1 |
Al-Dhaqm, A. et al. (2020a). Categorization and organization of database forensic investigation processes. IEEE Access, 8:112846–112858
|
|
2 |
Al-Dhaqm, A. et al. (2020b). Database forensic investigation process models: A review. IEEE Access, 8:48477–48490.
|
|
3 |
Atwal, T. S. et al. (2019). Shining a light on spotlight: Leveraging apple’s desktop search utility to recover deleted file metadata on macos. Digital Investigation, 28:S105–S115.
|
|
4 |
Awasthi, A. et al. (2018). Welcome pwn: Almond smart home hub forensics. Digital Investigation, 26:S38–S46
|
|
5 |
Chen, P. S. (2008). Discovering Investigation Clues through Mining Criminal Databases, pages 173–198. Springer Berlin Heidelberg, Berlin, Heidelberg
|
|
6 |
Choi, H., Lee, S., and Jeong, D. (2021). Forensic recovery of SQL server database: Practical approach. IEEE Access, 9:14564–14575
|
|
7 |
Freiling, F. and H¨osch, L. (2018). Controlled experiments in digital evidence tampering. Digital Investigation, 24:S83–S92.
|
|
8 |
Henseler, H. and van Loenhout, S. (2018). Educating judges, prosecutors and lawyers in the use of digital forensic experts. Digital Investigation, 24:S76–S82.
|
|
9 |
Hommes, S. et al. (2013). Automated source code extension for debugging of openflow based networks. In CNSM, pages 105–108.
|
|
10 |
Khanji, S. I. R., Khattak, A. M., and Hacid, H. (2015). Database auditing and forensics: Exploration and evaluation. In AICCSA, pages 1–6
|
|
11 |
Khobragade, P. K. and Malik, L. G. (2014). Data generation and analysis for digital forensic application using data mining. In CSNT, pages 458–462.
|
|
12 |
Kitchenham, B. and Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01, Keele University and Durham University Joint Report
|
|
13 |
Li, Q., Hu, X., and Wu, H. (2014). Database management strategy and recovery methods of android. In ICSESS, pages 727–730
|
|
14 |
Liu, X., Fu, X., and Sun, G. (2016). Recovery of deleted record for SQLite3 database. In IHMSC, pages 183–187.
|
|
15 |
Ming, H. and LiZhong, S. (2009). A new system design of network invasion forensics. In ICCEE, pages 596–599.
|
|
16 |
Qi, M. (2014). Digital forensics and NoSQL databases. In FSKD, pages 734–739
|
|
17 |
Qi, M. et al. (2014). Big data management in digital forensics. In CSE, pages 238–243.
|
|
18 |
Salunkhe, P., Bharne, S., and Padiya, P. (2016). Data analysis of file forensic investigation. In SCOPES, pages 372–375.
|
|
19 |
Satrya, G. B., Daely, P. T., and Nugroho, M. A. (2016). Digital forensic analysis of telegram messenger on android devices. In ICTS, pages 1–7.
|
|
20 |
Servida, F. and Casey, E. (2019). Iot forensic challenges and opportunities for digital traces. Digital Investigation, 28:S22–S29.
|
|
21 |
Sikos, L. F. (2020). Packet analysis for network forensics: A comprehensive survey. FSI: Digital Investigation, 32:200892.
|
|
22 |
van Zandwijk, J. P. and Boztas, A. (2019). The iphone health app from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? Digital Investigation, 28:S126–S133.
|
|
23 |
Xie, X. et al. (2019). SQL injection detection for web applications based on elasticpooling cnn. IEEE Access, 7:151475–151481
|
|