


Остановите войну!
for scientists:


default search action
Martin S. Olivier
Martin Olivier 0001
Person information

- affiliation: University of Pretoria, South Africa
Other persons with the same name
- Martin Olivier 0002 — Laval University, CHUL, Québec City, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c105]Martin Olivier:
Digital Forensics and the Big Data Deluge - Some Concerns Based on Ramsey Theory. IFIP Int. Conf. Digital Forensics 2020: 3-23
2010 – 2019
- 2019
- [j34]Heloise Pieterse, Martin Olivier, Renier van Heerden:
Evaluation of smartphone data using a reference architecture. Int. J. Electron. Secur. Digit. Forensics 11(2): 160-182 (2019) - [c104]Heloise Pieterse, Martin S. Olivier
, Renier van Heerden:
Classifying the Authenticity of Evaluated Smartphone Data. IFIP Int. Conf. Digital Forensics 2019: 39-57 - 2018
- [j33]Heloise Pieterse, Martin Olivier
, Renier van Heerden:
Smartphone data evaluation model: Identifying authentic smartphone data. Digit. Investig. 24: 11-24 (2018) - [c103]Heloise Pieterse, Martin S. Olivier
, Renier van Heerden:
Detecting Manipulated Smartphone Data on Android and iOS Devices. ISSA (Revised Selected Papers) 2018: 89-103 - 2017
- [c102]Oluwasayo Oyelami, Martin Olivier
:
Establishing Findings in Digital Forensic Examinations: A Case Study Method. IFIP Int. Conf. Digital Forensics 2017: 3-21 - [c101]Heloise Pieterse, Martin S. Olivier
, Renier van Heerden:
Evaluating the Authenticity of Smartphone Evidence. IFIP Int. Conf. Digital Forensics 2017: 41-61 - [c100]Werner K. Hauger, Martin S. Olivier
:
Forensic attribution in NoSQL databases. ISSA 2017: 74-82 - 2016
- [j32]Martin S. Olivier
:
Digital Forensic Science: A Manifesto. South Afr. Comput. J. 28(2) (2016) - [c99]Martin S. Olivier:
On the Morality of Teaching Students IT Crime Skills: Extended Abstract. CSERC 2016: 2-3 - [c98]Martin Olivier
:
On a Scientific Theory of Digital Forensics. IFIP Int. Conf. Digital Forensics 2016: 3-24 - 2015
- [j31]Oluwasola Mary Adedayo
, Martin S. Olivier
:
Ideal log setting for database forensics reconstruction. Digit. Investig. 12: 27-40 (2015) - [c97]Segen Tewelde, Stefan Gruner, Martin S. Olivier
:
Notions of Hypothesis in Digital Forensics. IFIP Int. Conf. Digital Forensics 2015: 29-43 - [c96]Oluwasayo Oyelami, Martin S. Olivier
:
Using Yin's Approach to Case Studies as a Paradigm for Conducting Examinations. IFIP Int. Conf. Digital Forensics 2015: 45-59 - [c95]Werner K. Hauger, Martin S. Olivier
:
Determining Trigger Involvement During Forensic Attribution in Databases. IFIP Int. Conf. Digital Forensics 2015: 163-177 - [c94]Werner K. Hauger, Martin S. Olivier
:
The state of database forensic research. ISSA 2015: 1-8 - [c93]Martin S. Olivier
:
Towards a digital forensic science. ISSA 2015: 1-8 - [c92]Heloise Pieterse, Martin S. Olivier
, Renier P. van Heerden:
Playing hide-and-seek: Detecting the manipulation of Android Timestamps. ISSA 2015: 1-8 - 2014
- [j30]Heloise Pieterse, Martin S. Olivier
:
Bluetooth Command and Control channel. Comput. Secur. 45: 75-83 (2014) - [j29]Hector Beyers, Martin S. Olivier
, Gerhard P. Hancke:
Database application schema forensics. South Afr. Comput. J. 55: 1-11 (2014) - [c91]Oluwasola Mary Adedayo, Martin S. Olivier
:
Schema Reconstruction in Database Forensics. IFIP Int. Conf. Digital Forensics 2014: 101-116 - [c90]Heloise Pieterse, Martin S. Olivier
