USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING (English)
Free access
- New search for: Fruhwirt, Peter
- New search for: Kieseberg, Peter
- New search for: Weippl, Edgar
- New search for: Fruhwirt, Peter
- New search for: Kieseberg, Peter
- New search for: Weippl, Edgar
In:
Advances in Digital Forensics XI
3
;
179-194
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING
-
Contributors:
-
Published in:Advances in Digital Forensics XI , 3 ; 179-194IFIP Advances in Information and Communication Technology ; 462, 3 ; 179-194
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2015-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICSCohen, Fred et al. | 2015
- 29
-
NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICSTewelde, Segen / Gruner, Stefan / Olivier, Martin et al. | 2015
- 45
-
USING YIN’S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONSOyelami, Oluwasayo / Olivier, Martin et al. | 2015
- 61
-
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONSYang, Min / Chow, Kam-Pui et al. | 2015
- 79
-
A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONSZhao, Chen / Guan, Yong et al. | 2015
- 97
-
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUMFan, Xiao-Xi / Chow, Kam-Pui / Xu, Fei et al. | 2015
- 115
-
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEMXu, Fei / Yau, Ken / Zhang, Ping / Chow, Kam-Pui et al. | 2015
- 129
-
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSISLiu, Changwei / Singhal, Anoop / Wijesekera, Duminda et al. | 2015
- 149
-
CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORYGlendowne, Dae / Miller, Cody / McGrew, Wesley / Dampier, David et al. | 2015
- 163
-
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASESHauger, Werner / Olivier, Martin et al. | 2015
- 179
-
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDINGFruhwirt, Peter / Kieseberg, Peter / Weippl, Edgar et al. | 2015
- 195
-
IDENTIFYING PASSWORDS STORED ON DISKHoushmand, Shiva / Aggarwal, Sudhir / Karabiyik, Umit et al. | 2015
- 215
-
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERSTang, Yanbin / Tan, Zheng / Chow, Kam-Pui / Yiu, Siu-Ming / Fang, Junbin / Niu, Xiamu / Han, Qi / Wu, Xianyan et al. | 2015
- 235
-
FORENSIC-READY SECURE iOS APPS FOR JAILBROKEN iPHONESGovindaraj, Jayaprakash / Mata, Rashmi / Verma, Robin / Gupta, Gaurav et al. | 2015
- 251
-
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEMAndriotis, Panagiotis / Tryfonas, Theo / Oikonomou, George / King, Irwin et al. | 2015
- 271
-
A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENTZawoad, Shams / Hasan, Ragib et al. | 2015
- 287
-
LOCATING AND TRACKING DIGITAL OBJECTS IN THE CLOUDTrenwith, Philip / Venter, Hein et al. | 2015
- 305
-
A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPSMurtuza, Shariq / Verma, Robin / Govindaraj, Jayaprakash / Gupta, Gaurav et al. | 2015
- 321
-
CRITERIA FOR VALIDATING SECURE WIPING TOOLSZareen, Muhammad Sharjeel / Aslam, Baber / Akhlaq, Monis et al. | 2015
- 341
-
DO DATA LOSS PREVENTION SYSTEMS REALLY WORK?Ghorbanian, Sara / Fryklund, Glenn / Axelsson, Stefan et al. | 2015