1 |
NETMARKETSHARE, "Desktop Operating System Market Share," https://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10&qpcustomd=0
|
2 |
Olivier, Martin S, "On metadata context in database forensics," Digital Investigation, vol. 5, no. 3, pp. 115-123, Mar. 2009.
DOI
|
3 |
SangJun Jeon, Jewan Bang, KeunDuck Byun, GuenGi Lee, and SangJin Lee, "The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database," Journal of the Korea Institute of Information Security and Cryptology, 21(3), pp. 143-154, Jun. 2011.
|
4 |
Jong-Seong Yoon, Doo-Won Jung, Chul-hoon Kang, and Sang-Jin Lee, "Digital Forensic Investigation of MongoDB," Journal of the Korea Institute of Information Security and Cryptology, 24(1), pp. 123-134, Feb. 2014.
DOI
|
5 |
Lian, X. U., "Recovery of deleted records from Microsoft SQL Server log file," Forensic Science and Technology, vol. 31, no. 4, Apr. 2006.
|
6 |
Kim Yeong, "A Study on Forensic Accounting Techniques for Detection of Sign of Fraud Using Financial Statements," M.S. Thesis, Korea University, Aug. 2010.
|
7 |
Ki Min Seo, Jae Min Choi, and Sang Jin Lee, "Design to Forensic Accounting Tool for the Financial Audit," Korea Accounting Information Association, 27(2), pp. 119-144, June. 2009.
|
8 |
Carvey and Harlan, "The Windows Registry as a forensic resource," Digital Investigation, vol. 2, no. 3, pp. 201-205, Sep. 2005.
DOI
|
9 |
Singleton, Tommie W., et al. Fraud auditing and forensic accounting, 3rd Ed., John Wiley & Sons, 2006.
|