“On Generic Digital Forensic Readiness” M. S. Olivier. “On Generic Digital Forensic Readiness”. In: AAFS 72ndAnnual Scientific Meeting. Anaheim, CA, USA, Feb. 2020
“Medico-legal examinations as a paradigm for digital examinations” M. S. Olivier. “Medico-legal examinations as a paradigm for digital
examinations”. In: Program and Abstracts — The Eleventh ISABSConference on Forensic and Anthropologic Genetics and Mayo ClinicLectures in Individualized Medicine. Ed. by D. Primorac et al. Invited
paper. International Society for Applied and Biological Sciences, June
2019, p. 97
“Evaluation of Smartphone Data using a Reference Architecture” H. Pieterse, M. S. Olivier, and R. van Heerden. “Evaluation of Smartphone
Data using a Reference Architecture”. In: International Journal ofElectronic Security and Digital Forensics 11.2 (2019), pp. 160–182
“Classifying the Authenticity of Evaluated Smartphone Data” H. Pieterse, M. S. Olivier, and R. van Heerden. “Classifying the
Authenticity of Evaluated Smartphone Data”. In: Advances in DigitalForensics XV. Ed. by G Peterson and S Shenoi. Advances in Information
and Communication Technology. Springer, 2019, pp. 39–57
“Detecting Manipulated Smartphone Data on Android and iOS Devices” H. Pieterse, M. S. Olivier, and R. van Heerden. “Detecting Manipulated
Smartphone Data on Android and iOS Devices”. In: Information Security.17th International Conference, ISSA 2018, Pretoria, South Africa, August15–16, 2018, Revised Selected Papers. Ed. by H. S. Venter et al. Vol. 973.
Communications in Computer and Information Science. Springer, 2019,
pp. 89–103
“Forensic attribution in NoSQL databases” W. Hauger and M. S. Olivier. “Forensic attribution in NoSQL databases”.
In: 2017 Information Security for South Africa (ISSA). Ed. by H. S. Venter
et al. IEEE, Aug. 2017, pp. 74–82
“Establishing Findings in Digital Forensic Examinations” O. Oyelami and M. S. Olivier. “Establishing Findings in Digital Forensic
Examinations”. In: Advances in Digital Forensics XIII. Ed. by G. Peterson
and S. Shenoi. Springer, 2017, pp. 3–21
“Evaluating the Authenticity of Smartphone Evidence” H. Pieterse, M. S. Olivier, and R. van Heerden. “Evaluating the
Authenticity of Smartphone Evidence”. In: Advances in Digital ForensicsXIII. Ed. by G. Peterson and S. Shenoi. Springer, 2017, pp. 41–61
2016
“Digital forensic science: A manifesto” M. S. Olivier. “Digital forensic science: A manifesto”. In: South AfricanComputer Journal 28.2 (2016). Editorial, pp. 46–49
“On the Morality of Teaching Students IT Crime Skills” M. S. Olivier. “On the Morality of Teaching Students IT Crime Skills”.
In: ICT Education. 45th Annual Conference of the Southern AfricanComputer Lecturers’ Association (SACLA 2016), Cullinan, South Africa,July 5–6, 2016, Revised Selected Papers. Ed. by S. Gruner. Invited keynote
lecture. 2016, pp. 3–21
“The smartphone evidence awareness framework for the users” I. Z. Dlamini, M. S. Olivier, and M. Grobler. “The smartphone
evidence awareness framework for the users”. In: Proceedings of the 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016).
Ed. by T. Zlateva and V. Greiman. Mar. 2016
“On a scientific theory of digital forensics” M. S. Olivier. “On a scientific theory of digital forensics”. In: Advances inDigital Forensics XII. Ed. by G. Peterson and S. Shenoi. Springer, 2016,
pp. 3–24
“Towards a digital forensic science” M. S. Olivier. “Towards a digital forensic science”. In: Information Securityfor South Africa (ISSA). Ed. by H. S. Venter et al. IEEE, Aug. 2015
“The state of Database Forensic research” W. Hauger and M. S. Olivier. “The state of Database Forensic research”.
In: Information Security for South Africa (ISSA). Ed. by H. S. Venter
et al. IEEE, Aug. 2015
“Modelling Digital Autopsies on Medical Autopsies” M. S. Olivier. “Modelling Digital Autopsies on Medical Autopsies”. In:
American Academy of Forensic Sciences 67th Annual Scientific Meeting.
Orlando, FL, USA, 2015
“Notions of “Hypothesis” in Digital Forensics” S. Tewelde, M. S. Olivier, and S. Gruner. “Notions of “Hypothesis”
in Digital Forensics”. In: Advances in Digital Forensics XI. Ed. by G.
Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information and
Communication Technology. Springer, 2015, pp. 29–43
“Determining Trigger Involvement During Forensic Attribution in
Databases” W. Hauger and M. S. Olivier. “Determining Trigger Involvement During
Forensic Attribution in Databases”. In: Advances in Digital Forensics XI.
Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information
and Communication Technology. Springer, 2015, pp. 163–177
“Using Yin’s Approach to Case Studies as a Paradigm for Conducting
Examinations” O. Oyelami and M. S. Olivier. “Using Yin’s Approach to Case Studies
as a Paradigm for Conducting Examinations”. In: Advances in DigitalForensics XI. Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances
in Information and Communication Technology. Springer, 2015, pp. 45–59
2014
“Database Forensics” M. S. Olivier. “Database Forensics”. In: Official (ISC)2® Guide to theCCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 683–706
“Malware Forensics” M. S. Olivier. “Malware Forensics”. In: Official (ISC)2® Guide to theCCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 707–737
“A Near-Miss Management System to Facilitate Forensic Investigation of
Software Failures” M. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A Near-Miss
Management System to Facilitate Forensic Investigation of Software
Failures”. In: Proceedings of the 13th European Conference on CyberWarfare and Security. Ed. by A. Liaropoulos and G. Tsihrintzis. Academic
Conferences, 2014, pp. 233–241
“The role of triggers in database forensics” W. K. Hauger and M. S. Olivier. “The role of triggers in database
forensics”. In: Information Security South Africa 2014 (ISSA 2014).
