@article { olivier2006,title = {Active traffic capture for network forensics},journal = {IFIP International Federation for Information Processing},year = {2006},volume = {222},pages = {215-228},author = {Slaviero, M. and Granova, A. and Olivier, M.}}
@book{2006,doi = {10.1007/0-387-36891-4},url = {http://dx.doi.org/10.1007/0-387-36891-4},year = 2006,publisher = {Springer New York},editor = {Martin S. Olivier and Sujeet Shenoi},title = {Advances in Digital Forensics {II}}}
@incollection{Fei_2006,doi = {10.1007/0-387-36891-4_20},url = {http://dx.doi.org/10.1007/0-387-36891-4_20},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {247--258},author = {Bennie Fei and Jan Eloff and Martin Olivier and Hein Venter},title = {Analysis of Web Proxy Logs},booktitle = {{IFIP} Advances in Information and Communication Technology}}
2006
Applying Machine Trust Models to Forensic Investigations
@incollection{Wojcik_2006,doi = {10.1007/0-387-36891-4_5},url = {http://dx.doi.org/10.1007/0-387-36891-4_5},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {55--65},author = {Marika Wojcik and Hein Venter and Jan Eloff and Martin Olivier},title = {Applying Machine Trust Models to Forensic Investigations},booktitle = {{IFIP} Advances in Information and Communication Technology}}
2006
Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy
@incollection{Brandi_2006,doi = {10.1007/11824633_9},url = {http://dx.doi.org/10.1007/11824633_9},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {81--90},author = {Wesley Brandi and Martin S. Olivier},title = {Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy},booktitle = {Trust and Privacy in Digital Business}}