:
Smartphones as Distributed Witnesses for Digital Forensics. IFIP Int. Conf. Digital Forensics 2014: 237-251 - [c89]Werner K. Hauger, Martin S. Olivier
:
The role of triggers in database forensics. ISSA 2014: 1-7 - [p1]Martin S. Olivier
:
Catching the Bug: Pupils and Punched Cards in South Africa in the Late 1970s. Reflections on the History of Computers in Education 2014: 291-301 - 2013
- [c88]Martin S. Olivier
, Stefan Gruner:
On the Scientific Maturity of Digital Forensics Research. IFIP Int. Conf. Digital Forensics 2013: 33-49 - [c87]Heloise Pieterse, Martin S. Olivier
:
Security steps for smartphone users. ISSA 2013: 1-6 - 2012
- [j28]Oluwasola Mary Fasan
, Martin S. Olivier
:
Correctness proof for database reconstruction algorithm. Digit. Investig. 9(2): 138-150 (2012) - [j27]Kamil Reddy, H. S. Venter
, Martin S. Olivier
:
Using time-driven activity-based costing to manage digital forensic readiness in large organisations. Inf. Syst. Frontiers 14(5): 1061-1077 (2012) - [j26]Madeleine Adrienne Bihina Bella, Jan H. P. Eloff, Martin S. Olivier
:
Improving system availability with near-miss analysis. Netw. Secur. 2012(10): 18-20 (2012) - [c86]Oluwasola Mary Adedayo
, Martin S. Olivier
:
On the Completeness of Reconstructed Data for Database Forensics. ICDF2C 2012: 220-238 - [c85]Dirk Ras, Martin S. Olivier
:
Finding File Fragments in the Cloud. IFIP Int. Conf. Digital Forensics 2012: 169-185 - [c84]Waldo Delport, Martin S. Olivier
:
Isolating Instances in Cloud Forensics. IFIP Int. Conf. Digital Forensics 2012: 187-200 - [c83]Oluwasola Mary Fasan
, Martin S. Olivier
:
Reconstruction in Database Forensics. IFIP Int. Conf. Digital Forensics 2012: 273-287 - [c82]Heloise Pieterse, Martin S. Olivier
:
Data Hiding Techniques for Database Environments. IFIP Int. Conf. Digital Forensics 2012: 289-301 - [c81]Mark-Anthony Fouche, Martin S. Olivier
:
Using Internal Depth to Aid Stereoscopic Image Splicing Detection. IFIP Int. Conf. Digital Forensics 2012: 319-333 - [c80]Christien Kroeze, Martin S. Olivier
:
Gamifying authentication. ISSA 2012: 1-8 - [c79]Heloise Pieterse, Martin S. Olivier
:
Android botnets on the rise: Trends and characteristics. ISSA 2012: 1-5 - [c78]Waldo Delport, Martin S. Olivier
:
Cloud Separation: Stuck Inside the Cloud. TrustBus 2012: 36-49 - [c77]Oluwasola Mary Fasan, Martin S. Olivier:
On Dimensions of Reconstruction in Database Forensics. WDFIA 2012: 97-106 - [c76]Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
Arguments and Methods for Database Data Model Forensics. WDFIA 2012: 139-149 - 2011
- [j25]Wynand van Staden, Martin S. Olivier:
On Compound Purposes and Compound Reasons for Enabling Privacy. J. Univers. Comput. Sci. 17(3): 426-450 (2011) - [j24]Martin S. Olivier, Jan H. P. Eloff, Hein S. Venter, Mariette E. Botes:
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. South Afr. Comput. J. 47: 47-57 (2011) - [j23]Neil J. Croft, Martin S. Olivier:
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract. Trans. Data Priv. 4(1): 19-30 (2011) - [c75]Hector Beyers, Martin S. Olivier
, Gerhard P. Hancke:
Assembling Metadata for Database Forensics. IFIP Int. Conf. Digital Forensics 2011: 89-99 - [c74]Mark-Anthony Fouche, Martin S. Olivier
:
