@inbook{RID:0814170417405-44,
title = {Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy},
chapter = {},
pages = {56-+},
publisher = {},
year = {2008},
author = {Reddy, Kamil and Venter, H. S. and Olivier, Martin and Currie, Iain},
editor = {},
booktitle = {Sixth Annual Conference on Privacy, Security and Trust, Proceedings}
}
2008
Considerations Towards a Cyber Crime Profiling System
@inproceedings{Arthur_2008,doi = {10.1109/ares.2008.107},url = {http://dx.doi.org/10.1109/ares.2008.107},year = 2008,month = {mar},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Kweku K. Arthur and Martin S. Olivier and Hein S. Venter and Jan H.P. Eloff},title = {Considerations Towards a Cyber Crime Profiling System},booktitle = {2008 Third International Conference on Availability, Reliability and Security}}
2008
A comparison of simulated traffic conditioner performance
@article { olivier2008,title = {An evidence acquisition tool for live systems},journal = {IFIP International Federation for Information Processing},year = {2008},volume = {285},pages = {325-334},author = {Koen, R. and Olivier, M.}}
2008
Bridging the gap between anonymous e-mail and anonymous web browsing
@article { olivier2008,title = {Bridging the gap between anonymous e-mail and anonymous web browsing},journal = {Online Information Review},year = {2008},volume = {32},number = {1},pages = {22-34},author = {Tillwick, H. and Olivier, M.S.}}