: 2006. Trust model architecture: Defining prejudice by learning. Lecture Notes in Computer Science, 4083 / Sep, pp 182-191.
Papers in refereed, published conference proceedings:
Fei BKL, Eloff JHP, Olivier MS, Venter HS: 2006. Analysis of Web Proxy Logs. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 247-258.
Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2006. Applying Machine Trust Models to Forensic Investigations. In IFIP International Conference on Digital Forensics, International Federation for Information Processing, pp 55-65.
Padayachee K, Eloff JHP: 2006. An Aspect-Oriented Implementation of e-Consent to Foster Trust. In Proceedings of SAICSIT 2006: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT, pp 164-169.
Coetzee M, Eloff JHP: 2006. A Framework for Web Services Trust. In Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), International Federation for Information Processing, pp 75-86.
Kohn MD, Eloff JHP, Olivier MS: 2006. Framework for a Digital Forensic Investigation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-7.
MacManus L, Eloff JHP: 2006. Using IT Benchmarking Principles to design an Information Security Benchmark Model. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-10.
Wojcik M, Venter HS, Eloff JHP: 2006. Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation. In Proceedings of the ISSA 2006 from Insight to Foresight Conference, Information Security South Africa, pp 1-9.
Padayachee K, Eloff JHP: 2006. The Next Challenge: Aspect-Oriented Programming. In Proceedings of the Sixth IASTED International Conference on Modelling, Simulation and Optimization, ACTA Press, pp 304-307.
Wojcik M, Venter HS, Eloff JHP: 2006. A Detailed Analysis of Trust Representation as a Trust Model Evaluation Criterion. In Southern African Telecommunication Networks Applications Conference (SATNAC) 2006 Proceedings, Telkom, pp 1-6.
|