Martin S Olivier
Martin S Olivier
Professor of Computer Science, University of Pretoria
Dirección de correo verificada de - Página principal
TítuloCitado porAño
An overview of image steganography
T Morkel, MS Olivier, JHP Eloff
Proceedings of the fifth annual Information Security South Africa Conference, 2005
Information Technology Research: A practical guide for Computer Science and Informatics, 3rd ed
MS Olivier
Van Schaik, 2009
Information Technology Research - A Practical Guide for Computer Science and Informatics, 2nd ed.
MS Olivier
Van Schaik, 2004
Framework for a digital forensic investigation
M Kohn, JHP Eloff, MS Olivier
Proceedings of Information Security South Africa (ISSA) 2006 from Insight to …, 2006
On metadata context in database forensics
MS Olivier
Digital Investigation 5 (3-4), 115-123, 2009
A taxonomy for secure object-oriented databases
MS Olivier, SH Von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Advances in Digital Forensics, 113-123, 2005
Isolating a Cloud Instance for a Digital Forensic Investigation.
W Delport, M Köhn, MS Olivier
Acquisition of a Symbian smart phone’s content with an on-phone forensic tool
PM Mokhonoana, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2007
Specifying application-level security in workflow systems
MS Olivier, RP van de Riet, E Gudes
Database and Expert Systems Applications, 1998. Proceedings. Ninth …, 1998
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
A multilevel secure federated database
MS Olivier
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
Database privacy: balancing confidentiality, integrity and availability
MS Olivier
ACM SIGKDD Explorations Newsletter 4 (2), 20-27, 2002
Building a secure database using self-protecting objects
MS Olivier, SH von Solms
Computers & Security 11 (3), 259-271, 1992
Using an approximated one-time pad to secure short messaging service (SMS)
NJ Croft, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2005
Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa
HN Olinger, JJ Britz, MS Olivier
The International Information & Library Review 39 (1), 31-43, 2007
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
Information technology research
MS Olivier
A practical guide for computer science and informatics 3, 2009
Modelling, specifying and implementing workflow security in cyberspace
E Gudes, MS Olivier, RP Van De Riet
Journal of Computer Security 7 (4), 287-315, 1999
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20