2008 |
15 | | Hein S. Venter,
Mariki M. Eloff,
Jan H. P. Eloff,
Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008
ISSA, Pretoria, South Africa 2008 |
14 | EE | Evangelos Frangopoulos,
Mariki M. Eloff,
Lucas M. Venter:
Social Aspects of Information Security.
ISSA 2008: 1-33 |
2007 |
13 | | Hein S. Venter,
Mariki M. Eloff,
Les Labuschagne,
Jan H. P. Eloff,
Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Springer 2007 |
2006 |
12 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2006 |
11 | EE | Kate Ormiston,
Mariki M. Eloff:
Denial-of-Service & Distributed Denial-of-Service on The Internet.
ISSA 2006: 1-14 |
2005 |
10 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2005 |
9 | EE | Evangelos Frangopoulos,
Lucas M. Venter,
Mariki M. Eloff:
Secure Authentication combined with Anonymity: The end of an oxymoron?
ISSA 2005: 1-11 |
2004 |
8 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa
ISSA, Pretoria, South Africa 2004 |
7 | | Paula Kotzé,
Mariki M. Eloff,
Ayodele Adesina-Ojo,
Jan H. P. Eloff:
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics.
ICEIS (5) 2004: 97-106 |
2003 |
6 | | Mariki M. Eloff,
Jan H. P. Eloff:
Information Security Management System: Processes and Products.
SEC 2003: 193-204 |
5 | | E. Smith,
Mariki M. Eloff,
Lucas M. Venter,
A. Barnard,
Laurette Pretorius:
Agents, security and ethics : a framework for analysis.
South African Computer Journal 31: 18-24 (2003) |
2002 |
4 | | Mariki M. Eloff,
Jan H. P. Eloff:
Human Computer Interaction: An Information Security Perspectives.
SEC 2002: 535-546 |
2000 |
3 | | Mariki M. Eloff,
Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation.
SEC 2000: 11-18 |
2 | | Mariki M. Eloff,
Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches.
Computers & Security 19(3): 243-256 (2000) |
1 | | Mariki M. Eloff,
Sebastiaan H. von Solms:
Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Computers & Security 19(8): 698-709 (2000) |