Steganographic Techniques for Hiding Data in SWF Files. IFIP Int. Conf. Digital Forensics 2011: 245-255 - [c73]Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. ISSA 2011 - [c72]Ivan Daniel Burke, Martin S. Olivier:
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. ISSA 2011 - [c71]Waldo Delport, Michael Köhn, Martin S. Olivier:
Isolating a cloud instance for a digital forensic investigation. ISSA 2011 - [c70]Anastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper:
Nature and Forensic investigation of crime in Second Life. ISSA 2011 - [c69]Tinus Strauss, Martin S. Olivier:
Network Forensics in a Clean-Slate Internet Architecture. ISSA 2011 - [c68]Mark-Anthony Fouche, Martin S. Olivier
:
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps. SAICSIT 2011: 271-274 - [c67]Madeleine Adrienne Bihina Bella, Martin Olivier, Jan H. P. Eloff:
Proposing a Digital Operational Forensic Investigation Process . WDFIA 2011: 17-32 - 2010
- [j22]Neil J. Croft, Martin S. Olivier
:
Sequenced release of privacy-accurate information in a forensic investigation. Digit. Investig. 7(1-2): 95-101 (2010) - [j21]Marek P. Zielinski, Martin S. Olivier
:
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation. Data Knowl. Eng. 69(5): 399-423 (2010) - [c66]Hendrik Visage, Martin S. Olivier:
A Generalized model for understanding and education of Information and Computer Security. ISSA 2010 - [c65]Wesley Brandi, Martin S. Olivier
:
In Search of Search Privacy. TrustBus 2010: 102-116
2000 – 2009
- 2009
- [j20]Martin S. Olivier
:
On metadata context in Database Forensics. Digit. Investig. 5(3-4): 115-123 (2009) - [c64]Hendrik J. G. Oberholzer, Martin S. Olivier
:
Emergency Privacy Measures. CSE (3) 2009: 324-329 - [c63]Innocentia Dlamini, Martin S. Olivier
, Sihle Sibiya:
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling. DEXA Workshops 2009: 145-149 - [c62]Marek P. Zielinski, Martin S. Olivier:
How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation. ISSA 2009: 171-188 - [c61]Innocentia Dlamini, Martin S. Olivier:
The Design of a Logical Traffic Isolation Forensic Model. ISSA 2009: 407-418 - [c60]Innocentia Zamaswazi Dlamini, Martin Olivier, Marthie Grobler:
A Simulation of Logical Traffic Isolation Using Differentiated Services. WDFIA 2009: 20-32 - [c59]Kweku Kwakye Arthur, Martin S. Olivier:
Processing Algorithms for Components within a Forensic Evidence Management System. WDFIA 2009: 53-62 - [c58]Dirk Kotze, Martin S. Olivier:
XBRL-Trail --- A model for introducing digital forensic readiness to XBRL. WDFIA 2009: 93-104 - 2008
- [j19]Tinus Strauss, Derrick G. Kourie, Martin S. Olivier
:
A comparison of simulated traffic conditioner performance. Comput. Commun. 31(17): 3933-3940 (2008) - [j18]Heiko Tillwick, Martin S. Olivier
:
Bridging the gap between anonymous e-mail and anonymous web browsing. Online Inf. Rev. 32(1): 22-34 (2008) - [j17]Martin S. Olivier:
On the probability of a false positive match for digital camera identification based on sensor dirt location. South Afr. Comput. J. 41: 21-28 (2008) - [c57]Kweku Kwakye Arthur, Martin S. Olivier
, Hein S. Venter
, Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393 - [c56]Martin S. Olivier
:
Using Sensor Dirt for Toolmark Analysis of Digital Photographs. IFIP Int. Conf. Digital Forensics 2008: 193-206 - [c55]Renico Koen, Martin S. Olivier
:
