Martin S Olivier
Current Postgraduate Students
Doctoral Students
- W Hauger (Topic: TBD; 2019)
Masters Students (by dissertation)
- IZ Dlamini (Topic: Digital forensic education; 2008)
Completed Postgraduate Students
Doctoral (Thesis-based)
- H Pieterse, PhD, UP, September 2019, Evaluation and Identification of Authentic Smartphone Data
- OM Adedayo, PhD, UP, April 2015, Reconstruction in Database Forensics
- WJC van Staden, PhD, UP, September 2011, A Model for Compound Purposes and Reasons as Privacy Enhancing Technology in a Relational Database
- NJ Croft, PhD, UP, September 2011, On Privacy in Mobile Voice Communication Networks
- W Brandi, PhD, UP, September 2011, In Search of Search Privacy
- MP Zielinski, PhD, UP, April 2010, On the use of Economic Price Theory to Determine the Optimum Levels of Privacy and Information Utility in Microdata Anonymisation
- F-A Lategan, PhD, RAU, September 2002, Enforcing Privacy on the Internet
- LCJ Dreyer, PhD, RAU, September 1999, The InfoPriv Model for Information Privacy
- CW Rensleigh, DCom, RAU, March 1999, Consultation for Small-Business Computerisation
Masters graduates (Dissertation-based)
- W Hauger, MSc, UP, September 2019, Forensic Attribution Challenges During Forensic Examinations of Databases
- OO Oyelami, MSc, UP, April 2019, Case Study Research as a Method for Digital Forensic Evidence Examinations
- DJJ Kotze, MSc, UP, September 2015, XML Accounting Trail: A model for introducing digital forensic readiness to XML Accounting and XBRL
- M-A Fouché, MSc, UP, April 2015, Using depth information to aid stereoscopic image forensics
- AS Rakitianskaia, MSc, UP, April 2015, Digital Forensics in Second Life (Co-supervised by Dr AK Cooper)
- H Pieterse, MSc, UP, September 2014, Design of a Hybrid Command and Control Mobile Botnet
- W Delport, MSc, UP, April 2014, Forensic Evidence Isolation in Clouds
- P De Souza, MSc, UP, April 2014, A Chain of Findings for Digital Investigations
- HQ Beyers, MEng, UP, April 2014, Database Forensics: Investigating Compromised Database Management Systems (Co-supervisor, supervisor: Prof GP Hancke)
- KK Arthur, MSc, UP, September 2010, Considerations towards the Development of a Forensic Evidence Management System
- T Neumann, MSc, UP, April 2010, Privacy in Voice-over-IP - Mitigating the Risks at SIP Intermediaries
- R Koen, MSc, UP, April 2009, The Development of an Open-source Forensics Platform
- JP Delport, MSc, UP, April 2008, Link Layer Topology Discovery in an Uncooperative Ethernet Environment
- MA Bihina Bella, MSc, UP, September 2007, A Fraud Management Architecture for Next Generation Networks (Co-supervisor; supervisor: Prof JHP Eloff)
- HM Tillwick, MSc, UP, April 2007, Polar: Proxies Collaborating to Achieve Anonymous Web Browsing
- M Breedt, MSc, UP, September 2006, Integrating Biometric Authentication into Multiple Applications
- ML Slaviero, MSc, UP, April 2005, Secure and Distributed Multicast Address Allocation on IPv6 Networks
- NJ Croft, MSc, UP, September 2004, Secure Interoperation of Wireless Networks
- WJC van Staden, MSc, RAU, March 2004, The use of a Virtual Machine for Access Control in a Relational Database Management System
- K Venter, MSc, RAU, September 2003, A Model for the Dynamic Delegation of Authorization Rights in a Secure Workflow Management System
- A Pedroncelli, MSc, RAU, March 2003, Secure Multimedia Databases
- G Watt, MSc, RAU, March 2003, A Model for the Secure Management of Supply Chains
