Android botnets on the rise: Trends and characteristics H Pieterse, MS Olivier 2012 information security for South Africa, 1-5, 2012 | 123 | 2012 |
Fake news and deepfakes: A dangerous threat for 21st century information security J Botha, H Pieterse ICCWS 2020 15th International Conference on Cyber Warfare and Security …, 2020 | 76 | 2020 |
Design of a hybrid command and control mobile botnet H Pieterse, M Olivier Journal of Information Warfare 12 (1), 70-82, 2013 | 29 | 2013 |
Bluetooth command and control channel H Pieterse, MS Olivier Computers & security 45, 75-83, 2014 | 23 | 2014 |
The cyber threat landscape in South Africa: A 10-year review H Pieterse The African Journal of Information and Communication 28, 1-21, 2021 | 18 | 2021 |
Data hiding techniques for database environments H Pieterse, M Olivier Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012 | 18 | 2012 |
Reference architecture for android applications to support the detection of manipulated evidence H Pieterse, MS Olivier, RP Van Heerden SAIEE Africa Research Journal 107 (2), 92-103, 2016 | 15 | 2016 |
Smartphone data evaluation model: Identifying authentic smartphone data H Pieterse, M Olivier, R Van Heerden Digital Investigation 24, 11-24, 2018 | 12 | 2018 |
Playing hide-and-seek: Detecting the manipulation of Android timestamps H Pieterse, MS Olivier, RP Van Heerden 2015 Information Security for South Africa (ISSA), 1-8, 2015 | 12 | 2015 |
Smartphones as distributed witnesses for digital forensics H Pieterse, M Olivier Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014 | 12 | 2014 |
Security steps for smartphone users H Pieterse, MS Olivier 2013 Information Security for South Africa, 1-6, 2013 | 10 | 2013 |
Rising above misinformation and deepfakes N Veerasamy, H Pieterse International Conference on Cyber Warfare and Security 17 (1), 340-348, 2022 | 9 | 2022 |
Detecting manipulated smartphone data on Android and iOS Devices H Pieterse, M Olivier, R Van Heerden Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019 | 9 | 2019 |
Evaluating the authenticity of smartphone evidence H Pieterse, M Olivier, R Van Heerden Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017 | 9 | 2017 |
Evaluation framework for detecting manipulated smartphone data H Pieterse, M Olivier, R van Heerden SAIEE Africa Research Journal 110 (2), 67-76, 2019 | 8 | 2019 |
Mapping the most significant computer hacking events to a temporal computer attack model R Van Heerden, H Pieterse, B Irwin ICT Critical Infrastructures and Society: 10th IFIP TC 9 International …, 2012 | 8 | 2012 |
Developing a virtualised testbed environment in preparation for testing of network based attacks R van Heerden, H Pieterse, I Burke, B Irwin 2013 International Conference on Adaptive Science and Technology, 1-8, 2013 | 6 | 2013 |
Evaluation and Identification of Authentic Smartphone Data H Pieterse University of Pretoria, 2019 | 4 | 2019 |
Evolution study of android botnets H Pieterse, I Burke Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015 | 4 | 2015 |
Mobile Forensics: Beyond Traditional Sources of Digital Evidence H Pieterse 19th European Conference on Cyber Warfare and Security, 295-303, 2020 | 3 | 2020 |