“On Generic Digital Forensic Readiness” M. S. Olivier. “On Generic Digital Forensic Readiness”. In: AAFS 72ndAnnual Scientific Meeting. Anaheim, CA, USA, Feb. 2020
“Medico-legal examinations as a paradigm for digital examinations” M. S. Olivier. “Medico-legal examinations as a paradigm for digital
examinations”. In: Program and Abstracts — The Eleventh ISABSConference on Forensic and Anthropologic Genetics and Mayo ClinicLectures in Individualized Medicine. Ed. by D. Primorac et al. Invited
paper. International Society for Applied and Biological Sciences, June
2019, p. 97
“Evaluation of Smartphone Data using a Reference Architecture” H. Pieterse, M. S. Olivier, and R. van Heerden. “Evaluation of Smartphone
Data using a Reference Architecture”. In: International Journal ofElectronic Security and Digital Forensics 11.2 (2019), pp. 160–182
“Classifying the Authenticity of Evaluated Smartphone Data” H. Pieterse, M. S. Olivier, and R. van Heerden. “Classifying the
Authenticity of Evaluated Smartphone Data”. In: Advances in DigitalForensics XV. Ed. by G Peterson and S Shenoi. Advances in Information
and Communication Technology. Springer, 2019, pp. 39–57
“Detecting Manipulated Smartphone Data on Android and iOS Devices” H. Pieterse, M. S. Olivier, and R. van Heerden. “Detecting Manipulated
Smartphone Data on Android and iOS Devices”. In: Information Security.17th International Conference, ISSA 2018, Pretoria, South Africa, August15–16, 2018, Revised Selected Papers. Ed. by H. S. Venter et al. Vol. 973.
Communications in Computer and Information Science. Springer, 2019,
pp. 89–103
“Forensic attribution in NoSQL databases” W. Hauger and M. S. Olivier. “Forensic attribution in NoSQL databases”.
In: 2017 Information Security for South Africa (ISSA). Ed. by H. S. Venter
et al. IEEE, Aug. 2017, pp. 74–82
“Establishing Findings in Digital Forensic Examinations” O. Oyelami and M. S. Olivier. “Establishing Findings in Digital Forensic
Examinations”. In: Advances in Digital Forensics XIII. Ed. by G. Peterson
and S. Shenoi. Springer, 2017, pp. 3–21
“Evaluating the Authenticity of Smartphone Evidence” H. Pieterse, M. S. Olivier, and R. van Heerden. “Evaluating the
Authenticity of Smartphone Evidence”. In: Advances in Digital ForensicsXIII. Ed. by G. Peterson and S. Shenoi. Springer, 2017, pp. 41–61
2016
“Digital forensic science: A manifesto” M. S. Olivier. “Digital forensic science: A manifesto”. In: South AfricanComputer Journal 28.2 (2016). Editorial, pp. 46–49
“On the Morality of Teaching Students IT Crime Skills” M. S. Olivier. “On the Morality of Teaching Students IT Crime Skills”.
In: ICT Education. 45th Annual Conference of the Southern AfricanComputer Lecturers’ Association (SACLA 2016), Cullinan, South Africa,July 5–6, 2016, Revised Selected Papers. Ed. by S. Gruner. Invited keynote
lecture. 2016, pp. 3–21
“The smartphone evidence awareness framework for the users” I. Z. Dlamini, M. S. Olivier, and M. Grobler. “The smartphone
evidence awareness framework for the users”. In: Proceedings of the 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016).
Ed. by T. Zlateva and V. Greiman. Mar. 2016
“On a scientific theory of digital forensics” M. S. Olivier. “On a scientific theory of digital forensics”. In: Advances inDigital Forensics XII. Ed. by G. Peterson and S. Shenoi. Springer, 2016,
pp. 3–24
2015
“Towards a digital forensic science” M. S. Olivier. “Towards a digital forensic science”. In: Information Securityfor South Africa (ISSA). Ed. by H. S. Venter et al. IEEE, Aug. 2015
“The state of Database Forensic research” W. Hauger and M. S. Olivier. “The state of Database Forensic research”.
