@article{Venter2012,title = {User-generated digital forensic evidence in graphic design applications},journal = {Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012},year = {2012},pages = {195-200},author = {Mabuto, E.K. and Venter, H.S.}}
2012
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
@article{RID:0814170417402-34,
title = {Using time-driven activity-based costing to manage digital forensic readiness in large organisations},
journal = {Information Systems Frontiers},
year = {2012},
author = {Reddy, K. and Venter, H. S. and Olivier, M. S.},
volume = {14},
number = {5},
pages = {1061-1077}
}
2012
Improving system availability with near-miss analysis
@inproceedings{Pieterse_2012,doi = {10.1109/issa.2012.6320432},url = {http://dx.doi.org/10.1109/issa.2012.6320432},year = 2012,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Heloise Pieterse and Martin S Olivier},title = {Android botnets on the rise: Trends and characteristics},booktitle = {2012 Information Security for South Africa}}
@inproceedings{Kroeze_2012,doi = {10.1109/issa.2012.6320439},url = {http://dx.doi.org/10.1109/issa.2012.6320439},year = 2012,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Christien Kroeze and Martin S Olivier},title = {Gamifying authentication},booktitle = {2012 Information Security for South Africa}}