Johannesburg, South Africa, Aug. 2014
“Database Application Schema Forensics” H. Beyers, M. S. Olivier, and G. P. Hancke. “Database Application Schema
Forensics”. In: South African Computer Journal 55 (2014)
“Bluetooth Command and Control channel” H. Pieterse and M. S. Olivier. “Bluetooth Command and Control channel”.
In: Computers & Security 45 (2014), pp. 75–83
“Catching the bug: pupils and punched cards in South Africa in the late
1970s” M. S. Olivier. “Catching the bug: pupils and punched cards in South
Africa in the late 1970s”. In: Reflections on the History of Computers inEducation — Early Use of Computers and Teaching about Computing inSchools. Ed. by A. Tatnall and B. Davey. Vol. 424. IFIP Advances in
Information and Communication Technology. Springer, 2014, pp. 291–301
“Smartphones as Distributed Witnesses for Digital Forensics” H. Pieterse and M. S. Olivier. “Smartphones as Distributed Witnesses for
Digital Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson
and S. Shenoi. Springer, 2014, pp. 237–251
“Schema Reconstruction in Database Forensics” O. M. Adedayo and M. S. Olivier. “Schema Reconstruction in Database
Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson and
S. Shenoi. Springer, 2014, pp. 101–116
2013
“Security Steps for Smartphone Users” H. Pieterse and M. S. Olivier. “Security Steps for Smartphone Users”.
In: Information Security South Africa — 13th Annual Conference (ISSA2013). Johannesburg, South Africa: IEEE, Aug. 2013
“On Complex Crimes and Digital Forensics” M. S. Olivier. “On Complex Crimes and Digital Forensics”. In:
Information Security in Diverse Computing Environments. Ed. by
A. V. D. M. Kayem and C. Meinel. IGI, 2014, pp. 230–244
“On the Scientific Maturity of Digital Forensics Research” M. S. Olivier and S. Gruner. “On the Scientific Maturity of Digital
Forensics Research”. In: Advances in Digital Forensics IX. Ed. by
G. Peterson and S. Shenoi. IFIP Advances in Information and
Communication Technology — Advances in Digital Forensics. Springer,
2013, pp. 33–49
“A Taxonomy of Web Service Attacks” K. F. P. Chan, M. S. Olivier, and R. P. van Heerden. “A Taxonomy
of Web Service Attacks”. In: Proceedings of ICIW 2013 — The 8thInternational Conference on Information Warfare and Security. Ed. by
D. Hart. Denver, Colorado, USA: Academic Conferences and Publishing,
Mar. 2013, pp. 34–42
“On the completeness of reconstructed data for database forensics” O. M. Adedayo and M. S. Olivier. “On the completeness of reconstructed
data for database forensics”. In: Digital Forensics and Cyber Crime. Ed.
by M. Rogers and K. C. Seigfried-Spellar. Lecture Notes of the Institute
for Computer Sciences, Social Informatics and Telecommunications
Engineering 114. Springer, 2013, pp. 220–238
“Gamifying Authentication” C. J. Kroeze and M. S. Olivier. “Gamifying Authentication”. In:
Information Security for South Africa (ISSA), 2012. IEEE, Aug. 2012,
pp. 1–8
“Cloud Separation: Stuck inside the cloud” W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”.
In: Trust, Privacy and Security in Digital Business — 9th Internationalconference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings.
Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449.
Springer, 2012, pp. 36–49
“Database forensics” O. M. Fasan and M. S. Olivier. “Database forensics”. In: Proceedings ofthe NCS ReCITI. Akwa Ibom, Nigeria, July 2012
“On Dimensions of Reconstruction in Database Forensics” O. M. Fasan and M. S. Olivier. “On Dimensions of Reconstruction
in Database Forensics”. In: Seventh International Annual Workshop onDigital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete,
Greece, June 2012, pp. 97–106
“Arguments and Methods for Database Data Model Forensics” H. Q. Beyers, M. S. Olivier, and G. P. Hancke. “Arguments and Methods
for Database Data Model Forensics”. In: Seventh International Workshopon Digital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete,
Greece, June 2012, pp. 139–149
“Isolating instances in the cloud” W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 187–200
“Reconstruction in Database Forensics” O. M. Fasan and M. S. Olivier. “Reconstruction in Database Forensics”.
In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 273–287
“Using Internal Depth to Aid Stereoscopic Image Splicing Detection” M.-A. Fouché and M. S. Olivier. “Using Internal Depth to Aid Stereoscopic
Image Splicing Detection”. In: Advances in Digital Forensics VIII. Ed. by
G. Peterson and S. Shenoi. Springer, 2012, pp. 319–333
“Data Hiding Techniques for Database Environments” H. Pieterse and M. S. Olivier. “Data Hiding Techniques for Database
Environments”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson
and S. Shenoi. Springer, 2012, pp. 289–301
“Finding File Fragments in the Cloud” D. Ras and M. S. Olivier. “Finding File Fragments in the Cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 169–185
2011
“Detecting non-stereoscopic to stereoscopic image splicing with the use of
disparity maps” M.-A. Fouché and M. S. Olivier. “Detecting non-stereoscopic to
stereoscopic image splicing with the use of disparity maps”. In: Proceedingsof the South African Institute of Computer Scientists and InformationTechnologists Conference on Knowledge, Innovation and Leadership in aDiverse, Multidisciplinary Environment. SAICSIT ’11. Cape Town, South
Africa: ACM, 2011, pp. 271–274. isbn: 978-1-4503-0878-6
“Proposing a Digital Operational Forensic Investigation Process” M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “Proposing a Digital
Operational Forensic Investigation Process”. In: Proceedings of the sixthInternational Workshop on Digital Forensics & Incident Analysis. Ed. by
N. Clarke and T. Tryfonas. London, UK, July 2011, pp. 17–32
“Analysing the fairness of trust-based Mobile Ad Hoc Network protocols” I. D. Burke and M. S. Olivier. “Analysing the fairness of trust-based
Mobile Ad Hoc Network protocols”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Published electronically).
