Author:
Golhar Archana,Janvir Sakshi,Chopade Rupali,Pachghare V. K.
Reference22 articles.
1. Mario AM, Austin R, Huwida S (2010) Database forensics. ACM digital library
2. Yao SS, Christian C (2014) Tamper detection in audit logs Researchgate
3. Redis Tutorial.
www.tutorialspoint.com
4. Xu M, Xu X, Xu J, Ren Y, Zhang H, Ning Z (2014) A forensics analysis method for Redis database based on RDB and AOF File. J Comput 9(11) (November 2014)
5. http://cassandra.apache.org/
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献