@inproceedings{Strauss_2011,doi = {10.1109/issa.2011.6027506},url = {http://dx.doi.org/10.1109/issa.2011.6027506},year = 2011,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Tinus Strauss and Martin S. Olivier},title = {Network forensics in a clean-slate Internet architecture},booktitle = {2011 Information Security for South Africa}}
2011
Analysing the fairness of trust-based mobile ad hoc network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations
@article { olivier2011,title = {Analysing the fairness of trust-based mobile ad hoc network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations},journal = {2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference},year = {2011},author = {Burke, I.D. and Van Heerden, R. and Olivier, M.S.}}
@incollection{Beyers_2011,doi = {10.1007/978-3-642-24212-0_7},url = {http://dx.doi.org/10.1007/978-3-642-24212-0_7},year = 2011,publisher = {Springer Science $\mathplus$ Business Media},pages = {89--99},author = {Hector Beyers and Martin Olivier and Gerhard Hancke},title = {Assembling Metadata for Database Forensics},booktitle = {Advances in Digital Forensics {VII}}}
2011
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps
@article { olivier2011,title = {Framework for developing realistic MANET simulations},journal = {5th European Conference on Information Management and Evaluation, ECIME 2011},year = {2011},pages = {65-71},author = {Burke, I. and Naidoo, S. and Olivier, M.}}