Johannesburg, South Africa, Aug. 2011
“Network Forensics in a Clean-slate Internet Architecture” T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet
Architecture”. In: Proceedings of the 2011 Information Security for SouthAfrica (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M.
Loock. (Published electronically). Aug. 2011
“Nature and Forensic Investigation of Crime in Second Life” A. S. Rakitianskaia, M. S. Olivier, and A. K. Cooper. “Nature and
Forensic Investigation of Crime in Second Life”. In: Proceedings of the2011 Information Security for South Africa (ISSA 2011) Conference. Ed.
by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“An Approach to Examine the Metadata and Data of a Database
Management System by making use of a Forensic Comparison Tool” H. Beyers, M. S. Olivier, and G. P. Hancke. “An Approach to Examine
the Metadata and Data of a Database Management System by making
use of a Forensic Comparison Tool”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“Isolating a Cloud Instance for a Digital Forensic Investigation” W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud
Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“SWF Steganography: Techniques for Hiding Data in SWF Files” M.-A. Fouche and M. S. Olivier. “SWF Steganography: Techniques for
Hiding Data in SWF Files”. In: Advances in Digital Forensics VII. Ed. by
G. Peterson and S. Shenoi. Springer, 2011, pp. 245–255
“Assembling the Metadata for a Database Forensic Examination” H. Beyers, M. S. Olivier, and G. P. Hancke. “Assembling the Metadata
for a Database Forensic Examination”. In: Advances in Digital ForensicsVII. Ed. by G. Peterson and S. Shenoi. Springer, 2011, pp. 89–99
“A Generalized model for understanding and education of Information
and Computer Security” H. Visage and M. S. Olivier. “A Generalized model for understanding
and education of Information and Computer Security”. In: Proceedingsof the ISSA 2010 Conference. Ed. by H. S. Venter, M. Coetzee, and
L. Labuschagne. (Research in progress paper, published electronically).
Johannesburg, South Africa, Aug. 2010
“In Search of Search Privacy” W. Brandi and M. S. Olivier. “In Search of Search Privacy”. In:
Proceedings of the 7th International Conference on Trust, Privacy andSecurity in Digital Business (TrustBus 2010). Ed. by S. Katsikas, J. Lopez,
and M. Soriano. Vol. 6264. Lecture Notes in Computer Science. 2010,
pp. 102–116
“Framework for Developing Realistic MANET Simulations” I. Burke, S. Naidoo, and M. S. Olivier. “Framework for Developing
Realistic MANET Simulations”. In: Proceedings of ICIW 2010 —The 5th International Conference on Information-Warfare & Security.
Wright-Patterson Air Force Base, Ohio, USA, Apr. 2010, pp. 65–71
“Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling” I. Z. Dlamini, M. S. Olivier, and S. Sibiya. “Pattern-Based Approach for
Logical Traffic Isolation Forensic Modelling”. In: Twentieth InternationalWorkshop on Database and Expert Systems Applications. Ed. by A. M.
Tjoa and R. R. Wagner. IEEE Computer Society, 2009, pp. 145–149
“Emergency Privacy Measures” H. J. G. Oberholzer and M. S. Olivier. “Emergency Privacy Measures”.
In: International Conference on Computational Science and Engineering,2009 (CSE ’09). Vol. 3. IEEE, 2009, pp. 324–329
“The design of a logical traffic isolation forensic model” I. Z. Dlamini and M. S. Olivier. “The design of a logical traffic isolation
forensic model”. In: Proceedings of the ISSA 2009 Conference. Ed. by H. S.
Venter, M. Coetzee, and L. Labuschagne. (Research in progress paper,
published electronically). Johannesburg, South Africa, July 2009
“A Simulation of Logical Traffic Isolation Using Differentiated Services” I. Z. Dlamini, M. S. Olivier, and M. Grobler. “A Simulation of Logical
Traffic Isolation Using Differentiated Services”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 20–27
“Processing Algorithms for Components within a Forensic Evidence
Management System” K. K. Arthur and M. S. Olivier. “Processing Algorithms for Components
within a Forensic Evidence Management System”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 53–62
“XBRL-Trail: A model for introducing digital forensic readiness to XBRL” D. J. J. Kotze and M. S. Olivier. “XBRL-Trail: A model for
introducing digital forensic readiness to XBRL”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 93–104
“Preservation of Privacy in Thwarting the Ballot Stuffing Scheme” W. Brandi, M. S. Olivier, and A. Zugenmaier. “Preservation of Privacy in
Thwarting the Ballot Stuffing Scheme”. In: Trust, Privacy and Security inDigital Business. Ed. by S. Furnell, S. K. Katsikas, and A. Lioy. Vol. 5185.
LNCS. Springer, 2008, pp. 195–204
“The Use of File Timestamps in Digital Forensics” R. Koen and M. S. Olivier. “The Use of File Timestamps in Digital
Forensics”. In: Proceedings of the ISSA 2008 Innovative Minds Conference.
