Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

Database forensic investigation process models: A review

A Al-Dhaqm, S Abd Razak, SH Othman, A Ali… - IEEE …, 2020 - ieeexplore.ieee.org
Database Forensic Investigation (DBFI) involves the identification, collection, preservation,
reconstruction, analysis, and reporting of database incidents. However, it is a …

Ten years of critical review on database forensics research

R Chopade, VK Pachghare - Digital Investigation, 2019 - Elsevier
The database is at the heart of any digital application. With the increased use of high-tech
applications, the database is used to store important and sensitive information. Sensitive …

Face validation of database forensic investigation metamodel

A Al-Dhaqm, S Razak, RA Ikuesan, V R. Kebande… - Infrastructures, 2021 - mdpi.com
Using a face validity approach, this paper provides a validation of the Database Forensic
Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability …

Forensic recovery of SQL server database: Practical approach

H Choi, S Lee, D Jeong - IEEE Access, 2021 - ieeexplore.ieee.org
Database forensics is becoming more important for investigators with the increased use of
the information system. Although various database forensic methods such as log analysis …

[HTML][HTML] Database memory forensics: A machine learning approach to reverse-engineer query activity

MI Nissan, J Wagner, S Aktar - Forensic Science International: Digital …, 2023 - Elsevier
Memory analysis allows forensic investigators to establish a more complete timeline of
system activity using a snapshot of main memory (ie, RAM). Investigators may rely on such …

[HTML][HTML] Carving database storage to detect and trace security breaches

J Wagner, A Rasin, B Glavic, K Heart, J Furst… - Digital …, 2017 - Elsevier
Abstract Database Management Systems (DBMS) are routinely used to store and process
sensitive enterprise data. However, it is not possible to secure data by relying on the access …

A Forensic Framework for gathering and analyzing Database Systems using Blockchain Technology

AO Alzahrani, MA Al-Khasawneh, AA Alarood… - … , Technology & Applied …, 2024 - etasr.com
A blockchain is a distributed database that contains the records of transactions that are
shared among all members of a community. Most members must confirm each and every …

Db3f & df-toolkit: The database forensic file format and the database forensic toolkit

J Wagner, A Rasin, K Heart, R Jacob, J Grier - Digital Investigation, 2019 - Elsevier
The majority of sensitive and personal user data is stored in different Database Management
Systems (DBMS). For Example, Oracle is frequently used to store corporate data, MySQL …

Model derivation system to manage database forensic investigation domain knowledge

A Al-Dhaqm, S Razak… - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
Many specific database forensic investigation models have been proposed in the literature
to solve database incidents, but these models have various redundant investigation …