@article{Olivier2017,title = {Enforcing privacy by with holding private information},journal = {IFIP Advances in Information and Communication Technology},year = {2017},volume = {47},pages = {421-430},author = {Lategan, F. and Olivier, M.S.}}
@article{Olivier2017,title = {Forensic attribution in NoSQL databases},journal = {2017 Information Security for South Africa - Proceedings of the 2017 ISSA Conference},year = {2017},volume = {2018-January},pages = {74-82},author = {Hauger, W.K. and Olivier, M.S.}}
2017
User-Based Perspective on Cost as a Limiting Factor to Conference Call Technology Use in Higher Education
@article{Ikuesan2017,title = {Aesthetic surgery induced transformation face insensitive features: The medical and theoretical standpoint},journal = {2017 IEEE AFRICON: Science, Technology and Innovation for Africa, AFRICON 2017},year = {2017},pages = {391-396},author = {Olisah, C.C. and Okpala, M. and Ikuesan, A.R.}}
@article{Ikuesan2017,title = {Attributing users based on web browser history},journal = {2017 IEEE Conference on Applications, Information and Network Security, AINS 2017},year = {2017},volume = {2018-January},pages = {69-74},author = {Pretorius, S. and Ikuesan, A.R. and Venter, H.S.}}