Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Venter HS, Eloff JHP, Li Y: 2008. Standardising vulnerability categories. Computers & Security, 27 / Apr, pp 71-83.
Tillwick H, Olivier MS: 2008. Bridging the gap between anonymous e-mail and anonymous web browsing. Online Information Review, 32 (1), pp 22-34.
Papers in refereed, published conference proceedings:
Koen R, Olivier MS: 2008. An evidence acquisition tool for live systems. In Advances in Digital Forensics IV, (25), IFIP, a Springer Series in Computer Science, pp 325-334.
Olivier MS: 2008. Using sensor dirt for toolmark analysis of digital photographs. In Advances in Digital Forensics IV, (16), IFIP, a Springer Series in Computer Science, pp 193-206.
Brandi W, Olivier MS, Zugenmaier A: 2008. Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Springer, pp 195-204.
Mokhonoana PM, Olivier MS: 2008. Application of Message Digests for the Verification of Logical Forensic Data. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-10.
Koen R, Olivier MS: 2008. The use of File Timestamps in Digital Forensics. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-15.
Kohn MD, Eloff JHP, Olivier MS: 2008. UML Modelling of Digital Forensic Process Models (DFPMs). In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-12.
Veerasamy N, Eloff JHP: 2008. Towards a Framework for a Network Warfare Capability. In Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA, pp 1-18.
Reddy K, Venter HS, Olivier MS, Currie I: 2008. Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. In Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, IEEE, pp 56-64.
Veerasamy N, Eloff JHP: 2008. The application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment. In Proceedings of World Academy of Science, Engineering and Technology, WASET, pp 567-573.
Adigun EA, Eloff JHP: 2008. Implementing a Trusted Service-Oriented Network Environment. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Telkom SA, pp 1-6.
|