Browsing Engineering, Built Environment and Information Technology by Supervisor "Olivier, Martin S."

Browsing Engineering, Built Environment and Information Technology by Supervisor "Olivier, Martin S."

Sort by: Order: Results:

  • Oyelami, Oluwasayo Oyeyemi (University of Pretoria, 2018)
    At the heart of any forensic science discipline, there is the need to ensure that the method applied in the discipline is based on a valid scienti c method. The aim of any forensic examination is to make veri able and ...
  • De Souza, Pedro (University of Pretoria, 2013)
    Digital Forensic investigations play a vital role in our technologically enhanced world, and it may incorporate a number of different types of evidence — ranging from digital to physical. During a Digital Forensics ...
  • Arthur, Kweku Kwakye (University of Pretoria, 2010-09-13)
    The decentralized nature of the Internet forms its very foundation, yet it is this very nature that has opened networks and individual machines to a host of threats and attacks from malicious agents. Consequently, forensic ...
  • Du Plessis, Maureen; University of Pretoria. Faculty of Engineering, Built Environment and Information Technology. Dept. of Information Science (University of Pretoria. Faculty of Engineering, Built Environment and Information Technology. Dept. of Information Science, 2008-12)
    Since the inception of the Internet, extremist groups have established an online presence. It was in 1984 that extremist groups started using online services such as bulletin boards to transmit text. Throughout the years, ...
  • Fei, B.K.L. (Bennie Kar Leung) (University of Pretoria, 2007-07-09)
    As digital crimes have risen, so has the need for digital forensics. Numerous state-of-the-art tools have been developed to assist digital investigators conduct proper investigations into digital crimes. However, digital ...
  • Beyers, Hector Quintus (University of Pretoria, 2013)
    The use of databases has become an integral part of modern human life. Often the data contained within databases has substantial value to enterprises and individuals. As databases become a greater part of people’s daily ...
  • Pieterse, Heloise (University of Pretoria, 2014)
    Mobile devices have excelled in the 21st century due to the increasing popularity and continuous improvement of mobile technology. Today mobile devices have become all-in-one portable devices, providing inter-connectivity, ...
  • Koen, Renico (University of Pretoria, 2009-06-29)
    The rate at which technology evolves by far outpaces the rate at which methods are developed to prevent and prosecute digital crime. This unfortunate situation may potentially allow computer criminals to commit crimes using ...
  • Rakitianskaia, A.S. (Anastassia Sergeevna) (University of Pretoria, 2015)
    Computers and the internet have become an integral part of our lives. People have grown accustomed to feeling constantly connected to the outside world, and in the past couple of decades online social networks and ...
  • Pieterse, Heloise (University of Pretoria, 2019-07-09)
    Mobile technology continues to evolve in the 21st century, providing end-users with mobile devices that support improved capabilities and advance functionality. This ever-improving technology allows smartphone platforms, ...
  • Hauger, Werner Karl (University of Pretoria, 2018)
    An aspect of database forensics that has not yet received much attention in the academic research community is the attribution of actions performed in a database. When forensic attribution is performed for actions executed ...
  • Hauger, Werner Karl (University of Pretoria, 2018)
    An aspect of database forensics that has not yet received much attention in the academic research community is the attribution of actions performed in a database. When forensic attribution is performed for actions executed ...
  • Delport, Waldo (University of Pretoria, 2013)
    Cloud computing is gaining acceptance and also increasing in popularity. Organisations often rely on cloud resources as an effective replacement for their `in-house' computer systems. In the cloud, virtual resources are ...
  • Brandi, Wesley Antonio (University of Pretoria, 2011-08-11)
    Search engines have become integral to the way in which we use the Web of today. Not only are they an important real time source of links to relevant information, but they also serve as a starting point to the Web. A ...
  • Delport, Johannes Petrus (University of Pretoria, 2008-09-19)
    Knowledge of a network’s entities and the physical connections between them, a network’s physical topology, can be useful in a variety of network scenarios and applications. Administrators can use topology information for ...
  • Van Staden, W.J.S. (Wynand Johannes Christiaan) (University of Pretoria, 2011)
    The protection of privacy related information of the individual is receiving increasing attention. Particular focus is on the protection of user interaction with other users or service providers. Protection of this interaction ...
  • Medina Meza, Nelly Soledad (University of Pretoria, 2010-10-27)
    The automation of the election process has been experimented in many countries during recent years, to demonstrate that it accelerates the election process and that it offers many advantages; however, such automation also ...
  • Croft, Neil John (University of Pretoria, 2011-10-04)
    The introduction of mobile communications has undoubtedly altered our physical and social world. Like the Internet, it has changed the way we interact with each other allowing for communication using a variety of communication ...
  • Zielinski, Marek Piotr (University of Pretoria, 2010-09-13)
    Statistical data, such as in the form of microdata, is used by different organisations as a basis for creating knowledge to assist in their planning and decision-making activities. However, before microdata can be made ...
  • Tillwick, Heiko Mark (University of Pretoria, 2007-07-09)
    User tracking and profiling is a growing threat to online privacy. Whilst Internet users can choose to withhold their personal information, their Internet usage can still be traced back to a unique IP address. This study ...