Name
Papers
Collaborators
MARTIN S. OLIVIER
109
77
Citations 
PageRank 
Referers 
465
73.94
826
Referees 
References 
931
668
Search Limit
100931
Title
Citations
PageRank
Year
Evaluating the Authenticity of Smartphone Evidence.20.392017
Establishing Findings in Digital Forensic Examinations: A Case Study Method.00.342017
On the Morality of Teaching Students IT Crime Skills: Extended Abstract.00.342016
Determining Trigger Involvement During Forensic Attribution in Databases.00.342015
Schema Reconstruction in Database Forensics.00.342014
Database application schema forensics.10.752014
Smartphones as Distributed Witnesses for Digital Forensics.30.442014
Security steps for smartphone users.00.342013
Finding File Fragments in the Cloud.00.342012
Using Internal Depth to Aid Stereoscopic Image Splicing Detection.10.382012
On Dimensions of Reconstruction in Database Forensics.50.572012
Arguments and Methods for Database Data Model Forensics.20.472012
Isolating Instances in Cloud Forensics.30.412012
Improving system availability with near-miss analysis.00.342012
Android Botnets On The Rise: Trends And Characteristics241.422012
On the Completeness of Reconstructed Data for Database Forensics.50.542012
Correctness proof for database reconstruction algorithm.40.522012
Gamifying authentication00.342012
Reconstruction in Database Forensics.60.622012
On Compound Purposes and Compound Reasons for Enabling Privacy.20.442011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.00.342011
Network Forensics in a Clean-Slate Internet Architecture.00.342011
Isolating a cloud instance for a digital forensic investigation.211.262011
Assembling Metadata for Database Forensics.10.372011
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool.20.472011
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps10.372011
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols.00.342011
Steganographic Techniques for Hiding Data in SWF Files.00.342011
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation40.392010
A Generalized model for understanding and education of Information and Computer Security.00.342010
The Design of a Logical Traffic Isolation Forensic Model.00.342009
On metadata context in Database Forensics352.902009
Processing Algorithms for Components within a Forensic Evidence Management System.00.342009
XBRL-Trail --- A model for introducing digital forensic readiness to XBRL.00.342009
Considerations Towards a Cyber Crime Profiling System30.532008
Application of Message Digests for the Verification of Logical Forensic Data00.342008
Bridging the gap between anonymous e-mail and anonymous web browsing10.372008
An Evidence Acquisition Tool for Live Systems10.402008
On the probability of a false positive match for digital camera identification based on sensor dirt location.00.342008
Using Sensor Dirt for Toolmark Analysis of Digital Photographs00.342008
A comparison of simulated traffic conditioner performance00.342008
The Use of File Timestamps in Digital Forensics20.582008
UML Modelling of Digital Forensic Process Models (DFPMs)30.572008
Applying The Biba Integrity Model to Evidence Management20.472007
Patlet for Digital Forensics First Responders10.462007
Using purpose lattices to facilitate customisation of privacy agreements90.662007
Analysis of Web Proxy Logs20.452006
Information leakage in ubiquitous Voice-over-IP communications20.502006
On bidder zones, cell phones and ballot stuffing20.382006
Framework for a Digital Forensic Investigation191.752006
  • 1
  • 2