@inproceedings{Dlamini_2009,doi = {10.1109/dexa.2009.8},url = {http://dx.doi.org/10.1109/dexa.2009.8},year = 2009,publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Innocentia Dlamini and Martin Olivier and Sihle Sibiya},title = {Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling},booktitle = {2009 20th International Workshop on Database and Expert Systems Application}}
2009
Pattern-based approach for logical traffic isolation forensic modelling
@article { olivier2009,title = {Pattern-based approach for logical traffic isolation forensic modelling},journal = {Proceedings - International Workshop on Database and Expert Systems Applications, DEXA},year = {2009},pages = {145-149},author = {Dlamini, I. and Olivier, M. and Sibiya, S.}}
@article{RID:0814170417404-43,
title = {Considerations towards a cyber crime profiling system},
journal = {Ares 2008: Proceedings of the Third International Conference on Availability, Security and Reliability},
year = {2008},
author = {Arthur, Kweku K. and Olivier, Martin S. and Venter, Hein S. and Eloff, Jan H. P.},
pages = {1388-1393}
}
@article{RID:0814170417404-42,
title = {Standardising vulnerability categories},
journal = {Computers & Security},
year = {2008},
author = {Venter, H. S. and Eloff, J. H. P. and Li, Y. L.},
volume = {27},
number = {3-4},
pages = {71-83}
}