Browsing Research Articles (Computer Science) by Author "Olivier, Martin S."

Browsing Research Articles (Computer Science) by Author "Olivier, Martin S."

Sort by: Order: Results:

  • Pieterse, Heloise; Olivier, Martin S. (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Strauss, Tinus; Kourie, Derrick G.; Olivier, Martin S. (Elsevier, 2008-11)
    In this paper, the simulated performance of a number of differentiated services traffic conditioners is studied under a range of synthetic traffic conditions. The traffic conditioners are compared using two performance ...
  • Beyers, Hector Quintus; Olivier, Martin S.; Hancke, Gerhard P. (Computer Society of South Africa, 2014-12)
    The application schema layer of a Database Management System (DBMS) can be modi ed to produce results that do not re ect the data actually stored in the database. For example, table structures may be corrupted by changing ...
  • Pieterse, Heloise; Olivier, Martin S. (Journal of Information Warfare, 2013)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Springer, 2019-01-25)
    Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Olivier, Martin S. (Computer Society of South Africa, 2016-12)
    Most members of the public probably had a rather vague notion of forensic science until various TV shows — starting with CSI — carried an image of a forensic utopia into our living rooms on a weekly basis. In general we ...
  • Olivier, Martin S. (Springer, 2020-08)
    Constructions of science that slowly change over time are deemed to be the basis of the reliability with which scientific knowledge is regarded. A potential paradigm shift based on big data is looming – many researchers ...
  • Bihina Bella, M.A. (Madeleine Adrienne); Eloff, Jan H.P.; Olivier, Martin S. (Elsevier, 2009)
    This paper proposes an original architecture for a fraud management system (FMS) for convergent. Nextgeneration networks (NGNs), which are based on the Internet protocol (IP). The architecture has the potential to satisfy ...
  • Hauger, W.K. (Werner); Olivier, Martin S. (South African Institute of Electrical Engineers, 2015-06)
    An aspect of database forensics that has not received much attention in the academic research community yet is the presence of database triggers. Database triggers and their implementations have not yet been thoroughly ...
  • Hauger, W.K. (Werner); Olivier, Martin S. (South African Institute of Electrical Engineers, 2018-06)
    NoSQL databases have gained a lot of popularity over the last few years. They are now used in many new system implementations that work with vast amounts of data. Such data will typically also include sensitive information ...
  • Van Staden, W.J.S. (Wynand Johannes Christiaan); Olivier, Martin S. (Graz University of Technology, 2011-02-01)
    This paper puts forward a verification method for compound purposes and compound reasons to be used during purpose limitation. When it is absolutely necessary to collect privacy related information, it is essential ...
  • Pieterse, H.; Olivier, Martin S.; Van Heerden, R.P. (South African Institute of Electrical Engineers, 2016-06)
    Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the ...
  • Olivier, Martin S. (Vaal Triangle Faculty of Northwest University in South Africa, 2015-11)
    This essay traces two research programmes in broad strokes. Both programmes start from the same observation — the behaviour of an ant (or termite) colony and the ability of the ant colony to act in a collective manner ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Elsevier, 2018-03)
    Ever improving smartphone technology, along with the widespread use of the devices to accomplish daily tasks, leads to the collection of rich sources of smartphone data. Smartphone data are, however, susceptible to change ...
  • Fei, B.K.L. (Bennie Kar Leung); Eloff, Jan H.P.; Olivier, Martin S.; Venter, H.S. (Hein) (Elsevier, 2006-10)
    The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation ...
  • Olivier, Martin S.; Eloff, Jan H.P.; Venter, H.S. (Hein); Botes, Mariette E. (Computer Society of South Africa, 2011-07)
    Donor funds are available for treatment of many diseases such as HIV. However, privacy constraints make it hard for donor organisations to verify that they have not sponsored the same patient twice | or sponsored a patient ...
  • Reddy, Kamil; Olivier, Martin S.; Venter, H.S. (Hein) (Springer, 2012-12)
    A digital forensic readiness (DFR) programme consists of a number of activities that should be chosen and managed with respect to cost constraints and risk. Traditional cost systems, however, can not provide the cost of ...