@incollection{Slaviero_2006,doi = {10.1007/0-387-36891-4_17},url = {http://dx.doi.org/10.1007/0-387-36891-4_17},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {215--228},author = {Marco Slaviero and Anna Granova and Martin Olivier},title = {Active Traffic Capture for Network Forensics},booktitle = {{IFIP} Advances in Information and Communication Technology}}
@article { olivier2006,title = {Active traffic capture for network forensics},journal = {IFIP International Federation for Information Processing},year = {2006},volume = {222},pages = {215-228},author = {Slaviero, M. and Granova, A. and Olivier, M.}}
@book{2006,doi = {10.1007/0-387-36891-4},url = {http://dx.doi.org/10.1007/0-387-36891-4},year = 2006,publisher = {Springer New York},editor = {Martin S. Olivier and Sujeet Shenoi},title = {Advances in Digital Forensics {II}}}
@incollection{Fei_2006,doi = {10.1007/0-387-36891-4_20},url = {http://dx.doi.org/10.1007/0-387-36891-4_20},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {247--258},author = {Bennie Fei and Jan Eloff and Martin Olivier and Hein Venter},title = {Analysis of Web Proxy Logs},booktitle = {{IFIP} Advances in Information and Communication Technology}}
2006
Applying Machine Trust Models to Forensic Investigations
@incollection{Wojcik_2006,doi = {10.1007/0-387-36891-4_5},url = {http://dx.doi.org/10.1007/0-387-36891-4_5},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {55--65},author = {Marika Wojcik and Hein Venter and Jan Eloff and Martin Olivier},title = {Applying Machine Trust Models to Forensic Investigations},booktitle = {{IFIP} Advances in Information and Communication Technology}}