Heloise Pieterse

According to our database1, Heloise Pieterse authored at least 12 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Evaluation of smartphone data using a reference architecture.
Int. J. Electron. Secur. Digit. Forensics, 2019

Classifying the Authenticity of Evaluated Smartphone Data.
Proceedings of the Advances in Digital Forensics XV, 2019

2018
Smartphone data evaluation model: Identifying authentic smartphone data.
Digit. Investig., 2018

Detecting Manipulated Smartphone Data on Android and iOS Devices.
Proceedings of the Information Security - 17th International Conference, 2018

2017
Evaluating the Authenticity of Smartphone Evidence.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

2015
Playing hide-and-seek: Detecting the manipulation of Android Timestamps.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
Bluetooth Command and Control channel.
Comput. Secur., 2014

Smartphones as Distributed Witnesses for Digital Forensics.
Proceedings of the Advances in Digital Forensics X, 2014

2013
Security steps for smartphone users.
Proceedings of the 2013 Information Security for South Africa, 2013

2012
Android botnets on the rise: Trends and characteristics.
Proceedings of the 2012 Information Security for South Africa, 2012

Data Hiding Techniques for Database Environments.
Proceedings of the Advances in Digital Forensics VIII, 2012

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model.
Proceedings of the ICT Critical Infrastructures and Society, 2012


  Loading...