@article{Dlamini2011,title = {User-centric information security systems - A living lab approach},journal = {10th European Conference on Information Warfare and Security 2011, ECIW 2011},year = {2011},pages = {73-80},author = {Dlamini, M. and Eloff, J. and Zielinksi, M. and Chuang, J. and Smit, D.}}
@article{Olivier2011,title = {Assembling metadata for database forensics},journal = {IFIP Advances in Information and Communication Technology},year = {2011},volume = {361},pages = {89-99},author = {Beyers, H. and Olivier, M. and Hancke, G.}}
2011
Steganographic techniques for hiding data in SWF files
@article{Olivier2011,title = {Steganographic techniques for hiding data in SWF files},journal = {IFIP Advances in Information and Communication Technology},year = {2011},volume = {361},pages = {245-255},author = {Fouche, M.-A. and Olivier, M.}}
@article{Venter2010,title = {A forensic readiness model for wireless networks},journal = {IFIP Advances in Information and Communication Technology},year = {2010},volume = {337 AICT},pages = {107-118},author = {Ngobeni, S. and Venter, H. and Burke, I.}}
2010
A security privacy aware architecture and protocol for a single smart card used for multiple services
@article{RID:0814170417403-40,
title = {A security privacy aware architecture and protocol for a single smart card used for multiple services},
journal = {Computers & Security},
year = {2010},
author = {Rossudowski, A. M. and Venter, H. S. and Eloff, J. H. P. and Kourie, D. G.},
volume = {29},
number = {4},
pages = {393-409}
}