. Accessdata, Mobile Phone Examiner Plus (MPE+), Lindon, Utah (www.accessdata.com/products/digital-forensics/mobi le-phone-examiner)

A. Arnes, P. Haas, G. Vigna, and R. Kemmerer, Digital forensic reconstruction and the virtual security testbed ViSe, Proceedings of the Third International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, pp.144-163, 2006.

A. Caithness, The Forensic Implications of SQLite's Write Ahead Log, CCL Group, Stratford-upon-Avon, United Kingdom (www. cclgroupltd.com/the-forensic-implications-of-sqlites-wr ite-ahead-log), 2012.

E. Casey, COMPUTER CRIME AND DIGITAL EVIDENCE, 2011.
DOI : 10.1016/B0-12-369399-3/00062-8

F. Cohen, Digital Forensic Evidence Examination, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01060607

K. Curran, A. Robinson, S. Peacocke, and S. Cassidy, Mobile Phone Forensic Analysis, International Journal of Digital Crime and Forensics, vol.2, issue.3, pp.15-27, 2010.
DOI : 10.4018/jdcf.2010070102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.3236

M. Eltabakh, Data Integration, CS561-Spring 2012, p.2012

A. Gal, A. Trombetta, A. Anaby-tavor, and D. Montesi, A model for schema integration in heterogeneous databases, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings., pp.2-11, 2003.
DOI : 10.1109/IDEAS.2003.1214906

P. Gladyshev, Formalizing Event Reconstruction in Digital Investigations, Ph.D. Dissertation, 2004.

P. Gladyshev and A. Patel, Finite state machine approach to digital event reconstruction, Digital Investigation, pp.130-149, 2004.

S. Jeon, J. Bang, K. Byun, and S. Lee, A recovery method of deleted record for SQLite database, Personal and Ubiquitous Computing, pp.707-715, 2012.

J. Morris, Crime Analysis Charting: An Introduction to Visual Investigative Analysis, 1982.

M. Ozsu and P. Valduriez, Principles of Distributed Database Systems, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00483354

C. Parent and S. Spaccapietra, Issues and approaches of database integration, Communications of the ACM, vol.41, issue.5es, pp.166-178, 1998.
DOI : 10.1145/276404.276408

P. Patodi, Database Recovery Mechanism for Android Devices, 2012.

M. Prasad and Y. Satish, Reconstruction of events in digital forensics, International Journal of Engineering Trends and Technology, vol.4, issue.8, pp.3460-3467, 2013.

B. Schneier, Attack trees, Dr. Dobb's, Journal of Software Tools, vol.24, issue.12, pp.21-29, 1999.

. Sqlite, The SQLite Database File Format

P. Stephenson, Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol.2, issue.2, 2003.

W. The, Messages (theiphonewiki.com, 2013.