Sciweavers

33 search results - page 1 / 7
» Forensic analysis of database tampering
Sort
View
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
14 years 11 months ago
Forensic analysis of database tampering
Kyriacos E. Pavlou, Richard T. Snodgrass
TKDE
2010
159views more  TKDE 2010»
13 years 9 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
ICASSP
2010
IEEE
13 years 11 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...
SADFE
2008
IEEE
14 years 5 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
AINA
2010
IEEE
14 years 4 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...