Martin S Olivier
Martin S Olivier
Professor of Computer Science, University of Pretoria
Bestätigte E-Mail-Adresse bei cs.up.ac.za - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An overview of image steganography
T Morkel, MS Olivier, JHP Eloff
Proceedings of the fifth annual Information Security South Africa Conference, 2005
8012005
Information Technology Research: A practical guide for Computer Science and Informatics, 3rd ed
MS Olivier
Van Schaik, 2009
276*2009
Information Technology Research: A Practical Guide for Computer Science and Informatics, 2nd ed.
MS Olivier
Pretoria, South Africa, 2004
222*2004
Framework for a digital forensic investigation
M Kohn, JHP Eloff, MS Olivier
Proceedings of Information Security South Africa (ISSA) 2006 from Insight to …, 2006
1652006
On metadata context in database forensics
MS Olivier
Digital Investigation 5 (3-4), 115-123, 2009
1482009
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
1052012
A taxonomy for secure object-oriented databases
MS Olivier, SH von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
1001994
Isolating a Cloud Instance for a Digital Forensic Investigation.
W Delport, M Köhn, MS Olivier
2011 Information Security for South Africa (ISSA 2011) Conference, 2011
862011
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Advances in Digital Forensics, 113-123, 2005
84*2005
Acquisition of a Symbian smart phone’s content with an on-phone forensic tool
PM Mokhonoana, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2007
592007
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
562006
A model for spam prevention in voice over IP networks using anonymous verifying authorities
N Croft, M Olivier
Proceedings of the 5th Annual Information Security South Africa Conference …, 2005
56*2005
Specifying application-level security in workflow systems
MS Olivier, RP van de Riet, E Gudes
Database and Expert Systems Applications, 1998. Proceedings. Ninth …, 1998
561998
Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa
HN Olinger, JJ Britz, MS Olivier
The International Information & Library Review 39 (1), 31-43, 2007
542007
Database privacy: balancing confidentiality, integrity and availability
MS Olivier
ACM SIGKDD Explorations Newsletter 4 (2), 20-27, 2002
532002
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
512012
Using an approximated one-time pad to secure short messaging service (SMS)
NJ Croft, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2005
472005
A multilevel secure federated database
MS Olivier
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
471994
Building a secure database using self-protecting objects
MS Olivier, SH von Solms
Computers & Security 11 (3), 259-271, 1992
441992
Modelling, specifying and implementing workflow security in cyberspace
E Gudes, MS Olivier, RP Van De Riet
Journal of Computer Security 7 (4), 287-315, 1999
391999
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20