Heloise Pieterse
Title
Cited by
Cited by
Year
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
1002012
Design of a hybrid command and control mobile botnet
H Pieterse, M Olivier
Journal of Information Warfare 12 (1), 70-82, 2013
232013
Bluetooth command and control channel
H Pieterse, MS Olivier
Computers & security 45, 75-83, 2014
182014
Data hiding techniques for database environments
H Pieterse, M Olivier
IFIP International Conference on Digital Forensics, 289-301, 2012
182012
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
122016
Smartphones as distributed witnesses for digital forensics
H Pieterse, M Olivier
IFIP International Conference on Digital Forensics, 237-251, 2014
112014
Security steps for smartphone users
H Pieterse, MS Olivier
2013 Information Security for South Africa, 1-6, 2013
102013
Playing hide-and-seek: Detecting the manipulation of android timestamps
H Pieterse, MS Olivier, RP Van Heerden
2015 Information Security for South Africa (ISSA), 1-8, 2015
92015
Mapping the most significant computer hacking events to a temporal computer attack model
R van Heerden, H Pieterse, B Irwin
IFIP International Conference on Human Choice and Computers, 226-236, 2012
72012
Developing a virtualised testbed environment in preparation for testing of network based attacks
R van Heerden, H Pieterse, I Burke, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-8, 2013
62013
Evaluating the authenticity of smartphone evidence
H Pieterse, M Olivier, R van Heerden
IFIP International Conference on Digital Forensics, 41-61, 2017
52017
Smartphone data evaluation model: Identifying authentic smartphone data
H Pieterse, M Olivier, R Van Heerden
Digital Investigation 24, 11-24, 2018
42018
Fake News and Deepfakes: A Dangerous Threat for 21st Century Information Security
J Botha, H Pieterse
International Conference on Cyber Warfare and Security, 57-XII, 2020
32020
Evaluation and Identification of Authentic Smartphone Data
H Pieterse
University of Pretoria, 2019
32019
Detecting manipulated smartphone data on Android and iOS devices
H Pieterse, M Olivier, R Van Heerden
International Information Security Conference, 89-103, 2018
32018
Evolution study of android botnets
H Pieterse, I Burke
Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015
32015
Evaluation framework for detecting manipulated smartphone data
H Pieterse, M Olivier, R van Heerden
SAIEE Africa Research Journal 110 (2), 67-76, 2019
22019
How to tame your android malware
I Burke, H Pieterse
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
12015
Lost Packet Warehousing Service
I Burke, M Motlhabi, R Netshiya, H Pieterse
Proceedings of the 16th International Conference on Cyber Warfare and …, 2021
2021
Mobile Forensics: Beyond Traditional Sources of Digital Evidence
H Pieterse
19th European Conference on Cyber Warfare and Security, 295-303, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20