“A Taxonomy of Web Service Attacks” K. F. P. Chan, M. S. Olivier, and R. P. van Heerden. “A Taxonomy
of Web Service Attacks”. In: Proceedings of ICIW 2013 — The 8thInternational Conference on Information Warfare and Security. Ed. by
D. Hart. Denver, Colorado, USA: Academic Conferences and Publishing,
Mar. 2013, pp. 34–42
“Design of a Hybrid Command and Control Mobile Botnet” H. Pieterse and M. S. Olivier. “Design of a Hybrid Command and
Control Mobile Botnet”. In: Proceedings of ICIW 2013 — The 8thInternational Conference on Information Warfare and Security. Ed. by
D. Hart. Denver, Colorado, USA: Academic Conferences and Publishing,
Mar. 2013, pp. 183–192
“A Near-Miss Management System to Facilitate Forensic Investigation of
Software Failures” M. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “A Near-Miss
Management System to Facilitate Forensic Investigation of Software
Failures”. In: Proceedings of the 13th European Conference on CyberWarfare and Security. Ed. by A. Liaropoulos and G. Tsihrintzis. Academic
Conferences, 2014, pp. 233–241
“Bluetooth Command and Control channel” H. Pieterse and M. S. Olivier. “Bluetooth Command and Control channel”.
In: Computers & Security 45 (2014), pp. 75–83
“Smartphones as Distributed Witnesses for Digital Forensics” H. Pieterse and M. S. Olivier. “Smartphones as Distributed Witnesses for
Digital Forensics”. In: Advances in Digital Forensics X. Ed. by G. Peterson
and S. Shenoi. Springer, 2014, pp. 237–251
“Cloud Separation: Stuck inside the cloud” W. Delport and M. S. Olivier. “Cloud Separation: Stuck inside the cloud”.
In: Trust, Privacy and Security in Digital Business — 9th Internationalconference, TrustBus, 2012 Vienna, Austria, September 2012, Proceedings.
Ed. by S. Fischer-Hübner, S. Katsikas, and G. Quirchmayr. LNCS 7449.
Springer, 2012, pp. 36–49
“Isolating instances in the cloud” W. Delport and M. S. Olivier. “Isolating instances in the cloud”. In:
Advances in Digital Forensics VIII. Ed. by G. Peterson and S. Shenoi.
Springer, 2012, pp. 187–200
“Analysing the fairness of trust-based Mobile Ad Hoc Network protocols” I. D. Burke and M. S. Olivier. “Analysing the fairness of trust-based
Mobile Ad Hoc Network protocols”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Published electronically).
Johannesburg, South Africa, Aug. 2011
“Network Forensics in a Clean-slate Internet Architecture” T. Strauss and M. S. Olivier. “Network Forensics in a Clean-slate Internet
Architecture”. In: Proceedings of the 2011 Information Security for SouthAfrica (ISSA 2011) Conference. Ed. by H. S. Venter, M. Coetzee, and M.
Loock. (Published electronically). Aug. 2011
“Isolating a Cloud Instance for a Digital Forensic Investigation” W. Delport, M. S. Olivier, and M. D. Köhn. “Isolating a Cloud
Instance for a Digital Forensic Investigation”. In: Proceedings of the 2011Information Security for South Africa (ISSA 2011) Conference. Ed. by
H. S. Venter, M. Coetzee, and M. Loock. (Work in Progress Paper;
published electronically). Johannesburg, South Africa, Aug. 2011
“In Search of Search Privacy” W. Brandi and M. S. Olivier. “In Search of Search Privacy”. In:
Proceedings of the 7th International Conference on Trust, Privacy andSecurity in Digital Business (TrustBus 2010). Ed. by S. Katsikas, J. Lopez,
and M. Soriano. Vol. 6264. Lecture Notes in Computer Science. 2010,
pp. 102–116
“Framework for Developing Realistic MANET Simulations” I. Burke, S. Naidoo, and M. S. Olivier. “Framework for Developing
Realistic MANET Simulations”. In: Proceedings of ICIW 2010 —The 5th International Conference on Information-Warfare & Security.
Wright-Patterson Air Force Base, Ohio, USA, Apr. 2010, pp. 65–71
“Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling” I. Z. Dlamini, M. S. Olivier, and S. Sibiya. “Pattern-Based Approach for
Logical Traffic Isolation Forensic Modelling”. In: Twentieth InternationalWorkshop on Database and Expert Systems Applications. Ed. by A. M.