Ed. by H. S. Venter et al. (Published electronically). Johannesburg, South
Africa, July 2008
“UML Modeling of Digital Forensic Process Models (DFPMs)” M. D. Köhn, J. H. P. Eloff, and M. S. Olivier. “UML Modeling of
Digital Forensic Process Models (DFPMs)”. In: Proceedings of the ISSA2008 Innovative Minds Conference. Ed. by H. S. Venter et al. (Published
electronically). Johannesburg, South Africa, July 2008
“Application of Message Digests for the Verification of Logical Forensic
Data” P. M. Mokhonoana and M. S. Olivier. “Application of Message Digests
for the Verification of Logical Forensic Data”. In: Proceedings of the ISSA2008 Innovative Minds Conference. Ed. by H. S. Venter et al. (Published
electronically). Johannesburg, South Africa, July 2008
“Considerations Towards a Cyber Crime Profiling System” K. K. Arthur et al. “Considerations Towards a Cyber Crime Profiling
System”. In: Proceedings of AReS 2008 — The Third InternationalConference on Availability, Security and Reliability. Ed. by S. Jakoubi, S.
Tjoa, and E. R. Weippl. IEEE, 2008, pp. 1388–1393
“A Live-System Forensic Evidence Acquisition Tool” R. Koen and M. S. Olivier. “A Live-System Forensic Evidence Acquisition
Tool”. In: Advances in Digital Forensics IV. Ed. by I. Ray and S. Shenoi.
Springer, 2008, pp. 325–334
“SQL’s Revoke with a View on Privacy” W. van Staden and M. S. Olivier. “SQL’s Revoke with a View on Privacy”.
In: Proceedings of SAICSIT 2007 Annual Research Conference of the SouthAfrican Institute of Computer Scientists and Information Technologists.
Ed. by L. Barnard and R. A. Botha. (Published electronically). Fish River,
South Africa, Oct. 2007, pp. 181–188
“A Silent SMS Denial of Service (DoS) Attack” N. J. Croft and M. S. Olivier. “A Silent SMS Denial of Service
(DoS) Attack”. In: Southern African Telecommunication Networks andApplications Conference 2007 (SATNAC 2007) Proceedings. (Published
Electronically). Sugar Beach Resort, Mauritius, Sept. 2007
“An Open-Source Forensics Platform” R. Koen and M. S. Olivier. “An Open-Source Forensics Platform”.
In: Southern African Telecommunication Networks and ApplicationsConference 2007 (SATNAC 2007) Proceedings. (Published Electronically).
Sugar Beach Resort, Mauritius, Sept. 2007
“Acquisition of a Symbian Smart phone’s Content with an On-Phone
Forensic Tool” P. M. Mokhonoana and M. S. Olivier. “Acquisition of a Symbian
Smart phone’s Content with an On-Phone Forensic Tool”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2007(SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach
Resort, Mauritius, Sept. 2007
“Patlet for Digital Forensics First Responders” D. Kotze and M. S. Olivier. “Patlet for Digital Forensics First
Responders”. In: Proceedings: Eighteenth International Workshop onDatabase and Expert Systems Applications. Ed. by A. M. Tjoa and R. R.
Wagner. IEEE, 2007, pp. 770–774
“Using Purpose Lattices to Facilitate Customisation of Privacy
Agreements” W. J. C. van Staden and M. S. Olivier. “Using Purpose Lattices to
Facilitate Customisation of Privacy Agreements”. In: Trust, Privacy andSecurity in Digital Business. Ed. by C. Lambrinoudakis, G. Pernul, and
A. M. Tjoa. Vol. 4657. LNCS. Springer, 2007, pp. 201–209
“Privaatheid en Komplekse Redes in ’n Databasis” W. J. C. van Staden and M. S. Olivier. “Privaatheid en Komplekse Redes
in ’n Databasis”. In: Die Suid-Afrikaanse Tydskrif vir Natuurwetenskapen Tegnologie 26.2 (2007). (Slegs abstrak), p. 171
“Using image steganography for decryptor distribution” T. Morkel, J. H. P. Eloff, and M. S. Olivier. “Using image steganography
for decryptor distribution”. In: On the Move to Meaningful InternetSystems 2006: OTM 2006 Workshops. Ed. by R. Meersman, Z. Tari, and
P. Herrero. Vol. 4277. LNCS. Springer, 2006, pp. 322–330
“Extending P3P to Facilitate Proxies which Pose as a Potential Threat to
Privacy” W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies
which Pose as a Potential Threat to Privacy”. In: Trust, Privacy andSecurity in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C.
Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90
“Extending SQL to Allow the Active Usage of Purposes” W. J. C. van Staden and M. S. Olivier. “Extending SQL to Allow the
Active Usage of Purposes”. In: Trust, Privacy and Security in DigitalBusiness. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis.
Vol. 4083. LNCS. Springer, 2006, pp. 123–131
“Information leakage in ubiquitous Voice-over-IP” T. Neumann, H. Tillwick, and M. S. Olivier. “Information leakage in
ubiquitous Voice-over-IP”. In: Trust, Privacy and Security in DigitalBusiness. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis.
Vol. 4083. LNCS. Springer, 2006, pp. 233–242
“Anonymous Mobile Conference Calls” N. J. Croft and M. S. Olivier. “Anonymous Mobile Conference Calls”.
In: Southern African Telecommunication Networks and ApplicationsConference 2006 (SATNAC 2006) Proceedings. Ed. by D. Browne. Vol. 1.
Stellenbosch, South Africa, Sept. 2006, pp. 411–416
“On bidder zones, cell phones and ballot stuffing” W. A. Brandi and M. S. Olivier. “On bidder zones, cell phones and
ballot stuffing”. In: Proceedings of the ISSA 2006 from Insight to ForesightConference. Ed. by H. S. Venter et al. Published electronically. Sandton,
South Africa, July 2006
“Framework for a Digital Forensic Investigation” M. Kohn, J. H. P. Eloff, and M. S. Olivier. “Framework for a Digital
Forensic Investigation”. In: Proceedings of the ISSA 2006 from Insight toForesight Conference. Ed. by H. S. Venter et al. Published electronically.
