Privacy-preserving network forensics, Communications of the ACM, vol.54, issue.5, pp.78-87, 2011. ,
DOI : 10.1145/1941487.1941508
Practical applications of triggers and constraints: Success and lingering issues, Proceedings of the Twenty-Sixth International Conference on Very Large Data Bases, pp.254-262, 2000. ,
Oracle to DB2 Conversion Guide: Compatibility Made Easy, IBM Redbooks ,
Digital Forensic Evidence Examination, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01060607
The role of triggers in database forensics, 2014 Information Security for South Africa, 2014. ,
DOI : 10.1109/ISSA.2014.6950506
SQL Functions Programmer's Reference, 2005. ,
A Framework for Database Forensic Analysis, Computer Science & Engineering: An International Journal, vol.2, issue.3, pp.27-41, 2012. ,
DOI : 10.5121/cseij.2012.2303
The Oracle Hacker's Handbook: Hacking and Defending Oracle, 2007. ,
On metadata context in Database Forensics, Digital Investigation, pp.115-123, 2009. ,
DOI : 10.1016/j.diin.2008.10.001
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.566.7390
Promises and realities of active database systems, Proceedings of the Twenty-First International Conference on Very Large Data Bases, pp.642-653, 1995. ,