Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Oluwasola Mary Adedayo"'
Publikováno v:
IEEE Access, Vol 11, Pp 142392-142410 (2023)
The acquisition and analysis of data in digital forensics raise different data privacy challenges. Many existing works on digital forensic readiness discuss what information should be stored and how to collect relevant data to facilitate investigatio
Externí odkaz:
https://doaj.org/article/f945fd3b098c4d7b8f89b9214eb1d202
Publikováno v:
Digital Investigation. 12:27-40
The ability to reconstruct the data stored in a database at an earlier time is an important aspect of database forensics. Past research shows that the log file in a database can be useful for reconstruction. However, in many database systems there ar
Autor:
Oluwasola Mary Adedayo
Publikováno v:
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF).
One of the main challenges in digital forensics is the increasing volume of data that needs to be analyzed. This problem has become even more pronounced with the emergence of big data and calls for a rethink on the way digital forensics investigation
Publikováno v:
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications ISBN: 9783319125671
IFIP Int. Conf. Digital Forensics
IFIP Advances in Information and Communication Technology
Scopus-Elsevier
IFIP Int. Conf. Digital Forensics
IFIP Advances in Information and Communication Technology
Scopus-Elsevier
Part 2: Forensic Techniques; International audience; Although considerable research has been conducted in the area of data- base forensics over the past few years, several aspects of database forensics remain to be considered. One of the challenges f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::80c0211d74378868d1826253c3b402c7
https://doi.org/10.1007/978-3-662-44952-3_8
https://doi.org/10.1007/978-3-662-44952-3_8
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642398902
ICDF2C
ICDF2C
Databases are often used to store critical and sensitive information in various organizations and this has led to an increase in the rate at which databases are exploited in computer crimes. Even though various investigations involving databases have
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0e0c6ba9f0635fd7e53d43d70aca82c3
https://doi.org/10.1007/978-3-642-39891-9_14
https://doi.org/10.1007/978-3-642-39891-9_14