@article{Olivier2017,title = {Forensic attribution in NoSQL databases},journal = {2017 Information Security for South Africa - Proceedings of the 2017 ISSA Conference},year = {2017},volume = {2018-January},pages = {74-82},author = {Hauger, W.K. and Olivier, M.S.}}
2017
User-Based Perspective on Cost as a Limiting Factor to Conference Call Technology Use in Higher Education
@article{Ikuesan2017,title = {Aesthetic surgery induced transformation face insensitive features: The medical and theoretical standpoint},journal = {2017 IEEE AFRICON: Science, Technology and Innovation for Africa, AFRICON 2017},year = {2017},pages = {391-396},author = {Olisah, C.C. and Okpala, M. and Ikuesan, A.R.}}
@article{Ikuesan2017,title = {Attributing users based on web browser history},journal = {2017 IEEE Conference on Applications, Information and Network Security, AINS 2017},year = {2017},volume = {2018-January},pages = {69-74},author = {Pretorius, S. and Ikuesan, A.R. and Venter, H.S.}}
2017
Automated RAM analysis mechanism for windows operating system for digital investigation
@article{Ikuesan2017,title = {Automated RAM analysis mechanism for windows operating system for digital investigation},journal = {2017 IEEE Conference on Applications, Information and Network Security, AINS 2017},year = {2017},volume = {2018-January},pages = {85-90},author = {Meyers, C. and Ikuesan, A.R. and Venter, H.S.}}