- W Brandi, MSc, RAU, March 2002, Extensions to the Self Protecting Object Model to Facilitate Integrity in Stationary and Mobile Hosts
- HJG Oberholzer, MSc, RAU, September 2001, A Privacy Protection Model to Support Personal Privacy in Relational Databases
- A Hardy, MSc, RAU, March 2000, An Implementation and Analysis of the Configurable Security Architecture
- PM Boshoff, MSc, RAU, September 1998, Securing Host and Application Information in the TCP/IP Protocol Suite
- JS von Solms, MSc, RAU, March 1998, MOFAC: A Model for Fine-Grained Access Control in IT Systems (Co-supervised by Prof SH von Solms)
- LCJ Dreyer, MSc, RAU, March 1997, An Infrastructure for Secure Distributed Object-oriented Databases
- J van der Merwe, MSc, RAU, March 1996, Objek-georiënteerde en Rolgebaseerde Verspreide Inligtingsekerheid in 'n Oop Transaksieverwerking Omgewing (Co-supervisor, supervisor: Prof SH von Solms)
- PW Jansen van Rensburg, MSc, RAU, September 1995, Diskresionêre Sekerheid in Objek Georiënteerde Omgewings
- C Kyriakides, MSc, RAU, September 1994, Object-oriented Parallel Paradigms
- CW Rensleigh, MCom, RAU, March 1993, Veilige Identifikasietegnieke vir Gebruikers van Rekenaarstelsels
By mini-dissertations following coursework
- N Makanya, MIT, UP, September 2015, A Model for Privacy Protection in ERP Systems
- M Seedat, MIT, UP, April 2013, Centralized Authentication in Distributed Computing Environments (DCE) using Lightweight Directory Access Protocol (LDAP)
- N Wakaba, MIT, UP, September 2012, An Exploratory Investigation on the use of Folksonomies to Improve Link Analysis-based Ranking (Co-supervisor; supervisor: Prof I Fourie)
- PJ Helberg, MIT, UP, April 2011, Consistency Analysis of Email
- T Bannatyne, MIT, UP, April 2011, Factors that could be used in Forensic Investigations for Identity Matching across and using Social Networks
- HG Hlomane, MIT, UP, April 2010, Mobile Communication: The Impact and Challenges of Mobile Communication on the Socio-economic Status and Empowerment of Developing Communities (Co-supervisor: Ms E Venter)
- M du Plessis, MIT, UP, September 2009, An Evaluation of Extremist Websites According to Internet User Online Activities (Co-supervisor; supervisor: Prof JJ Britz)
- NS Medina Meza, MIT, UP, April 2009, A Model for Direct Recording Electronic Voting Systems
- K Scott, MIT, UP, April 2008, An Early Warning System for Phishing Emails and Websites
- SL Venter, MIT, UP, September 2006, Facets of Ethics in Proactive Computing (Co-supervisor: Prof JJ Britz)
- SH Shongwe, MIT, UP, September 2006, Security Challenges Facing Wireless LAN (WLAN) Public Hotspots
- TM Nkwane, MIT, UP, April 2006, Cyber Security of the Power Utilities in South Africa
- HN Olinger, MIT, UP, April 2005, Western Privacy and Ubuntu - Influences in the Forthcoming Data Privacy Bill (Co-supervisor; supervisor: Prof JJ Britz)
- MMS Bapela, MIT, UP, April 2004, Using mobile Intelligent agents to manage software piracy
- RC Joubert, MIT, UP, April 2004, Utilizing Idle time of Linux workstations as a Massively Parallel Supercomputer
- AM Maakal, MIT, UP, April 2004, A Cost-effective and Highly available Process Control Network Infrastructure for an Industrial Plant Environment with a Remote Data Centre
[Home]
[Research]
[Publications]
[Courses]
[M & D]
[Resume]
[Personal]
[Blog]
[Contact]
Page maintained by
Martin Olivier
Last update: 18 August 2019