"Digital Evidence for Database Tamper Detection"
written by Shweta Tripathi, Bandu Baburao Meshram,
published by Journal of Information Security, Vol.3 No.2, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Database Forensic Investigation Process Models: A Review
2020
[2] Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field
2020
[3] Categorization and organization of database forensic investigation processes
2020
[4] Ten years of critical review on database forensics research
2019
[5] A Virtual Environment Forensic Tool
International Journal of Cyber-Security and Digital Forensics, 2018
[6] Netzwerkforensik in virtuellen Umgebungen
2017
[7] CDBFIP: Common Database Forensic Investigation Processes for Internet of Things
2017
[8] Development and validation of a Database Forensic Metamodel (DBFM)
PLOS ONE, 2017
[9] Design of Tool for Digital Forensics in Virtual Environment
International Journal of Computer Applications Foundation of Computer Science, 2017
[10] Conceptual Investigation Process Model for Managing Database Forensic Investigation Knowledge
2016
[11] Digital Forensic a Novel Way to Investigate E-Crime
International Journal of New Innovations in Engineering and Technology, 2016
[12] A Generic DATABASE FORENSIC INVESTIGATION PROCESS MODEL
2016
[13] Research Article Conceptual Investigation Process Model for Managing Database Forensic Investigation Knowledge
2016
[14] Common Investigation Process Model for Database Forensic Investiga-tion Discipline
1st ICRIL-International Conference on Innovation in Science and Technology, 2015
[15] Database Tamper Detection and Analysis.
International Journal of Computer Applications, 2014
[16] Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics
Journal of ICT Research and Applications, 2014
[17] Towards adapting metamodelling technique for database forensics investigation domain
Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, 2014
[18] Database Tamper Detection and Analysis
International Journal of Computer Applications, 2014