SBBD

Paper Registration

1

Select Book

2

Select Paper

3

Fill in paper information

4

Congratulations

Fill in your paper information

English Information

(*) To change the order drag the item to the new position.

Authors
# Name
1 Danilo Seufitelli(daniloboechat@dcc.ufmg.br)
2 Ana Flávia Moura(anaciriaco@dcc.ufmg.br)
3 Ayane Fernandes(ayanecristinamb@gmail.com)
4 Kayque Siqueira(kayque.siq@gmail.com)
5 Michele Brandão(michele.brandao@dcc.ufmg.br)
6 Mirella Moro(mirella@dcc.ufmg.br)

(*) To change the order drag the item to the new position.

Reference
# Reference
1 Al-Dhaqm, A. et al. (2020a). Categorization and organization of database forensic investigation processes. IEEE Access, 8:112846–112858
2 Al-Dhaqm, A. et al. (2020b). Database forensic investigation process models: A review. IEEE Access, 8:48477–48490.
3 Atwal, T. S. et al. (2019). Shining a light on spotlight: Leveraging apple’s desktop search utility to recover deleted file metadata on macos. Digital Investigation, 28:S105–S115.
4 Awasthi, A. et al. (2018). Welcome pwn: Almond smart home hub forensics. Digital Investigation, 26:S38–S46
5 Chen, P. S. (2008). Discovering Investigation Clues through Mining Criminal Databases, pages 173–198. Springer Berlin Heidelberg, Berlin, Heidelberg
6 Choi, H., Lee, S., and Jeong, D. (2021). Forensic recovery of SQL server database: Practical approach. IEEE Access, 9:14564–14575
7 Freiling, F. and H¨osch, L. (2018). Controlled experiments in digital evidence tampering. Digital Investigation, 24:S83–S92.
8 Henseler, H. and van Loenhout, S. (2018). Educating judges, prosecutors and lawyers in the use of digital forensic experts. Digital Investigation, 24:S76–S82.
9 Hommes, S. et al. (2013). Automated source code extension for debugging of openflow based networks. In CNSM, pages 105–108.
10 Khanji, S. I. R., Khattak, A. M., and Hacid, H. (2015). Database auditing and forensics: Exploration and evaluation. In AICCSA, pages 1–6
11 Khobragade, P. K. and Malik, L. G. (2014). Data generation and analysis for digital forensic application using data mining. In CSNT, pages 458–462.
12 Kitchenham, B. and Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01, Keele University and Durham University Joint Report
13 Li, Q., Hu, X., and Wu, H. (2014). Database management strategy and recovery methods of android. In ICSESS, pages 727–730
14 Liu, X., Fu, X., and Sun, G. (2016). Recovery of deleted record for SQLite3 database. In IHMSC, pages 183–187.
15 Ming, H. and LiZhong, S. (2009). A new system design of network invasion forensics. In ICCEE, pages 596–599.
16 Qi, M. (2014). Digital forensics and NoSQL databases. In FSKD, pages 734–739
17 Qi, M. et al. (2014). Big data management in digital forensics. In CSE, pages 238–243.
18 Salunkhe, P., Bharne, S., and Padiya, P. (2016). Data analysis of file forensic investigation. In SCOPES, pages 372–375.
19 Satrya, G. B., Daely, P. T., and Nugroho, M. A. (2016). Digital forensic analysis of telegram messenger on android devices. In ICTS, pages 1–7.
20 Servida, F. and Casey, E. (2019). Iot forensic challenges and opportunities for digital traces. Digital Investigation, 28:S22–S29.
21 Sikos, L. F. (2020). Packet analysis for network forensics: A comprehensive survey. FSI: Digital Investigation, 32:200892.
22 van Zandwijk, J. P. and Boztas, A. (2019). The iphone health app from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? Digital Investigation, 28:S126–S133.
23 Xie, X. et al. (2019). SQL injection detection for web applications based on elasticpooling cnn. IEEE Access, 7:151475–151481