@inproceedings{Hauger_2015,doi = {10.1109/issa.2015.7335071},url = {http://dx.doi.org/10.1109/issa.2015.7335071},year = 2015,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Werner K. Hauger and Martin S. Olivier},title = {The state of database forensic research},booktitle = {2015 Information Security for South Africa ({ISSA})}}
@inproceedings{Olivier_2015,doi = {10.1109/issa.2015.7335077},url = {http://dx.doi.org/10.1109/issa.2015.7335077},year = 2015,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Martin S Olivier},title = {Towards a digital forensic science},booktitle = {2015 Information Security for South Africa ({ISSA})}}
2015
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES
@incollection{Tewelde_2015,doi = {10.1007/978-3-319-24123-4_2},url = {http://dx.doi.org/10.1007/978-3-319-24123-4_2},year = 2015,publisher = {Springer Science $\mathplus$ Business Media},pages = {29--43},author = {Segen Tewelde and Stefan Gruner and Martin Olivier},title = {{NOTIONS} {OF} {HYPOTHESIS} {IN} {DIGITAL} {FORENSICS}},booktitle = {{IFIP} Advances in Information and Communication Technology}}