AAAAAA

   
Results: 1-8 |
Results: 8

Authors: LABUSCHAGNE L ELOFF JHP
Citation: L. Labuschagne et Jhp. Eloff, THE USE OF REAL-TIME RISK ANALYSIS TO ENABLE DYNAMIC ACTIVATION OF COUNTERMEASURES, Computers & security, 17(4), 1998, pp. 347-357

Authors: VANDERMERWE G ELOFF JHP
Citation: G. Vandermerwe et Jhp. Eloff, SOFTWARE SOURCE CODE, VISUAL RISK ANALYSIS - AN EXAMPLE, Computers & security, 17(3), 1998, pp. 233-252

Authors: DERU WG ELOFF JHP
Citation: Wg. Deru et Jhp. Eloff, ENHANCED PASSWORD AUTHENTICATION THROUGH FUZZY-LOGIC, IEEE expert, 12(6), 1997, pp. 38-45

Authors: LABUSCHAGNE L ELOFF JHP
Citation: L. Labuschagne et Jhp. Eloff, IMPROVED SYSTEM-ACCESS CONTROL USING COMPLEMENTARY TECHNOLOGIES, Computers & security, 16(6), 1997, pp. 543-549

Authors: DERU WG ELOFF JHP
Citation: Wg. Deru et Jhp. Eloff, RISK ANALYSIS MODELING WITH THE USE OF FUZZY-LOGIC, Computers & security, 15(3), 1996, pp. 239-248

Authors: ELOFF JHP HOLBEIN R TEUFEL S
Citation: Jhp. Eloff et al., SECURITY CLASSIFICATION FOR DOCUMENTS, Computers & security, 15(1), 1996, pp. 55-71

Authors: BOOYSEN HAS ELOFF JHP
Citation: Has. Booysen et Jhp. Eloff, CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL, Computers & security, 14(3), 1995, pp. 251-265

Authors: BADENHORST KP ELOFF JHP
Citation: Kp. Badenhorst et Jhp. Eloff, TOPM - A FORMAL APPROACH TO THE OPTIMIZATION OF INFORMATION TECHNOLOGY RISK MANAGEMENT, Computers & security, 13(5), 1994, pp. 411-435
Risultati: 1-8 |