Martin S Olivier
Cited by
Cited by
An overview of image steganography
T Morkel, MS Olivier, JHP Eloff
Proceedings of the fifth annual Information Security South Africa Conference, 2005
Information Technology Research: A practical guide for Computer Science and Informatics, 3rd ed
MS Olivier
Van Schaik, 2009
Information Technology Research: A Practical Guide for Computer Science and Informatics, 2nd ed.
MS Olivier
Pretoria, South Africa, 2004
Framework for a digital forensic investigation
M Kohn, JHP Eloff, MS Olivier
Proceedings of Information Security South Africa (ISSA) 2006 from Insight to …, 2006
On metadata context in database forensics
MS Olivier
Digital Investigation 5 (3-4), 115-123, 2009
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
A taxonomy for secure object-oriented databases
MS Olivier, SH von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
Isolating a Cloud Instance for a Digital Forensic Investigation.
W Delport, M Köhn, MS Olivier
2011 Information Security for South Africa (ISSA 2011) Conference, 2011
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Advances in Digital Forensics, 113-123, 2005
Acquisition of a Symbian smart phone’s content with an on-phone forensic tool
PM Mokhonoana, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2007
Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa
HN Olinger, JJ Britz, MS Olivier
The International Information & Library Review 39 (1), 31-43, 2007
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
Database privacy: balancing confidentiality, integrity and availability
MS Olivier
ACM SIGKDD Explorations Newsletter 4 (2), 20-27, 2002
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14, 1061-1077, 2012
A model for spam prevention in voice over IP networks using anonymous verifying authorities
N Croft, M Olivier
Proceedings of the 5th Annual Information Security South Africa Conference …, 2005
Specifying application-level security in workflow systems
MS Olivier, RP van de Riet, E Gudes
Database and Expert Systems Applications, 1998. Proceedings. Ninth …, 1998
Using an approximated one-time pad to secure short messaging service (SMS)
NJ Croft, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2005
Ideal log setting for database forensics reconstruction
OM Adedayo, MS Olivier
Digital Investigation 12, 27-40, 2015
A multilevel secure federated database
MS Olivier
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
Building a secure database using self-protecting objects
MS Olivier, SH von Solms
Computers & Security 11 (3), 259-271, 1992
The system can't perform the operation now. Try again later.
Articles 1–20