In: Information Security for South Africa (ISSA). Ed. by H. S. Venter
et al. IEEE, Aug. 2015
“Modelling Digital Autopsies on Medical Autopsies” M. S. Olivier. “Modelling Digital Autopsies on Medical Autopsies”. In:
American Academy of Forensic Sciences 67th Annual Scientific Meeting.
Orlando, FL, USA, 2015
“Notions of “Hypothesis” in Digital Forensics” S. Tewelde, M. S. Olivier, and S. Gruner. “Notions of “Hypothesis”
in Digital Forensics”. In: Advances in Digital Forensics XI. Ed. by G.
Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information and
Communication Technology. Springer, 2015, pp. 29–43
“Determining Trigger Involvement During Forensic Attribution in
Databases” W. Hauger and M. S. Olivier. “Determining Trigger Involvement During
Forensic Attribution in Databases”. In: Advances in Digital Forensics XI.
Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances in Information
and Communication Technology. Springer, 2015, pp. 163–177
“Using Yin’s Approach to Case Studies as a Paradigm for Conducting
Examinations” O. Oyelami and M. S. Olivier. “Using Yin’s Approach to Case Studies
as a Paradigm for Conducting Examinations”. In: Advances in DigitalForensics XI. Ed. by G. Peterson and S. Shenoi. Vol. 462. IFIP Advances
in Information and Communication Technology. Springer, 2015, pp. 45–59
2014
“Database Forensics” M. S. Olivier. “Database Forensics”. In: Official (ISC)2® Guide to theCCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 683–706
“Malware Forensics” M. S. Olivier. “Malware Forensics”. In: Official (ISC)2® Guide to theCCFP CBK. Ed. by P. Stephenson. CRC, 2014, pp. 707–737
“A Near-Miss Management System to Facilitate Forensic Investigation of
Software Failures” M. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A Near-Miss
Management System to Facilitate Forensic Investigation of Software
Failures”. In: Proceedings of the 13th European Conference on CyberWarfare and Security. Ed. by A. Liaropoulos and G. Tsihrintzis. Academic
Conferences, 2014, pp. 233–241
“The role of triggers in database forensics” W. K. Hauger and M. S. Olivier. “The role of triggers in database
forensics”. In: Information Security South Africa 2014 (ISSA 2014).
Johannesburg, South Africa, Aug. 2014
“Database Application Schema Forensics” H. Beyers, M. S. Olivier, and G. P. Hancke. “Database Application Schema
Forensics”. In: South African Computer Journal 55 (2014)
“Smartphones as Distributed Witnesses for Digital Forensics” H. Pieterse and M. S. Olivier. “Smartphones as Distributed Witnesses for
Digital Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson
and S. Shenoi. Springer, 2014, pp. 237–251
“Schema Reconstruction in Database Forensics” O. M. Adedayo and M. S. Olivier. “Schema Reconstruction in Database
Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson and
S. Shenoi. Springer, 2014, pp. 101–116
2013
“On the Scientific Maturity of Digital Forensics Research” M. S. Olivier and S. Gruner. “On the Scientific Maturity of Digital
Forensics Research”. In: Advances in Digital Forensics IX. Ed. by
G. Peterson and S. Shenoi. IFIP Advances in Information and
Communication Technology — Advances in Digital Forensics. Springer,
2013, pp. 33–49
“On Complex Crimes and Digital Forensics” M. S. Olivier. “On Complex Crimes and Digital Forensics”. In:
Information Security in Diverse Computing Environments. Ed. by
A. V. D. M. Kayem and C. Meinel. IGI, 2014, pp. 230–244
“On the completeness of reconstructed data for database forensics” O. M. Adedayo and M. S. Olivier. “On the completeness of reconstructed
data for database forensics”. In: Digital Forensics and Cyber Crime. Ed.
by M. Rogers and K. C. Seigfried-Spellar. Lecture Notes of the Institute
for Computer Sciences, Social Informatics and Telecommunications
Engineering 114. Springer, 2013, pp. 220–238
“Cloud Separation: Stuck inside the cloud” W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”.
In: Trust, Privacy and Security in Digital Business — 9th Internationalconference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings.
Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449.
