Author of the publication

InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.

, , , , and . Inf. Secur. Tech. Rep., 17 (4): 227-238 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 79-90. Springer, (2014)InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs., , , , and . ARES, page 625-633. IEEE Computer Society, (2012)Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations., , , and . Digit. Investig., 11 (4): 336-348 (2014)QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes., , , , , and . ARES, page 230-237. IEEE Computer Society, (2015)Security tests for mobile applications - Why using TLS/SSL is not enough., , , and . ICST Workshops, page 1-2. IEEE Computer Society, (2015)The role and security of firewalls in cyber-physical cloud computing., , , and . EURASIP J. Information Security, (2016)The Role and Security of Firewalls in IaaS Cloud Computing., , , and . ARES, page 70-79. IEEE Computer Society, (2015)Genie in a Model? Why Model Driven Security will not secure your Web Application., , , , , and . JoWUA, 5 (3): 44-62 (2014)Security Testing for Mobile Applications., , and . ERCIM News, (2017)