M. Afanasyev, T. Kohno, J. Ma, N. Murphy, S. Savage et al., Privacy-preserving network forensics, Communications of the ACM, vol.54, issue.5, pp.78-87, 2011.
DOI : 10.1145/1941487.1941508

S. Ceri, R. Cochrane, and J. Widom, Practical applications of triggers and constraints: Success and lingering issues, Proceedings of the Twenty-Sixth International Conference on Very Large Data Bases, pp.254-262, 2000.

Y. Chan, N. Ivanov, and O. Mueller, Oracle to DB2 Conversion Guide: Compatibility Made Easy, IBM Redbooks

F. Cohen, Digital Forensic Evidence Examination, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01060607

W. Hauger and M. Olivier, The role of triggers in database forensics, 2014 Information Security for South Africa, 2014.
DOI : 10.1109/ISSA.2014.6950506

A. Jones, R. Stephens, R. Plew, R. Garrett, and A. Kriegel, SQL Functions Programmer's Reference, 2005.

H. Khanuja and D. Adane, A Framework for Database Forensic Analysis, Computer Science & Engineering: An International Journal, vol.2, issue.3, pp.27-41, 2012.
DOI : 10.5121/cseij.2012.2303

D. Litchfield, The Oracle Hacker's Handbook: Hacking and Defending Oracle, 2007.

M. Olivier, On metadata context in Database Forensics, Digital Investigation, pp.115-123, 2009.
DOI : 10.1016/j.diin.2008.10.001

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.566.7390

E. Simon and A. Kotz-dittrich, Promises and realities of active database systems, Proceedings of the Twenty-First International Conference on Very Large Data Bases, pp.642-653, 1995.