Tjoa and R. R. Wagner. IEEE Computer Society, 2009, pp. 145–149
“The design of a logical traffic isolation forensic model” I. Z. Dlamini and M. S. Olivier. “The design of a logical traffic isolation
forensic model”. In: Proceedings of the ISSA 2009 Conference. Ed. by H. S.
Venter, M. Coetzee, and L. Labuschagne. (Research in progress paper,
published electronically). Johannesburg, South Africa, July 2009
“A Simulation of Logical Traffic Isolation Using Differentiated Services” I. Z. Dlamini, M. S. Olivier, and M. Grobler. “A Simulation of Logical
Traffic Isolation Using Differentiated Services”. In: Proceedings of the4th International Workshop on Digital Forensics & Incident Analysis,WDFIA 2009. Ed. by N. L. Clarke and T. Tryfonas. Centre for Information
Security & Network Research, University of Plymouth, 2009, pp. 20–27
“A Silent SMS Denial of Service (DoS) Attack” N. J. Croft and M. S. Olivier. “A Silent SMS Denial of Service
(DoS) Attack”. In: Southern African Telecommunication Networks andApplications Conference 2007 (SATNAC 2007) Proceedings. (Published
Electronically). Sugar Beach Resort, Mauritius, Sept. 2007
“Acquisition of a Symbian Smart phone’s Content with an On-Phone
Forensic Tool” P. M. Mokhonoana and M. S. Olivier. “Acquisition of a Symbian
Smart phone’s Content with an On-Phone Forensic Tool”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2007(SATNAC 2007) Proceedings. (Published Electronically). Sugar Beach
Resort, Mauritius, Sept. 2007
“Using image steganography for decryptor distribution” T. Morkel, J. H. P. Eloff, and M. S. Olivier. “Using image steganography
for decryptor distribution”. In: On the Move to Meaningful InternetSystems 2006: OTM 2006 Workshops. Ed. by R. Meersman, Z. Tari, and
P. Herrero. Vol. 4277. LNCS. Springer, 2006, pp. 322–330
“Extending P3P to Facilitate Proxies which Pose as a Potential Threat to
Privacy” W. A. Brandi and M. S. Olivier. “Extending P3P to Facilitate Proxies
which Pose as a Potential Threat to Privacy”. In: Trust, Privacy andSecurity in Digital Business. Ed. by S. Fischer-Hübner, S. Furnell, and C.
Lambrinoudakis. Vol. 4083. LNCS. Springer, 2006, pp. 81–90
“Information leakage in ubiquitous Voice-over-IP” T. Neumann, H. Tillwick, and M. S. Olivier. “Information leakage in
ubiquitous Voice-over-IP”. In: Trust, Privacy and Security in DigitalBusiness. Ed. by S. Fischer-Hübner, S. Furnell, and C. Lambrinoudakis.
Vol. 4083. LNCS. Springer, 2006, pp. 233–242
“Anonymous Mobile Conference Calls” N. J. Croft and M. S. Olivier. “Anonymous Mobile Conference Calls”.
In: Southern African Telecommunication Networks and ApplicationsConference 2006 (SATNAC 2006) Proceedings. Ed. by D. Browne. Vol. 1.
Stellenbosch, South Africa, Sept. 2006, pp. 411–416
“On bidder zones, cell phones and ballot stuffing” W. A. Brandi and M. S. Olivier. “On bidder zones, cell phones and
ballot stuffing”. In: Proceedings of the ISSA 2006 from Insight to ForesightConference. Ed. by H. S. Venter et al. Published electronically. Sandton,
South Africa, July 2006
“Active Traffic Capture for Network Forensics” M. L. Slaviero, A. Granova, and M. S. Olivier. “Active Traffic Capture
for Network Forensics”. In: Advances in Digital Forensics II. Ed. by M. S.
Olivier and S. Shenoi. Springer, 2006, pp. 215–228
“Differentiated Services for Logical Traffic Isolation” T. Strauss, M. S. Olivier, and D. G. Kourie. “Differentiated Services for
Logical Traffic Isolation”. In: Advances in Digital Forensics II. Ed. by
M. S. Olivier and S. Shenoi. Springer, 2006, pp. 229–237
“Network Forensics: Web Proxy Log Analysis” B. K. L. Fei et al. “Network Forensics: Web Proxy Log Analysis”. In:
Advances in Digital Forensics II. Ed. by M. S. Olivier and S. Shenoi.
Springer, 2006, pp. 247–258
2001-2005
“Distributed Proxies for Browsing Privacy — A Simulation of Flocks” M. S. Olivier. “Distributed Proxies for Browsing Privacy — A Simulation
of Flocks”. In: Research for a changing world — Proceedings of SAICSIT2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept.
