2019 IST-Africa Week Conference (IST-Africa) 2019
DOI: 10.23919/istafrica.2019.8764819
|View full text |Cite
|
Sign up to set email alerts
|

Scenario-Based Digital Forensic Investigation of Compromised MySQL Database

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Recentely, several research articles have proposed different aspects of database forensic field. For example, [48] offered the methods that can be utilized to perform forensic investigations of a compromised MySQL database. [49] introduced a review paper of the database forensic field and discussed the field limitations and drawbacks.…”
Section: Reconstruction (Perspective Iii)mentioning
confidence: 99%
“…Recentely, several research articles have proposed different aspects of database forensic field. For example, [48] offered the methods that can be utilized to perform forensic investigations of a compromised MySQL database. [49] introduced a review paper of the database forensic field and discussed the field limitations and drawbacks.…”
Section: Reconstruction (Perspective Iii)mentioning
confidence: 99%
“…Essentially, both stages are used in digital forensics, and the ISO/IEC 27043:2015 standard serves as the primary context for studies on proactive forensic approaches [5][6][7][8][9][10][11][12][13][14]. Drone forensics (DRF) aims to provide the tools and techniques necessary to identify and investigate potential drone-related incidents [15][16][17]. The primary focus of DRF is to identify the drone's owner, the activities that occurred during a dronerelated incident, the nature of the data stored on the drone, and any evidence the drone may have left behind.…”
Section: Introductionmentioning
confidence: 99%