Techniques for data hiding, IBM Systems Journal, vol.35, issue.3.4, pp.313-336, 1996. ,
DOI : 10.1147/sj.353.0313
InnoDB Database Forensics, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.1028-1036, 2010. ,
DOI : 10.1109/AINA.2010.152
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations, Digital Investigation, pp.336-348, 2014. ,
DOI : 10.1016/j.diin.2014.09.003
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs, 2012 Seventh International Conference on Availability, Reliability and Security, pp.625-633, 2012. ,
DOI : 10.1109/ARES.2012.50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.8132
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs, Information Security Technical Report, vol.17, issue.4, pp.227-238, 2013. ,
DOI : 10.1016/j.istr.2013.02.003
Secure deletion: Towards tailor-made privacy in database systems, Proceedings of the Fifteenth Conference on Database Systems for Business, Technology and Web, pp.99-113, 2013. ,
???trees for enhancing logging mechanisms of databases, International Journal of Web Information Systems, vol.9, issue.1, pp.53-68, 2013. ,
DOI : 10.1108/17440081311316389
Trees Cannot Lie: Using Data Structures for Forensics Purposes, 2011 European Intelligence and Security Informatics Conference, pp.282-285, 2011. ,
DOI : 10.1109/EISIC.2011.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.6220
Analysis of B-tree data structure and its usage in computer forensics, Proceedings of the Central European Conference on Information and Intelligent Systems, 2010. ,
Relational Database Index Design and the Optimizers, 2005. ,
DOI : 10.1002/0471721379
T-tree or B-tree: Main memory database index structure revisited, Proceedings of the Eleventh Australasian Database Conference, pp.65-73, 2000. ,
Securing history: Privacy and accountability in database systems, Proceedings of the Third Biennial Conference on Innovative Data Systems Research, pp.387-396, 2007. ,
Threats to privacy in the forensic analysis of database systems, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.91-102, 2007. ,
DOI : 10.1145/1247480.1247492
Data hiding techniques for database environments, in Advances in Digital Forensics VIII, pp.289-301, 2012. ,