2005, pp. 104–112
“Towards a framework for connection anonymity” H. Tillwick and M. S. Olivier. “Towards a framework for connection
anonymity”. In: Research for a changing world — Proceedings of SAICSIT2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept.
2005, pp. 113–122
“A Simulation Study of Traffic Conditioner Performance” M. D. Strauss, D. G. Kourie, and M. S. Olivier. “A Simulation Study of
Traffic Conditioner Performance”. In: Research for a changing world —Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White
River, South Africa, Sept. 2005, pp. 171–181
“A fraud detection model for Next-Generation Networks” M. A. Bihina Bella, M. S. Olivier, and J. H. P. Eloff. “A
fraud detection model for Next-Generation Networks”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 321–326
“Using an approximated One-Time Pad to Secure Short Messaging Service
(SMS)” N. J. Croft and M. S. Olivier. “Using an approximated One-Time
Pad to Secure Short Messaging Service (SMS)”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 71–76
“Detecting Uncooperative Ethernet Elements using Accurate Round-trip
Time Measurements” J. P. Delport and M. S. Olivier. “Detecting Uncooperative Ethernet
Elements using Accurate Round-trip Time Measurements”. In: SouthernAfrican Telecommunication Networks and Applications Conference 2005(SATNAC 2005) Proceedings. Ed. by D. Browne. Vol. 1. Champagne
Castle, South Africa, Sept. 2005, pp. 153–156
“Enhancements to SIP to prevent abuse of Voice-over-IP services” T. Neumann and M. S. Olivier. “Enhancements to SIP to prevent
abuse of Voice-over-IP services”. In: Southern African TelecommunicationNetworks and Applications Conference 2005 (SATNAC 2005) Proceedings.
Ed. by D. Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005,
pp. 359–364
“Incorporating Prejudice into Trust Models to Reduce Network Overload” M. Wojcik et al. “Incorporating Prejudice into Trust Models to Reduce
Network Overload”. In: Southern African Telecommunication Networksand Applications Conference 2005 (SATNAC 2005) Proceedings. Ed. by D.
Browne. Vol. 1. Champagne Castle, South Africa, Sept. 2005, pp. 195–200
“Codec-Hopping: Secure and Private Voice Communication in Bandwidth
Constrained Networks” N. J. Croft, M. S. Olivier, and H. S. Venter. “Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks”. In:
Proceedings of the First International Workshop on Security, Privacy andTrust in Pervasive and Ubiquitous Computing (SecPerU 2005). Ed. by P
Georgiadis, S Gritzalis, and G. F. Marias. Diavlos Publications, July 2005,
pp. 85–91
“Polar: Proxies Collaborating to Achieve Anonymous Web Browsing” H. Tillwick et al. “Polar: Proxies Collaborating to Achieve Anonymous
Web Browsing”. In: Proceedings of the Fifth International NetworkConference (INC2005). Ed. by S. M. Furnell, P. S. Dowland, and G.
Kormentzas. Samos, Greece, July 2005, pp. 317–324
“Using Compatible Keys in Achieving Subscriber Privacy Channelling for
Billing in GSM Networks” N. J. Croft and M. S. Olivier. “Using Compatible Keys in Achieving
Subscriber Privacy Channelling for Billing in GSM Networks”. In:
Proceedings of the Fifth International Network Conference (INC2005). Ed.
by S. M. Furnell, P. S. Dowland, and G. Kormentzas. Samos, Greece, July
2005, pp. 245–252
“Using Self-Organising Maps for Anomalous Behaviour Detection in a
Computer Forensic Investigation” B. K. L. Fei et al. “Using Self-Organising Maps for Anomalous Behaviour
Detection in a Computer Forensic Investigation”. In: Proceedings of theFifth Annual Information Security South Africa Conference (ISSA2005).
Ed. by H. S. Venter et al. Research in progress paper, published
electronically. Sandton, South Africa, June 2005
“Using the IPDR standard for NGN billing and fraud detection” M. A. Bihina Bella, J. H. P. Eloff, and M. S. Olivier. “Using the IPDR
standard for NGN billing and fraud detection”. In: Proceedings of the FifthAnnual Information Security South Africa Conference (ISSA2005). Ed. by
H. S. Venter, J. H. P. E. L. Labuschagne, and M. M. Eloff. Research in
progress paper, published electronically. Sandton, South Africa, June 2005
“A Model for Spam Prevention in Voice over IP Networks using
Anonymous Verifying Authorities” N. J. Croft and M. S. Olivier. “A Model for Spam Prevention in
Voice over IP Networks using Anonymous Verifying Authorities”. In:
Proceedings of the Fifth Annual Information Security South AfricaConference (ISSA2005). Ed. by H. S. Venter et al. Research in progress
paper, published electronically. Sandton, South Africa, June 2005
“Towards a Hippocratic Log File Architecture” A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards a Hippocratic
Log File Architecture”. In: Proceedings of SAICSIT 2004 — fulfillingthe promise of ICT. Ed. by G. Marsden, P. Kotzé, and A. Adesina-Ojo.
