Martin S Olivier
Martin S Olivier
Professor of Computer Science, University of Pretoria
Verified email at cs.up.ac.za - Homepage
Title
Cited by
Cited by
Year
An overview of image steganography
T Morkel, MS Olivier, JHP Eloff
Proceedings of the fifth annual Information Security South Africa Conference, 2005
7842005
Information technology research: A practical guide for computer science and informatics
MS Olivier
Van Schaik, 2009
2712009
Information Technology Research: A practical guide for Computer Science and Informatics, 3rd ed
MS Olivier
Van Schaik, 2009
2712009
Information Technology Research: A Practical Guide for Computer Science and Informatics, 2nd ed.
MS Olivier
Pretoria, South Africa, 2004
271*2004
Framework for a digital forensic investigation
M Kohn, JHP Eloff, MS Olivier
Proceedings of Information Security South Africa (ISSA) 2006 from Insight to …, 2006
1572006
On metadata context in database forensics
MS Olivier
Digital Investigation 5 (3-4), 115-123, 2009
1422009
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
1002012
A taxonomy for secure object-oriented databases
MS Olivier, SH von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
981994
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Advances in Digital Forensics, 113-123, 2005
83*2005
Isolating a Cloud Instance for a Digital Forensic Investigation.
W Delport, M Köhn, MS Olivier
822011
Acquisition of a Symbian smart phone’s content with an on-phone forensic tool
PM Mokhonoana, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2007
582007
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
562006
A model for spam prevention in voice over IP networks using anonymous verifying authorities
N Croft, M Olivier
Proceedings of the 5th Annual Information Security South Africa Conference …, 2005
55*2005
Specifying application-level security in workflow systems
MS Olivier, RP van de Riet, E Gudes
Database and Expert Systems Applications, 1998. Proceedings. Ninth …, 1998
551998
Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa
HN Olinger, JJ Britz, MS Olivier
The International Information & Library Review 39 (1), 31-43, 2007
522007
Database privacy: balancing confidentiality, integrity and availability
MS Olivier
ACM SIGKDD Explorations Newsletter 4 (2), 20-27, 2002
502002
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
482012
A multilevel secure federated database
MS Olivier
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
451994
Using an approximated one-time pad to secure short messaging service (SMS)
NJ Croft, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2005
442005
Building a secure database using self-protecting objects
MS Olivier, SH von Solms
Computers & Security 11 (3), 259-271, 1992
441992
The system can't perform the operation now. Try again later.
Articles 1–20