Sandton, South Africa, July 2006
“Active Traffic Capture for Network Forensics” M. L. Slaviero, A. Granova, and M. S. Olivier. “Active Traffic Capture
for Network Forensics”. In: Advances in Digital Forensics II. Ed. by M. S.
Olivier and S. Shenoi. Springer, 2006, pp. 215–228
“Differentiated Services for Logical Traffic Isolation” T. Strauss, M. S. Olivier, and D. G. Kourie. “Differentiated Services for
Logical Traffic Isolation”. In: Advances in Digital Forensics II. Ed. by
M. S. Olivier and S. Shenoi. Springer, 2006, pp. 229–237
“Network Forensics: Web Proxy Log Analysis” B. K. L. Fei et al. “Network Forensics: Web Proxy Log Analysis”. In:
Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi.
Springer, 2006, pp. 247–258
2005
“Distributed Proxies for Browsing Privacy — A Simulation of Flocks” M. S. Olivier. “Distributed Proxies for Browsing Privacy — A Simulation
of Flocks”. In: Research for a changing world — Proceedings of SAICSIT2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept.
2005, pp. 104–112
“Towards a framework for connection anonymity” H. Tillwick and M. S. Olivier. “Towards a framework for connection
anonymity”. In: Research for a changing world — Proceedings of SAICSIT2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept.
2005, pp. 113–122
“The Role of Key loggers in Computer-based Assessment Forensics” R. Laubscher et al. “The Role of Key loggers in Computer-based
Assessment Forensics”. In: Research for a changing world — Proceedingsof SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South
Africa, Sept. 2005, pp. 123–130
“A Simulation Study of Traffic Conditioner Performance” M. D. Strauss, D. G. Kourie, and M. S. Olivier. “A Simulation Study of
Traffic Conditioner Performance”. In: Research for a changing world —Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White
River, South Africa, Sept. 2005, pp. 171–181
“Interactive to Proactive: Computer Ethics in the Past and the Future” L. Venter, M. S. Olivier, and J. J. Britz. “Interactive to Proactive:
Computer Ethics in the Past and the Future”. In: ETHICOMP 2005:Proceedings of the Eighth International Conference — Looking back tothe future. Ed. by G. Collste et al. Published electronically. Linköping,
Sweden, Sept. 2005
“A fraud detection model for Next-Generation Networks” M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “A
fraud detection model for Next-Generation Networks”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 321–326
“Using an approximated One-Time Pad to Secure Short Messaging Service
(SMS)” N. J. Croft and M. S. Olivier. “Using an approximated One-Time
Pad to Secure Short Messaging Service (SMS)”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 71–76
“Detecting Uncooperative Ethernet Elements using Accurate Round-trip
Time Measurements” J. P. Delport and M. S. Olivier. “Detecting Uncooperative Ethernet
Elements using Accurate Round-trip Time Measurements”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 153–156
“Enhancements to SIP to prevent abuse of Voice-over-IP services” T. Neumann and M. S. Olivier. “Enhancements to SIP to prevent
abuse of Voice-over-IP services”. In: Southern African TelecommunicationNetworks and Applications Conference 2005 (SATNAC 2005) Proceedings.
Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005,
pp. 359–364
“Incorporating Prejudice into Trust Models to Reduce Network Overload” M. Wojcik et al. “Incorporating Prejudice into Trust Models to Reduce
Network Overload”. In: Southern African Telecommunication Networksand Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D.
Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 195–200
“Western Privacy and Ubuntu — Influences in the Forthcoming Data
Privacy Bill” H. N. Olinger, J. J. Britz, and M. S. Olivier. “Western Privacy and
Ubuntu — Influences in the Forthcoming Data Privacy Bill”. In: Ethicsof New Information Technology — Proceedings of the Sixth InternationalConference of Computer Ethics: Philosophical Enquiry (CEPE2005). Ed.
by P. Brey, F. Grodzinsky, and L. Introna. Enschede, The Netherlands,
July 2005, pp. 291–306
“One-time Passwords in a Mobile Environment using Steganography” T. Morkel et al. “One-time Passwords in a Mobile Environment using
Steganography”. In: Proceedings of the First International Workshopon Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2005). Ed. by P Georgiadis, S Gritzalis, and G. F. Marias.
Diavlos Publications, July 2005, pp. 13–19
“Codec-Hopping: Secure and Private Voice Communication in Bandwidth
Constrained Networks” N. J. Croft, M. S. Olivier, and H. S. Venter. “Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks”. In:
Proceedings of the First International Workshop on Security, Privacy andTrust in Pervasive and Ubiquitous Computing (SecPerU 2005). Ed. by P
Georgiadis, S Gritzalis, and G. F. Marias. Diavlos Publications, July 2005,
pp. 85–91
“Polar: Proxies Collaborating to Achieve Anonymous Web Browsing” H. Tillwick et al. “Polar: Proxies Collaborating to Achieve Anonymous
Web Browsing”. In: Proceedings of the Fifth International NetworkConference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G.
Kormentzas. Samos, Greece, July 2005, pp. 317–324
“Using Compatible Keys in Achieving Subscriber Privacy Channelling for
Billing in GSM Networks” N. J. Croft and M. S. Olivier. “Using Compatible Keys in Achieving
Subscriber Privacy Channelling for Billing in GSM Networks”. In:
Proceedings of the Fifth International Network Conference (INC2005). Ed.
by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July
2005, pp. 245–252
“Attacking Signed Binaries” M. L. Slaviero, J. Kroon, and M. S. Olivier. “Attacking Signed Binaries”.
In: Proceedings of the Fifth Annual Information Security South AfricaConference (ISSA2005). Ed. by H. S. Venter et al. Published electronically.
