Follow
Martin S Olivier
Title
Cited by
Cited by
Year
An overview of image steganography
T Morkel, MS Olivier, JHP Eloff
Proceedings of the fifth annual Information Security South Africa Conference, 2005
9862005
Information Technology Research: A practical guide for Computer Science and Informatics, 3rd ed
MS Olivier
Van Schaik, 2009
3092009
Information Technology Research: A Practical Guide for Computer Science and Informatics, 2nd ed.
MS Olivier
Pretoria, South Africa, 2004
306*2004
Framework for a digital forensic investigation
M Kohn, JHP Eloff, MS Olivier
Proceedings of Information Security South Africa (ISSA) 2006 from Insight to …, 2006
1942006
On metadata context in database forensics
MS Olivier
Digital Investigation 5 (3-4), 115-123, 2009
1532009
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
1212012
A taxonomy for secure object-oriented databases
MS Olivier, SH von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
1031994
Isolating a Cloud Instance for a Digital Forensic Investigation.
W Delport, M Köhn, MS Olivier
2011 Information Security for South Africa (ISSA 2011) Conference, 2011
942011
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Advances in Digital Forensics, 113-123, 2005
86*2005
Acquisition of a Symbian smart phone’s content with an on-phone forensic tool
PM Mokhonoana, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2007
662007
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
642006
Database privacy: balancing confidentiality, integrity and availability
MS Olivier
ACM SIGKDD Explorations Newsletter 4 (2), 20-27, 2002
632002
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14, 1061-1077, 2012
622012
Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa
HN Olinger, JJ Britz, MS Olivier
The International Information & Library Review 39 (1), 31-43, 2007
612007
A model for spam prevention in voice over IP networks using anonymous verifying authorities
N Croft, M Olivier
Proceedings of the 5th Annual Information Security South Africa Conference …, 2005
57*2005
Specifying application-level security in workflow systems
MS Olivier, RP van de Riet, E Gudes
Database and Expert Systems Applications, 1998. Proceedings. Ninth …, 1998
541998
Using an approximated one-time pad to secure short messaging service (SMS)
NJ Croft, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2005
512005
Ideal log setting for database forensics reconstruction
OM Adedayo, MS Olivier
Digital Investigation 12, 27-40, 2015
462015
A multilevel secure federated database
MS Olivier
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
451994
Building a secure database using self-protecting objects
MS Olivier, SH von Solms
Computers & Security 11 (3), 259-271, 1992
431992
The system can't perform the operation now. Try again later.
Articles 1–20