Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Reddy K, Venter HS, Olivier MS: 2011. Using time-driven activity-based costing to manage digital forensic readiness in large organisations. Information Systems Frontiers, / Oct, p. Online.
Van Staden W, Olivier MS: 2011. On Compound Purposes and Compound Reasons for Enabling Privacy. Journal of Universal Computer Science (JUCS), 17 (3) / Feb, pp 426-450, Full Text
Olivier MS, Eloff JHP, Venter HS, Botes ME: 2011. Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. South African Computer Journal, 47, pp 47-57, Full Text
Croft NJ, Olivier MS: 2011. Location Privacy: Privacy, Efficiency and Resource through a Prohibitive Contract. Transactions on Data Privacy, 4, pp 19-30.
Papers in refereed, published conference proceedings:
Beyers HQ, Olivier MS, Hancke GP: 2011. Assembling Metadata for Database Forensics. In Advances in Digital Forensics VII, (1), Springer, pp 89-99.
Fouche MA, Olivier MS: 2011. Steganographic Techniques for Hiding Data in SWF Files. In Advances in Digital Forensics VII, (3), Springer, pp 245-255.
Vural I, Venter HS: 2011. Detecting Mobile Spam Botnets using Artificial Immune Systems. In Advances in Digital Forensics VII, (2), Springer, pp 183-192.
Adam R, Herselman M, Chuang CH, Smit D, Eloff JHP, Zielinski MP: 2011. Challenges of Evaluating a Living Lab in South Africa. In CIRN Prato Community Informatics Conference 2011, (1), pp 1-10.
Mouton F, Venter HS: 2011. A prototype for achieving digital forensic readiness on wireless sensor networks. In IEEE Africon 2011, (d), IEEE, pp 1-6 CD.
Dlamini MT, Eloff JHP, Zielinski MP, Chuang CH, Smit D: 2011. User-centric Information Security Systems - A Living Lab Approach. In Proceedings of the 10th European Conference on Information Warefare and Security, (1), Academic Publishers, UK, pp 73-80.
Burke I, Van Heerden R, Olivier MS: 2011. Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (5), IEEE, pp 103-110.
Serra SM, Venter HS: 2011. Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (2), IEEE, pp 204-209.
Van Staden FR, Venter HS: 2011. Adding digital forensic readiness to electronic communication using a security monitoring tool. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (3), IEEE, pp 170-174.
Valjarevic A, Venter HS: 2011. Towards a Digital Forensic Readiness Framework for Public Key Infrastructure Systems. In Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference, (4), IEEE, pp 160-169.
Bihina Bella MA, Olivier MS, Eloff JHP: 2011. Proposing a Digital Operational Forensic Investigation Process. In Proceedings of the 6th International Workshop on Digital Forensics & Incident Analysis WDFIA 2011, (1), University of Plymouth, pp 17-32.
Mouton F, Venter HS: 2011. Requirements for Wireless Sensor Networks in order to Achieve Digital Forensic Readiness. In Proceedings of the 6th International Workshop on Digital Forensics & Incident Analysis WDFIA 2011, (2), University of Plymouth, pp 108-121.
Dlamini MT, Eloff MM, Eloff JHP, Venter HS: 2011. A Budget Model for Information Security. In Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance HAISA 2011, (1), University of Plymouth, pp 47-57.
Grobler M, Flowerday S, Von Solms R, Venter HS: 2011. Cyber Awareness Initiatives in South Africa: A National Perspective. In Proceedings of the First IFIP TC9/TC11 Southern African Cyber Security Awareness Workshopp 2011, (1), Defence, Peace, Safety and Security, pp 32-41.
Dlamini MT, Venter HS, Eloff JHP, Eloff MM: 2011. Security of Cloud Computing: Seeing through the Fog. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2011, (h), Telkom, pp 1-6 CD.
|