Sandton, South Africa, June 2005
“An Overview of Image Steganography” T. Morkel, J. H. P. Eloff, and M. S. Olivier. “An Overview of Image
Steganography”. In: Proceedings of the Fifth Annual Information SecuritySouth Africa Conference (ISSA2005). Ed. by H. S. Venter et al. Published
electronically. Sandton, South Africa, June 2005
“Purpose Organisation” W. J. C. van Staden and M. S. Olivier. “Purpose Organisation”.
In: Proceedings of the Fifth Annual Information Security South AfricaConference (ISSA2005). Ed. by H. S. Venter et al. Research in progress
paper, published electronically. Sandton, South Africa, June 2005
“Using Self-Organising Maps for Anomalous Behaviour Detection in a
Computer Forensic Investigation” B. K. L. Fei et al. “Using Self-Organising Maps for Anomalous Behaviour
Detection in a Computer Forensic Investigation”. In: Proceedings of theFifth Annual Information Security South Africa Conference (ISSA2005).
Ed. by H. S. Venter et al. Research in progress paper, published
electronically. Sandton, South Africa, June 2005
“Using the IPDR standard for NGN billing and fraud detection” M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “Using the IPDR
standard for NGN billing and fraud detection”. In: Proceedings of the FifthAnnual Information Security South Africa Conference (ISSA2005). Ed. by
H. S. Venter, J. H. P. E. L. Labuschagne, and M. M. Eloff. Research in
progress paper, published electronically. Sandton, South Africa, June 2005
“Computer Forensics for a Computer-based Assessment: The Preparation
Phase” R. Laubscher et al. “Computer Forensics for a Computer-based
Assessment: The Preparation Phase”. In: Proceedings of the Fifth AnnualInformation Security South Africa Conference (ISSA2005). Ed. by H. S.
Venter et al. Research in progress paper, published electronically. Sandton,
South Africa, June 2005
“A Model for Spam Prevention in Voice over IP Networks using
Anonymous Verifying Authorities” N. J. Croft and M. S. Olivier. “A Model for Spam Prevention in
Voice over IP Networks using Anonymous Verifying Authorities”. In:
Proceedings of the Fifth Annual Information Security South AfricaConference (ISSA2005). Ed. by H. S. Venter et al. Research in progress
paper, published electronically. Sandton, South Africa, June 2005
“Privacy Contracts as an Extension of Privacy Policies” H. J. G. Oberholzer and M. S. Olivier. “Privacy Contracts as an Extension
of Privacy Policies”. In: Proceedings of the International Workshop onPrivacy Data Management (PDM 2005). Tokyo, Japan, Apr. 2005,
pp. 11–19
“Applying Forensic Principles to Computer-Based Assessment” R. Laubscher et al. “Applying Forensic Principles to Computer-Based
Assessment”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S.
Shenoi. Springer, 2005, pp. 105–112
“PIDS: A Privacy Intrusion Detection System” H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion
Detection System”. In: Internet Research 14.5 (2004), pp. 360–365
“Towards a Hippocratic Log File Architecture” A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards a Hippocratic
Log File Architecture”. In: Proceedings of SAICSIT 2004 — fulfillingthe promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo.
Stellenbosch, South Africa, Oct. 2004, pp. 186–193
“The use of a Third Party Proxy in Achieving GSM Anonymity” N. J. Croft and M. S. Olivier. “The use of a Third Party Proxy in
Achieving GSM Anonymity”. In: Southern African TelecommunicationNetworks and Applications Conference 2004 (SATNAC 2004). Ed. by D.
Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004
“DAOMAP: A Distributed IPv6 Multicast Address Allocating Protocol” M. Slaviero and M. S. Olivier. “DAOMAP: A Distributed IPv6 Multicast
Address Allocating Protocol”. In: Southern African TelecommunicationNetworks and Applications Conference 2004 (SATNAC 2004). Ed. by D.
Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004
“Privacy under Conditions of Concurrent Interaction with Multiple
Parties” M. S. Olivier. “Privacy under Conditions of Concurrent Interaction with
Multiple Parties”. In: Data and Applications Security XVII — Status andProspects. Ed. by S. de Capitani di Vimercati, I. Ray, and I. Ray. Kluwer,
2004, pp. 105–118
“PIDS: A Privacy Intrusion Detection System” H. S. Venter, M. S. Olivier, and J. H. P. Eloff. “PIDS: A Privacy Intrusion
Detection System”. In: Proceedings of the Fourth International NetworkConference. Ed. by S. M. Furnell and P. S. Dowland. Journal version also
published Venter, Olivier, and Eloff, “PIDS: A Privacy Intrusion Detection
System”. Plymouth, UK, July 2004, pp. 255–262
“Using a central data repository for biometric authentication in passport
systems” M. Breedt and M. S. Olivier. “Using a central data repository for biometric
authentication in passport systems”. In: Proceedings of the Fourth AnnualInformation Security South Africa Conference (ISSA2004). Published
electronically. Midrand, South Africa, June 2004
“Towards Hippocratic Log files” A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards Hippocratic Log
files”. In: Proceedings of the Fourth Annual Information Security SouthAfrica Conference (ISSA2004). Published electronically. Midrand, South
Africa, June 2004
“Design Issues: A Virtual Machine for Security in a Relational Database
Management System” W. J. C. van Staden and M. S. Olivier. “Design Issues: A Virtual
Machine for Security in a Relational Database Management System”.