Springer, 2012, pp. 36–49
“Database forensics” O. M. Fasan and M. S. Olivier. “Database forensics”. In: Proceedings ofthe NCS ReCITI. Akwa Ibom, Nigeria, July 2012
“On Dimensions of Reconstruction in Database Forensics” O. M. Fasan and M. S. Olivier. “On Dimensions of Reconstruction
in Database Forensics”. In: Seventh International Annual Workshop onDigital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete,
Greece, June 2012, pp. 97–106
“Arguments and Methods for Database Data Model Forensics” H. Q. Beyers, M. S. Olivier, and G. P. Hancke. “Arguments and Methods
for Database Data Model Forensics”. In: Seventh International Workshopon Digital Forensics & Incident Analysis (WDFIA). Hersonissos, Crete,
Greece, June 2012, pp. 139–149
“Isolating instances in the cloud” W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 187–200
“Reconstruction in Database Forensics” O. M. Fasan and M. S. Olivier. “Reconstruction in Database Forensics”.
In: Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 273–287
“Using Internal Depth to Aid Stereoscopic Image Splicing Detection” M.-A. Fouché and M. S. Olivier. “Using Internal Depth to Aid Stereoscopic
Image Splicing Detection”. In: Advances in Digital Forensics VIII. Ed. by
G. Peterson and S. Shenoi. Springer, 2012, pp. 319–333
“Data Hiding Techniques for Database Environments” H. Pieterse and M. S. Olivier. “Data Hiding Techniques for Database
Environments”. In: Advances in Digital Forensics VIII. Ed. by G. Peterson
and S. Shenoi. Springer, 2012, pp. 289–301
“Finding File Fragments in the Cloud” D. Ras and M. S. Olivier. “Finding File Fragments in the Cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 169–185
2011
“Detecting non-stereoscopic to stereoscopic image splicing with the use of
disparity maps” M.-A. Fouché and M. S. Olivier. “Detecting non-stereoscopic to
stereoscopic image splicing with the use of disparity maps”. In: Proceedingsof the South African Institute of Computer Scientists and InformationTechnologists Conference on Knowledge, Innovation and Leadership in aDiverse, Multidisciplinary Environment. SAICSIT ’11. Cape Town, South
Africa: ACM, 2011, pp. 271–274. isbn: 978-1-4503-0878-6
“Proposing a Digital Operational Forensic Investigation Process” M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “Proposing a Digital
Operational Forensic Investigation Process”. In: Proceedings of the sixthInternational Workshop on Digital Forensics & Incident Analysis. Ed. by
N. Clarke and T. Tryfonas. London, UK, July 2011, pp. 17–32
“Network Forensics in a Clean-slate Internet Architecture” T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet
Architecture”. In: Proceedings of the 2011 Information Security for SouthAfrica (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M.
Loock. (Published electronically). Aug. 2011
“Nature and Forensic Investigation of Crime in Second Life” A. S. Rakitianskaia, M. S. Olivier, and A. K. Cooper. “Nature and
Forensic Investigation of Crime in Second Life”. In: Proceedings of the2011 Information Security for South Africa (ISSA 2011) Conference. Ed.
by H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“An Approach to Examine the Metadata and Data of a Database
Management System by making use of a Forensic Comparison Tool” H. Beyers, M. S. Olivier, and G. P. Hancke. “An Approach to Examine
the Metadata and Data of a Database Management System by making
use of a Forensic Comparison Tool”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“Isolating a Cloud Instance for a Digital Forensic Investigation” W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud
Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“Assembling the Metadata for a Database Forensic Examination” H. Beyers, M. S. Olivier, and G. P. Hancke. “Assembling the Metadata
for a Database Forensic Examination”. In: Advances in Digital ForensicsVII. Ed. by G. Peterson and S. Shenoi. Springer, 2011, pp. 89–99
“Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling” I. Z. Dlamini, M. S. Olivier, and S. Sibiya. “Pattern-Based Approach for
Logical Traffic Isolation Forensic Modelling”. In: Twentieth InternationalWorkshop on Database and Expert Systems Applications. Ed. by A. M.
Tjoa and R. R. Wagner. IEEE Computer Society, 2009, pp. 145–149
“The design of a logical traffic isolation forensic model” I. Z. Dlamini and M. S. Olivier. “The design of a logical traffic isolation
forensic model”. In: Proceedings of the ISSA 2009 Conference. Ed. by H. S.
