1 |
D. C. Lee and S. J. Lee, "Research of organized data extraction method for digital investigation in relational database system," Journal of the Korea Institute of Information Security and Cryptology, Vol.22, No.3, pp.565-573, 2012.
|
2 |
R. Harris, "Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem," Digital Investigation, Vol.3, pp.44-49, 2006.
DOI
|
3 |
Solid IT, DB-Engines Ranking [Internet], http://db-engines.com/en/ranking
|
4 |
Oracle, Benefits of Using InnoDB Tables [Internet], https://dev.mysql.com/doc/refman/5.7/en/innodb-benefits.html
|
5 |
H. K. Khanuja and D. S. Adane. "A framework for database forensic analysis," Computer Science & Engineering, Vol.2, No.3, p.27, 2012.
DOI
|
6 |
P. Fruhwirt, M. Huber, M. Mulazzani, and E. R. Weippl, "Innodb database forensics," Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on., IEEE, pp.1028-1036, 2010.
|
7 |
P. Fruhwirt, P. Kieseberg, S. Schrittwieser, M. Huber, and E. Weippl, "InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs," Information Security Technical Report, Vol.17, No.4, pp.227-238, 2013.
DOI
|
8 |
J. Wagner, A. Rasin, and J. Grier, "Database image content explorer: Carving data that does not officially exist," Digital Investigation, Vol.18, pp.S97-S107, 2016.
DOI
|
9 |
W. S. Noh, S. M. Jang, C. H. Kang, K. M. Lee, and S. J. Lee, "The Method of Deleted Record Recovery for MySQL MyISAM Database," Journal of the Korea Institute of Information Security & Cryptology, Vol.26, No.1, pp.125-134, 2016.
DOI
|
10 |
J. Jang, D. Jeoung, and S. J. Lee, "The Recovery Method for MySQL InnoDB Using Feature of IBD Structure," KIPS Transactions on Computer and Communication Systems, Vol.6, No.2, pp.59-66, 2017, DOI: 10.3745/KTCCS.2017.6.2.059.
DOI
|
11 |
Oracle, InnoDB Tablespaces [Internet], https://dev.mysql.com/doc/refman/5.7/en/innodb-tablespace.html
|