Martin S Olivier
Martin S Olivier
Professor of Computer Science, University of Pretoria
Verified email at - Homepage
Cited by
Cited by
An overview of image steganography
T Morkel, MS Olivier, JHP Eloff
Proceedings of the fifth annual Information Security South Africa Conference, 2005
Information Technology Research: A practical guide for Computer Science and Informatics, 3rd ed
MS Olivier
Van Schaik, 2009
Information Technology Research: A Practical Guide for Computer Science and Informatics, 2nd ed.
MS Olivier
Pretoria, South Africa, 2004
Framework for a digital forensic investigation
M Kohn, JHP Eloff, MS Olivier
Proceedings of Information Security South Africa (ISSA) 2006 from Insight to …, 2006
On metadata context in database forensics
MS Olivier
Digital Investigation 5 (3-4), 115-123, 2009
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
A taxonomy for secure object-oriented databases
MS Olivier, SH von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
Isolating a Cloud Instance for a Digital Forensic Investigation.
W Delport, M Köhn, MS Olivier
2011 Information Security for South Africa (ISSA 2011) Conference, 2011
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Advances in Digital Forensics, 113-123, 2005
Acquisition of a Symbian smart phone’s content with an on-phone forensic tool
PM Mokhonoana, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2007
Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa
HN Olinger, JJ Britz, MS Olivier
The International Information & Library Review 39 (1), 31-43, 2007
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
Database privacy: balancing confidentiality, integrity and availability
MS Olivier
ACM SIGKDD Explorations Newsletter 4 (2), 20-27, 2002
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
A model for spam prevention in voice over IP networks using anonymous verifying authorities
N Croft, M Olivier
Proceedings of the 5th Annual Information Security South Africa Conference …, 2005
Specifying application-level security in workflow systems
MS Olivier, RP van de Riet, E Gudes
Database and Expert Systems Applications, 1998. Proceedings. Ninth …, 1998
Using an approximated one-time pad to secure short messaging service (SMS)
NJ Croft, MS Olivier
Proceedings of the Southern African Telecommunication Networks and …, 2005
A multilevel secure federated database
MS Olivier
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
Building a secure database using self-protecting objects
MS Olivier, SH von Solms
Computers & Security 11 (3), 259-271, 1992
Ideal log setting for database forensics reconstruction
OM Adedayo, MS Olivier
Digital Investigation 12, 27-40, 2015
The system can't perform the operation now. Try again later.
Articles 1–20