@inproceedings{Pieterse_2012,doi = {10.1109/issa.2012.6320432},url = {http://dx.doi.org/10.1109/issa.2012.6320432},year = 2012,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Heloise Pieterse and Martin S Olivier},title = {Android botnets on the rise: Trends and characteristics},booktitle = {2012 Information Security for South Africa}}
@inproceedings{Kroeze_2012,doi = {10.1109/issa.2012.6320439},url = {http://dx.doi.org/10.1109/issa.2012.6320439},year = 2012,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Christien Kroeze and Martin S Olivier},title = {Gamifying authentication},booktitle = {2012 Information Security for South Africa}}
@article { olivier2012,title = {Data hiding techniques for database environments},journal = {IFIP Advances in Information and Communication Technology},year = {2012},volume = {383 AICT},pages = {289-301},author = {Pieterse, H. and Olivier, M.}}