In: Proceedings of the Fourth Annual Information Security South AfricaConference (ISSA2004). Published electronically. Midrand, South Africa,
June 2004
“On Privacy and the Web” W. A. Brandi and M. S. Olivier. “On Privacy and the Web”. In:
Proceedings of the Fourth Annual Information Security South AfricaConference (ISSA2004). Published electronically. Midrand, South Africa,
June 2004
“A Layered Security Architecture: Design Issues” H. Tillwick and M. S. Olivier. “A Layered Security Architecture: Design
Issues”. In: Proceedings of the Fourth Annual Information SecuritySouth Africa Conference (ISSA2004). Work in progress paper, published
electronically. Midrand, South Africa, June 2004
“An approach to build a fortified network logger that is resilient to
cracking attempts” J. Kroon and M. S. Olivier. “An approach to build a fortified network
logger that is resilient to cracking attempts”. In: Proceedings of the FourthAnnual Information Security South Africa Conference (ISSA2004). Work
in progress paper, published electronically. Midrand, South Africa, June
2004
“Curtailing Web defacement using a read-only strategy” A. Cooks and M. S. Olivier. “Curtailing Web defacement using a read-only
strategy”. In: Proceedings of the Fourth Annual Information SecuritySouth Africa Conference (ISSA2004). Work in progress paper, published
electronically. Midrand, South Africa, June 2004
“Privacy and Civil Liberties” D. Chadwick et al. “Privacy and Civil Liberties”. In: Research Directionsin Database and Application Security. Ed. by E. Gudes and S. Shenoi.
Kluwer, 2003, pp. 331–346
“Implementing Workflow with Microsoft’s Distributed Object Model
(DCOM)” L. C. J. Dreyer and M. S. Olivier. “Implementing Workflow with
Microsoft’s Distributed Object Model (DCOM)”. In: Research Directionsin Database and Application Security. Ed. by E. Gudes and S. Shenoi.
Kluwer, 2003, pp. 61–72
“A Chinese Wall Approach to Privacy Policies for The Web” F. A. Lategan and M. S. Olivier. “A Chinese Wall Approach to Privacy
Policies for The Web”. In: 26th Annual International Computer Softwareand Applications Conference (COMPSAC 2002). Oxford, UK: IEEE, 2002,
pp. 940–944
“A Configurable Security Architecture Prototype” A. Hardy and M. S. Olivier. “A Configurable Security Architecture
Prototype”. In: Data and Applications Security — Developments andDirections. Ed. by B. Thuraisingham et al. Kluwer, 2001, pp. 51–62
“Consumer Perception of Electronic-commerce” A. Martins, N. Martins, and M. S. Olivier. “Consumer Perception of
Electronic-commerce”. In: South African Computer Journal 27 (2001),
pp. 27–33
“On granting limited access to private information” F. A. Lategan and M. S. Olivier. “On granting limited access to private
information”. In: Proceedings of the Tenth International World Wide WebConference. ACM, 2001, pp. 21–25
2000
“A comparison of two architectures for implementing Security and Privacy
in Cyberspace” R. P. van de Riet et al. “A comparison of two architectures for
implementing Security and Privacy in Cyberspace”. In: Database andExpert Systems Applications. DEXA 2000. Ed. by M. Ibrahim, J. Küng,
and N. Revell. Vol. 1873. Lecture Notes in Computer Science. Springer,
2000, pp. 287–301
“Enforcing privacy by withholding private information” F. A. Lategan and M. S. Olivier. “Enforcing privacy by withholding
private information”. In: Information Security for Global InformationInfrastructures. Ed. by S Qing and J. H. P. Eloff. Kluwer, 2000, pp. 421–430
“A Research Methods Course in IT” M. S. Olivier. “A Research Methods Course in IT”. In: Proceedings of theSACLA 2000 Conference. Unrefereed. Strand, South Africa, June 2000,
pp. 207–212
“Security Policies in Replicated and Autonomous Databases” E. Gudes and M. S. Olivier. “Security Policies in Replicated and
Autonomous Databases”. In: Database Security XII: Status and Prospects.
Ed. by S. Jajodia. Kluwer, 1999, pp. 93–107
“An Information-Flow Model for Privacy (InfoPriv)” L. C. J. Dreyer and M. S. Olivier. “An Information-Flow Model for Privacy
(InfoPriv)”. In: Database Security XII: Status and Prospects. Ed. by S.
Jajodia. Kluwer, 1999, pp. 77–90
“Specifying Application-level Security in Workflow Systems” M. S. Olivier, R. P. van de Riet, and E. Gudes. “Specifying
Application-level Security in Workflow Systems”. In: Proceedings of theNinth International Workshop on Security of Data Intensive Applications(DEXA 98). Ed. by R Wagner. IEEE, 1998, pp. 346–351
“Dynamic Aspects of the InfoPriv Model for Information Privacy” L. C. J. Dreyer and M. S. Olivier. “Dynamic Aspects of the InfoPriv
Model for Information Privacy”. In: Proceedings of the Ninth InternationalWorkshop on Security of Data Intensive Applications (DEXA 98). Ed. by
R Wagner. IEEE, 1998, pp. 340–345
“A Workbench for Privacy Policies” L. C. J. Dreyer and M. S. Olivier. “A Workbench for Privacy Policies”. In:
Twenty-Second Annual International Computer Software and ApplicationsConference. Vienna, Austria, Aug. 1998
“A Study of Small Business Computerisation in the South African
Context” C. W. Rensleigh and M. S. Olivier. “A Study of Small Business
Computerisation in the South African Context”. In: Proceedings of theAoM/IAoM 16th Annual Conference, Computer Science — IS/IT, Section2. Ed. by S. Y. Shin and K Akingbehin. Chicago, Illinois, USA, Aug. 1998,
pp. 23–28
An implementation of the Chinese Wall security model using ConSA F. A. Lategan and M. S. Olivier. An implementation of the ChineseWall security model using ConSA. Internal Report. Unpublished.
Johannesburg, South Africa: Department of Computer Science, Rand
Afrikaans University, 1998
“Integrity Constraints in Federated Databases” M. S. Olivier. “Integrity Constraints in Federated Databases”. In:
Database Security X: Status and Prospects. Ed. by P. Samarati and R. S.