Stellenbosch, South Africa, Oct. 2004, pp. 186–193
“The use of a Third Party Proxy in Achieving GSM Anonymity” N. J. Croft and M. S. Olivier. “The use of a Third Party Proxy in
Achieving GSM Anonymity”. In: Southern African TelecommunicationNetworks and Applications Conference 2004 (SATNAC 2004). Ed. by D.
Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004
“DAOMAP: A Distributed IPv6 Multicast Address Allocating Protocol” M. Slaviero and M. S. Olivier. “DAOMAP: A Distributed IPv6 Multicast
Address Allocating Protocol”. In: Southern African TelecommunicationNetworks and Applications Conference 2004 (SATNAC 2004). Ed. by D.
Browne. Published electronically. Stellenbosch, South Africa, Sept. 2004
“Towards Hippocratic Log files” A. Rutherford, R. A. Botha, and M. S. Olivier. “Towards Hippocratic Log
files”. In: Proceedings of the Fourth Annual Information Security SouthAfrica Conference (ISSA2004). Published electronically. Midrand, South
Africa, June 2004
“On Privacy and the Web” W. A. Brandi and M. S. Olivier. “On Privacy and the Web”. In:
Proceedings of the Fourth Annual Information Security South AfricaConference (ISSA2004). Published electronically. Midrand, South Africa,
June 2004
“A Layered Security Architecture: Design Issues” H. Tillwick and M. S. Olivier. “A Layered Security Architecture: Design
Issues”. In: Proceedings of the Fourth Annual Information SecuritySouth Africa Conference (ISSA2004). Work in progress paper, published
electronically. Midrand, South Africa, June 2004
“An approach to build a fortified network logger that is resilient to
cracking attempts” J. Kroon and M. S. Olivier. “An approach to build a fortified network
logger that is resilient to cracking attempts”. In: Proceedings of the FourthAnnual Information Security South Africa Conference (ISSA2004). Work
in progress paper, published electronically. Midrand, South Africa, June
2004
“Curtailing Web defacement using a read-only strategy” A. Cooks and M. S. Olivier. “Curtailing Web defacement using a read-only
strategy”. In: Proceedings of the Fourth Annual Information SecuritySouth Africa Conference (ISSA2004). Work in progress paper, published
electronically. Midrand, South Africa, June 2004
“Implementing Workflow with Microsoft’s Distributed Object Model
(DCOM)” L. C. J. Dreyer and M. S. Olivier. “Implementing Workflow with
Microsoft’s Distributed Object Model (DCOM)”. In: Research Directionsin Database and Application Security. Ed. by E. Gudes and S. Shenoi.
Kluwer, 2003, pp. 61–72
“A Chinese Wall Approach to Privacy Policies for The Web” F. A. Lategan and M. S. Olivier. “A Chinese Wall Approach to Privacy
Policies for The Web”. In: 26th Annual International Computer Softwareand Applications Conference (COMPSAC 2002). Oxford, UK: IEEE, 2002,
pp. 940–944
“Increasing Firewall Reliability by Recording Routes” P. M. Boshoff and M. S. Olivier. “Increasing Firewall Reliability by
Recording Routes”. In: Communications and Multimedia Security II. Ed.
by P Horster. Chapman & Hall, 1996, pp. 303–314
“A Prototype for Personal Business Transactions on Public Networks” E. J. Uphof and M. S. Olivier. “A Prototype for Personal Business
Transactions on Public Networks”. In: Proceedings of the IFIP TC11Workgroup 11.2 on Small System Security. Ed. by J. H. P. Eloff.
Unrefereed. Samos, Greece, May 1996, pp. 13–27
“A Heuristic for Securing Hypertext Systems” M. S. Olivier. “A Heuristic for Securing Hypertext Systems”. In:
Communications and Multimedia Security. Ed. by R Posch. Chapman &
Hall, 1995, pp. 43–54
[ Paper available] [ Paper available upon request] [ Paper not yet available] [ Abstract] [ Full citation information] [ BibTeX reference entry] [ Authoritative version of paper on publisher's site]
Some icons used under a CC licence from http://prokofusha.deviantart.com