Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Jan Eloff"'
Autor:
Estee Van Der Walt, Jan Eloff
Publikováno v:
IEEE Access, Vol 6, Pp 6540-6549 (2018)
There are a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities created by humans, especially
Externí odkaz:
https://doaj.org/article/197f7636efb74ba2804517c89529e7e9
Autor:
Christiaan Klopper, Jan Eloff
Publikováno v:
International Conference on Cyber Warfare and Security. 18:171-180
A rtificial intelligence (AI) assisted cyber-attacks, within the network cybersecurity domain, have evolved to be more successful at every phase of the cyber threat lifecycle. This involves, amongst other tasks, reconnaissance, weaponisation, deliver
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVI
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019.The 12 revised full papers presented were carefully reviewed and selected from
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40
Autor:
Jan Eloff, Madeleine Bihina Bella
This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techni
Autor:
Jan Eloff, Madeleine Bihina Bella
Publikováno v:
Software Failure Investigation ISBN: 9783319613338
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ed94dc6be35a1138def5c7b95a01560c
https://doi.org/10.1007/978-3-319-61334-5_1
https://doi.org/10.1007/978-3-319-61334-5_1
Publikováno v:
2016 Information Security for South Africa (ISSA).
Autor:
Jan Eloff, Akash Singh
Publikováno v:
2011 3rd Symposium on Web Society.
The boundaries for business are constantly moving beyond the physical premises. Today, customers are seeking innovative and dynamic business solutions that allow for business to be conducted at any place, anytime or on any device. SAP has recognised
Autor:
Jan Eloff, Anna Granova
Publisher Summary This chapter defines information warfare (IW), discusses its most common tactics, weapons, and tools, compares IW terrorism with conventional warfare, and addresses the issues of liability and the available legal remedies under inte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dd0e548382482a6a97f3ae6fb135d7f0
https://doi.org/10.1016/b978-0-12-374354-1.00039-x
https://doi.org/10.1016/b978-0-12-374354-1.00039-x