Sandhu. Chapman & Hall, 1997, pp. 43–57
“Increasing Firewall Reliability by Recording Routes” P. M. Boshoff and M. S. Olivier. “Increasing Firewall Reliability by
Recording Routes”. In: Communications and Multimedia Security II. Ed.
by P Horster. Chapman & Hall, 1996, pp. 303–314
“Supporting Site Security Policies for Members of Federated Databases” M. S. Olivier. “Supporting Site Security Policies for Members of Federated
Databases”. In: Proceedings of the Fourth European Conference onInformation Systems. Ed. by J. D. Coelho et al. Lisbon, Portugal, July
1996, pp. 45–56
“A Discretionary Security Model for Object-oriented Environments” P. W. Jansen van Rensburg and M. S. Olivier. “A Discretionary Security
Model for Object-oriented Environments”. In: Information SystemsSecurity: Facing the Information Society of the 21st Century. Ed. by S. K.
Katsikas and D. Gritzalis. Chapman & Hall, 1996, pp. 306–316
“MoFAC: A Model for Fine-grained Access Control” J. S. von Solms, M. S. Olivier, and S. H. von Solms. “MoFAC: A Model for
Fine-grained Access Control”. In: Information Systems Security: Facingthe Information Society of the 21st Century. Ed. by S. K. Katsikas and
D Gritzalis. Chapman & Hall, 1996, pp. 295–305
“A Prototype for Personal Business Transactions on Public Networks” E. J. Uphof and M. S. Olivier. “A Prototype for Personal Business
Transactions on Public Networks”. In: Proceedings of the IFIP TC11Workgroup 11.2 on Small System Security. Ed. by J. H. P. Eloff.
Unrefereed. Samos, Greece, May 1996, pp. 13–27
“Self-protecting Objects in a Secure Federated Database” M. S. Olivier. “Self-protecting Objects in a Secure Federated Database”.
In: Database Security IX: Status and Prospects. Ed. by D. L. Spooner,
S. A. Demurjian, and J. E. Dobson. Chapman & Hall, 1996, pp. 27–42
“A Heuristic for Securing Hypertext Systems” M. S. Olivier. “A Heuristic for Securing Hypertext Systems”. In:
Communications and Multimedia Security. Ed. by R Posch. Chapman &
Hall, 1995, pp. 43–54
“A Multilevel Secure Federated Database” M. S. Olivier. “A Multilevel Secure Federated Database”. In: DatabaseSecurity VIII (A-60). Ed. by J. Biskup, M Morgenstern, and C. E.
Landwehr. Elsevier Science, 1995, pp. 183–198
“A Taxonomy for Secure Object-oriented Databases” M. S. Olivier and S. H. von Solms. “A Taxonomy for Secure
Object-oriented Databases”. In: ACM Transactions on Database Systems
19.1 (1994), pp. 3–46
“MOSS II—A Model for Open System Security” P. W. J. van Zyl, M. S. Olivier, and S. H. von Solms. “MOSS II—A
Model for Open System Security”. In: Proceedings of the IFIP TC11 TenthConference on Information Security, IFIP/SEC ’94. Curaçao, 1994
1993
“An Object-based Version of the Path Context Model” M. S. Olivier and S. H. von Solms. “An Object-based Version of the
Path Context Model”. In: International Journal of Computer Mathematics
49.3&4 (1993), pp. 133–144
“MOSS — A Model for Open System Security” P. W. J. van Zyl, S. H. von Solms, and M. S. Olivier. “MOSS — A
Model for Open System Security”. In: Proceedings of Uniforum Asia ’92.
Singapore, 1992
“DISCO: A Discretionary Security Model for Object-oriented Databases” M. S. Olivier and S. H. von Solms. “DISCO: A Discretionary Security
Model for Object-oriented Databases”. In: IT Security: The Need forInternational Cooperation. Ed. by G. G. Gable and W. J. Caelli. Elsevier,
1992, pp. 345–357
1991
“Secure Object-oriented Databases” M. S. Olivier. “Secure Object-oriented Databases”. PhD thesis.
Johannesburg: Rand Afrikaans University, 1991
“Computer Viruses: A Management Perspective” M. S. Olivier. “Computer Viruses: A Management Perspective”. In:
Proceedings of Infosec ’90 (Information Security Symposium). Pretoria,
South Africa, Mar. 1990
Computer Viruses: A Management Perspective M. S. Olivier. Computer Viruses: A Management Perspective. Technical
Report PKOMP 90/4. Pretoria, South Africa: CSIR, Mar. 1990
“Rekenaarvirusse in Suid-Afrika” M. S. Olivier. “Rekenaarvirusse in Suid-Afrika”. In: Vierde JaarlikseKonferensie vir M.Sc en Ph.D Rekenaarwetenskapstudente. Onbeoordeeld.
Cathedral Peak, Suid-Afrika, Sept. 1989
“Phigs on the B408/B409” M. S. Olivier. “Phigs on the B408/B409”. In: Concurrent Computing 89.
Unrefereed. Pretoria, South Africa, Sept. 1989
Analysis of the Bouncing Ball Virus M. S. Olivier and H. W. Teitge. Analysis of the Bouncing Ball Virus.
Technical Report PKOMP 89/5. Pretoria, South Africa: CSIR, July 1989
“Hoofstuk 16: Rekenaarvirusse” M. S. Olivier. “Hoofstuk 16: Rekenaarvirusse”. In: Van Pletsen, F, DOS:’n Handleiding vir rekenaarentoesiaste. De Jager-HAUM, 1989. isbn:
978-0-7986-3018-4
[ Paper available] [ Paper available upon request] [ Paper not yet available] [ Abstract] [ Full citation information] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
Some icons used under a CC licence from http://prokofusha.deviantart.com