Venter, M. Coetzee, and L. Labuschagne. (Research in progress paper,
published electronically). Johannesburg, South Africa, July 2009
“A Simulation of Logical Traffic Isolation Using Differentiated Services” I. Z. Dlamini, M. S. Olivier, and M. Grobler. “A Simulation of Logical
Traffic Isolation Using Differentiated Services”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 20–27
“Processing Algorithms for Components within a Forensic Evidence
Management System” K. K. Arthur and M. S. Olivier. “Processing Algorithms for Components
within a Forensic Evidence Management System”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 53–62
“XBRL-Trail: A model for introducing digital forensic readiness to XBRL” D. J. J. Kotze and M. S. Olivier. “XBRL-Trail: A model for
introducing digital forensic readiness to XBRL”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 93–104
“The Use of File Timestamps in Digital Forensics” R. Koen and M. S. Olivier. “The Use of File Timestamps in Digital
Forensics”. In: Proceedings of the ISSA 2008 Innovative Minds Conference.
Ed. by H. S. Venter et al. (Published electronically). Johannesburg, South
Africa, July 2008
“UML Modeling of Digital Forensic Process Models (DFPMs)” M. D. Köhn, J. H. P. Eloff, and M. S. Olivier. “UML Modeling of
Digital Forensic Process Models (DFPMs)”. In: Proceedings of the ISSA2008 Innovative Minds Conference. Ed. by H. S. Venter et al. (Published
electronically). Johannesburg, South Africa, July 2008
“Application of Message Digests for the Verification of Logical Forensic
Data” P. M. Mokhonoana and M. S. Olivier. “Application of Message Digests
for the Verification of Logical Forensic Data”. In: Proceedings of the ISSA2008 Innovative Minds Conference. Ed. by H. S. Venter et al. (Published
electronically). Johannesburg, South Africa, July 2008
“Considerations Towards a Cyber Crime Profiling System” K. K. Arthur et al. “Considerations Towards a Cyber Crime Profiling
System”. In: Proceedings of AReS 2008 — The Third InternationalConference on Availability, Security and Reliability. Ed. by S. Jakoubi, S.
Tjoa, and E. R. Weippl. IEEE, 2008, pp. 1388–1393
“A Live-System Forensic Evidence Acquisition Tool” R. Koen and M. S. Olivier. “A Live-System Forensic Evidence Acquisition
Tool”. In: Advances in Digital Forensics IV. Ed. by I. Ray and S. Shenoi.
Springer, 2008, pp. 325–334
2007
“An Open-Source Forensics Platform” R. Koen and M. S. Olivier. “An Open-Source Forensics Platform”.
In: Southern African Telecommunication Networks and ApplicationsConference 2007 (SATNAC 2007) Proceedings. (Published Electronically).
Sugar Beach Resort, Mauritius, Sept. 2007
“Acquisition of a Symbian Smart phone’s Content with an On-Phone
Forensic Tool” P. M. Mokhonoana and M. S. Olivier. “Acquisition of a Symbian
Smart phone’s Content with an On-Phone Forensic Tool”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2007(SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach
Resort, Mauritius, Sept. 2007
“Patlet for Digital Forensics First Responders” D. Kotze and M. S. Olivier. “Patlet for Digital Forensics First
Responders”. In: Proceedings: Eighteenth International Workshop onDatabase and Expert Systems Applications. Ed. by A. M. Tjoa and R. R.
Wagner. IEEE, 2007, pp. 770–774
“Extending P3P to Facilitate Proxies which Pose as a Potential Threat to
Privacy” W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies
which Pose as a Potential Threat to Privacy”. In: Trust, Privacy andSecurity in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C.
Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90
“Framework for a Digital Forensic Investigation” M. Kohn, J. H. P. Eloff, and M. S. Olivier. “Framework for a Digital
Forensic Investigation”. In: Proceedings of the ISSA 2006 from Insight toForesight Conference. Ed. by H. S. Venter et al. Published electronically.