An Evidence Acquisition Tool for Live Systems. IFIP Int. Conf. Digital Forensics 2008: 325-334 - [c54]Renico Koen, Martin S. Olivier:
The Use of File Timestamps in Digital Forensics. ISSA 2008: 1-16 - [c53]Michael Köhn, Jan H. P. Eloff, Martin S. Olivier:
UML Modelling of Digital Forensic Process Models (DFPMs). ISSA 2008: 1-13 - [c52]Pontjho Mokhonoana, Martin S. Olivier:
Application of Message Digests for the Verification of Logical Forensic Data. ISSA 2008: 1-11 - [c51]Kamil Reddy, H. S. Venter
, Martin S. Olivier
, Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64 - [c50]Wesley Brandi, Martin S. Olivier
, Alf Zugenmaier:
Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. TrustBus 2008: 195-204 - 2007
- [c49]Dirk Kotze, Martin S. Olivier
:
Patlet for Digital Forensics First Responders. DEXA Workshops 2007: 770-774 - [c48]Kweku Kwakye Arthur, Martin S. Olivier
, Hein S. Venter
:
Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327 - [c47]Wynand van Staden
, Martin S. Olivier
:
SQL's revoke with a view on privacy. SAICSIT 2007: 181-188 - [c46]Wynand van Staden
, Martin S. Olivier
:
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. TrustBus 2007: 201-209 - 2006
- [j16]Hendrik J. G. Oberholzer, Martin S. Olivier:
Privacy contracts incorporated in a privacy protection framework. Comput. Syst. Sci. Eng. 21(1) (2006) - [j15]Wesley Brandi, Martin S. Olivier:
Exposing anonymous network participants via an external attack. South Afr. Comput. J. 37: 12-18 (2006) - [c45]Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65 - [c44]Marco Slaviero, Anna Granova, Martin S. Olivier:
Active Traffic Capture for Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 215-228 - [c43]Tinus Strauss, Martin S. Olivier, Derrick G. Kourie:
Logical Traffic Isolation Using Differentiated Services. IFIP Int. Conf. Digital Forensics 2006: 229-237 - [c42]Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter:
Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258 - [c41]Wesley Brandi, Martin S. Olivier:
On bidder zones, cell phones and ballot stuffing. ISSA 2006: 1-11 - [c40]Neil J. Croft, Martin S. Olivier:
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. ISSA 2006: 1-14 - [c39]Michael Köhn, Martin S. Olivier, Jan H. P. Eloff:
Framework for a Digital Forensic Investigation. ISSA 2006: 1-7 - [c38]T. Morkel, Jan H. P. Eloff, Martin S. Olivier:
Using Image Steganography for Decryptor Distribution. OTM Workshops (1) 2006: 322-330 - [c37]Wesley Brandi, Martin S. Olivier
:
Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. TrustBus 2006: 81-90 - [c36]Wynand van Staden
, Martin S. Olivier
:
Extending SQL to Allow the Active Usage of Purposes. TrustBus 2006: 123-131 - [c35]Thorsten Neumann, Heiko Tillwick, Martin S. Olivier
:
Information Leakage in Ubiquitous Voice-over-IP Communications. TrustBus 2006: 233-242 - [e2]Martin S. Olivier, Sujeet Shenoi:
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006. IFIP Advances in Information and Communication Technology 222, Springer 2006, ISBN 978-0-387-36890-0 [contents] - 2005
- [j14]Martin S. Olivier:
Flocks : distributed proxies for browsing privacy. South Afr. Comput. J. 34: 33-40 (2005) - [c34]Hendrik J. G. Oberholzer, Martin S. Olivier
:
Privacy Contracts as an Extension of Privacy Policies. ICDE Workshops 2005: 1192 - [c33]Martin S. Olivier:
Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. IFIP Int. Conf. Digital Forensics 2005: 17-31 - [c32]Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112 - [c31]Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123 - [c30]T. Morkel, Jan H. P. Eloff, Martin S. Olivier:
An overview of image steganography. ISSA 2005: 1-11 - [c29]Marco Slaviero, Jaco Kroon, Martin S. Olivier:
Attacking Signed Binaries. ISSA 2005: 1-10 - 2004
- [j13]Hein S. Venter
, Martin S. Olivier
, Jan H. P. Eloff:
PIDS: a privacy intrusion detection system. Internet Res. 14(5): 360-365 (2004) - [j12]Martin S. Olivier:
Using organisational safeguards to make justifiable privacy decisions when processing personal data. South Afr. Comput. J. 33: 77-87 (2004) - 2003
- [j11]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases. J. Comput. Secur. 11(3): 353-364 (2003) - [j10]Martin S. Olivier:
A layered architecture for privacy - enhancing technologies. South Afr. Comput. J. 31: 53-61 (2003) - [c28]Martin S. Olivier
:
Privacy under Conditions of Concurrent Interaction with Multiple Parties. DBSec 2003: 105-118 - 2002
- [j9]Martin S. Olivier
, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. Data Knowl. Eng. 43(3): 281-292 (2002) - [j8]Wesley Brandi, Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects. Informatica (Slovenia) 26(2) (2002) - [j7]Frans A. Lategan, Martin S. Olivier:
PrivGuard : a model to protect private information based on its usage. South Afr. Comput. J. 29: 58-68 (2002) - [j6]Martin S. Olivier
:
Database Privacy. SIGKDD Explor. 4(2): 20-27 (2002) - [c27]Frans A. Lategan, Martin S. Olivier
:
A Chinese Wall Approach to Privacy Policies for the Web. COMPSAC 2002: 940-944 - [c26]Lucas C. J. Dreyer, Martin S. Olivier:
Implementing Workflow Systems. DBSec 2002: 61-72 - [c25]David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham:
Privacy and Civil Liberties. DBSec 2002: 331-346 - [e1]Martin S. Olivier, David L. Spooner:
Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. IFIP Conference Proceedings 215, Kluwer 2002, ISBN 1-4020-7041-1 [contents] - 2001
- [j5]Martin S. Olivier
:
Towards a configurable security architecture. Data Knowl. Eng. 38(2): 121-145 (2001) - [j4]Adéle Martins, Nico Martins, Martin S. Olivier:
Consumer perception of electronic-commerce. South Afr. Comput. J. 27: 27-33 (2001) - [c24]Alexandre Hardy, Martin S. Olivier:
A Comparison Between ConSA and Current Linux Security Implementations. DBSec 2001: 211-224 - [c23]David L. Spooner, Martin S. Olivier:
Selected Summary of Discussions. DBSec 2001: 325-335 - [c22]Wesley Brandi, Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects. Conference on Information Security Management & Small Systems Security 2001: 45-56 - [c21]Frans A. Lategan, Martin S. Olivier
:
On granting limited access to private information. WWW 2001: 21-25 - 2000
- [c20]Alexandre Hardy, Martin S. Olivier
:
A Configurable Security Architecture Prototype. DBSec 2000: 51-62 - [c19]Martin S. Olivier
, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160 - [c18]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
:
WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 - [c17]Reind P. van de Riet, Wouter Janssen, Martin S. Olivier
, Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301 - [c16]Frans A. Lategan, Martin S. Olivier:
Enforcing Privacy by Withholding Private Information. SEC 2000: 421-430