The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Les Labuschagne: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Les Labuschagne, Jan H. P. Eloff
    E-Commerce Strategy Formulation. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:289-302 [Conf]
  2. Les Labuschagne
    Web Asssurance: Information Security Management for e-commerce. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:1-12 [Conf]
  3. H. S. Venter, Les Labuschagne, Jan H. P. Eloff
    Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf]
  4. Les Labuschagne
    A Framework for Electronic Commerce Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:441-450 [Conf]
  5. Les Labuschagne, Jan H. P. Eloff
    Activating dynamic counter measures to reduce risk. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:187-196 [Conf]
  6. Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst
    A comparative framework for risk analysis methods. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:6, pp:597-603 [Journal]
  7. J. Johnston, Jan H. P. Eloff, Les Labuschagne
    Security and human computer interfaces. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:675-684 [Journal]
  8. Les Labuschagne, Jan H. P. Eloff
    Improved system-access control using complementary technologies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:543-549 [Journal]
  9. Les Labuschagne, Jan H. P. Eloff
    The use of real-time risk analysis to enable dynamic activation of countermeasures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:347-357 [Journal]
  10. Les Labuschagne, Jan H. P. Eloff
    Electronic commerce: the information-security challenge. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:154-157 [Journal]
  11. Les Labuschagne, Jan H. P. Eloff
    Real-time risk analysis using Java concepts. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:212-217 [Journal]

  12. The Peculium Model: Information Security Risk Management for the South African SMME. [Citation Graph (, )][DBLP]


  13. A Framework for Information Security Risk Management Communication. [Citation Graph (, )][DBLP]


  14. A security framework for an ERP system. [Citation Graph (, )][DBLP]


  15. A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002