Sandton, South Africa, July 2006
“Active Traffic Capture for Network Forensics” M. L. Slaviero, A. Granova, and M. S. Olivier. “Active Traffic Capture
for Network Forensics”. In: Advances in Digital Forensics II. Ed. by M. S.
Olivier and S. Shenoi. Springer, 2006, pp. 215–228
“Differentiated Services for Logical Traffic Isolation” T. Strauss, M. S. Olivier, and D. G. Kourie. “Differentiated Services for
Logical Traffic Isolation”. In: Advances in Digital Forensics II. Ed. by
M. S. Olivier and S. Shenoi. Springer, 2006, pp. 229–237
“Network Forensics: Web Proxy Log Analysis” B. K. L. Fei et al. “Network Forensics: Web Proxy Log Analysis”. In:
Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi.
Springer, 2006, pp. 247–258
2005
“The Role of Key loggers in Computer-based Assessment Forensics” R. Laubscher et al. “The Role of Key loggers in Computer-based
Assessment Forensics”. In: Research for a changing world — Proceedingsof SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South
Africa, Sept. 2005, pp. 123–130
“Detecting Uncooperative Ethernet Elements using Accurate Round-trip
Time Measurements” J. P. Delport and M. S. Olivier. “Detecting Uncooperative Ethernet
Elements using Accurate Round-trip Time Measurements”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 153–156
“Using Self-Organising Maps for Anomalous Behaviour Detection in a
Computer Forensic Investigation” B. K. L. Fei et al. “Using Self-Organising Maps for Anomalous Behaviour
Detection in a Computer Forensic Investigation”. In: Proceedings of theFifth Annual Information Security South Africa Conference (ISSA2005).
Ed. by H. S. Venter et al. Research in progress paper, published
electronically. Sandton, South Africa, June 2005
“Computer Forensics for a Computer-based Assessment: The Preparation
Phase” R. Laubscher et al. “Computer Forensics for a Computer-based
Assessment: The Preparation Phase”. In: Proceedings of the Fifth AnnualInformation Security South Africa Conference (ISSA2005). Ed. by H. S.
Venter et al. Research in progress paper, published electronically. Sandton,
South Africa, June 2005
“Applying Forensic Principles to Computer-Based Assessment” R. Laubscher et al. “Applying Forensic Principles to Computer-Based
Assessment”. In: Advances in Digital Forensics. Ed. by M. Pollitt and S.
Shenoi. Springer, 2005, pp. 105–112
2004
“An approach to build a fortified network logger that is resilient to
cracking attempts” J. Kroon and M. S. Olivier. “An approach to build a fortified network
logger that is resilient to cracking attempts”. In: Proceedings of the FourthAnnual Information Security South Africa Conference (ISSA2004). Work
in progress paper, published electronically. Midrand, South Africa, June
2004
1990
“Computer Viruses: A Management Perspective” M. S. Olivier. “Computer Viruses: A Management Perspective”. In:
Proceedings of Infosec ’90 (Information Security Symposium). Pretoria,
South Africa, Mar. 1990
Computer Viruses: A Management Perspective M. S. Olivier. Computer Viruses: A Management Perspective. Technical
Report PKOMP 90/4. Pretoria, South Africa: CSIR, Mar. 1990
“Rekenaarvirusse in Suid-Afrika” M. S. Olivier. “Rekenaarvirusse in Suid-Afrika”. In: Vierde JaarlikseKonferensie vir M.Sc en Ph.D Rekenaarwetenskapstudente. Onbeoordeeld.
Cathedral Peak, Suid-Afrika, Sept. 1989
Analysis of the Bouncing Ball Virus M. S. Olivier and H. W. Teitge. Analysis of the Bouncing Ball Virus.
Technical Report PKOMP 89/5. Pretoria, South Africa: CSIR, July 1989
“Hoofstuk 16: Rekenaarvirusse” M. S. Olivier. “Hoofstuk 16: Rekenaarvirusse”. In: Van Pletsen, F, DOS:’n Handleiding vir rekenaarentoesiaste. De Jager-HAUM, 1989. isbn:
978-0-7986-3018-4
[ Paper available] [ Paper available upon request] [ Paper not yet available] [ Abstract] [ Full citation information] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
Some icons used under a CC licence from http://prokofusha.deviantart.com