Author:Pieterse, HeloiseDate:Jun 2017People are creatures of habit, favouring the familiar over unpredictability, which causes them to usually follow set patterns or routines. This is especially true for social interaction or communication where people tend to prefer familiar ...Read more
Author:Mutanga, MB; Mudali, P; Dlamini, IZ; Ndlovu, L; Xulu, SSDate:May 2010Network forensics plays a major role in the investigation of criminal activities involving computer networks. Investigating such crimes is still an open research area due to the fact that technology is always advancing hence investigators ...Read more
Author:Pieterse, Heloise; Oliver, DM; Van Heerden, Renier PDate:Aug 2019Advances in smartphone technology coupled with the widespread use of such devices to accomplish daily tasks create valuable sources of smartphone data. Such data becomes increasingly important when smartphones are linked to civil or criminal ...Read more
Author:Pieterse, Heloise; Olivier, M; Van Heerden, Renier PDate:Aug 2018Ever improving technology allows smartphones to become an integral part of people's lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones ...Read more
Author:Sibiya, G; Venter, HS; Fogwill, TDate:May 2012The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced ...Read more
Author:Sibiya, G; Fogwill, T; Venter, HS; Ngobeni, Sipho JDate:Sep 2013Although cloud computing is maturing, security issues are still prevalent. Most of the security issues that are in the cloud have existed since the advent of the Internet. These issues are escalated in a cloud environment due to its distributed ...Read more
Author:Grobler, MMDate:May 2010With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardization with regard to processes, procedures or management ...Read more
Author:Sibiya, G; Venter, HS; Fogwill, TDate:May 2015The advent of cloud computing has brought new challenges to digital forensics. To address these challenges, new approaches in conducting digital forensic are required. In this paper, challenges that are faced by digital forensic investigator ...Read more
Author:Pieterse, Heloise; Oliver, DM; Van Heerden, Renier PDate:Jun 2019Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones ...Read more
Author:Taute, B; Grobler, M; Nare, SDate:Oct 2009The world is increasingly dependent on ICT for computing, communications, transactions, commerce, data storage, entertainment and a host of other functions. Protesters, terrorists and warmongers have found the Internet to be a useful tool to ...Read more
Author:Sibiya, G; Venter, HS; Ngobeni, Sipho J; Fogwill, TDate:Aug 2012Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud ...Read more
Author:Grobler, MM; Dlamini, IZDate:2010Governance in general is becoming increasingly important in contemporary management, but specifically the governance of Digital Forensics. In order to manage governance disciplines effectively, closer attention needs to be paid to the technical ...Read more
Author:Meyer, HeloiseDate:Jun 2020Mobility is the future and people of the 21st century are continuously witnessing the fast-paced growth of mobile technology. The ever-increasing storage capacity of mobile devices allows for the capturing of the user activities in digital ...Read more
Author:Ngobeni, Sipho J; Venter, H; Burke, Ivan DDate:Jun 2012Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the ...Read more
Author:Rakitianskaia, AS; Olivier, MS; Cooper, Antony KDate:Aug 2011Online social spaces have become very popular in the past couple of decades. With the great numbers of users in the online environments it becomes obvious that the human factor plays an important role in the social structure of such environments. ...Read more
Author:Dlamini, I; Olivier, M; Grobler, MDate:Jun 2009This paper extends work on a forensic model for traffic isolation based on Differentiated Services (DiffServ) and measures its performance by using a simulation. The simulated model has four basic components: traffic generators, the DiffServ ...Read more
Author:Pieterse, Heloise; Olivier, M; Van Heerden, Renier PDate:Mar 2018Ever improving smartphone technology, along with the widespread use of the devices to accomplish daily tasks, leads to the collection of rich sources of smartphone data. Smartphone data are, however, susceptible to change and can be altered ...Read more
Author:Pieterse, Heloise; Olivier, MDate:Jan 2014Smartphones have become an integral part of people's lives during the last few years. Their wide range of capabilities and support of additional applications cause a wealth of information to be stored on these devices. Although tools are ...Read more