Digital Library
Search: "[ keyword: database ]" (29)
Study on SNS Application Data Decryption and Artifact
Sumin Shin,
Soojin Kang,
Giyoon Kim,
Jongsung Kim,
Vol. 30, No. 4, pp. 583-592,
Aug.
2020
10.13089/JKIISC.2020.30.4.583
Keywords: SNS, database, Digital Forensic Investigation, SQLCipher Module
10.13089/JKIISC.2020.30.4.583
Keywords: SNS, database, Digital Forensic Investigation, SQLCipher Module
Analysis of Encryption and Decryption Processes of Realm Database and Its Application
Byungchul Youn,
Myungseo Park,
Jongsung Kim,
Vol. 30, No. 3, pp. 369-378,
Jun.
2020
10.13089/JKIISC.2020.30.3.369
Keywords: Realm Database, Mobile Database, Digital Forensics
10.13089/JKIISC.2020.30.3.369
Keywords: Realm Database, Mobile Database, Digital Forensics
A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database
현석우,
권태경,
Vol. 29, No. 5, pp. 1167-1177,
Oct.
2019
10.13089/JKIISC.2019.29.5.1167
Keywords: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
10.13089/JKIISC.2019.29.5.1167
Keywords: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database
김기윤,
이종혁,
신수민,
김종성,
Vol. 29, No. 3, pp. 541-547,
May.
2019
10.13089/JKIISC.2019.29.3.541
Keywords: Instant messenger, SQLCipher, Decrypt, database, Instant messenger, SQLCipher, Decrypt, database
10.13089/JKIISC.2019.29.3.541
Keywords: Instant messenger, SQLCipher, Decrypt, database, Instant messenger, SQLCipher, Decrypt, database
A More Storage-Efficient Order-Revealing Encryption Scheme
김기성,
Vol. 29, No. 3, pp. 503-509,
May.
2019
10.13089/JKIISC.2019.29.3.503
Keywords: Order-Revealing Encryption, Database Encryption, Samrt Manufacturing Security, Cloud Security, Order-Revealing Encryption, Database Encryption, Samrt Manufacturing Security, Cloud Security
10.13089/JKIISC.2019.29.3.503
Keywords: Order-Revealing Encryption, Database Encryption, Samrt Manufacturing Security, Cloud Security, Order-Revealing Encryption, Database Encryption, Samrt Manufacturing Security, Cloud Security
Comparing Recoverability of Deleted Data According to Original Source Collection Methods on Microsoft SQL Server
신지호,
Vol. 28, No. 4, pp. 859-868,
Jul.
2018
10.13089/JKIISC.2018.28.4.859
Keywords: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
10.13089/JKIISC.2018.28.4.859
Keywords: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
Digital Evidence Collection Procedure for Hardware Unique Information Collection
박찬웅,
이상진,
Vol. 28, No. 4, pp. 839-845,
Jul.
2018
10.13089/JKIISC.2018.28.4.839
Keywords: Encryption, database, Hardware information, Digital Evidence, Encryption, database, Hardware information, Digital Evidence
10.13089/JKIISC.2018.28.4.839
Keywords: Encryption, database, Hardware information, Digital Evidence, Encryption, database, Hardware information, Digital Evidence
The Method of Recovery for Deleted Record of Realm Database
김준기,
한재혁,
최종현,
이상진,
Vol. 28, No. 3, pp. 625-633,
May.
2018
10.13089/JKIISC.2018.28.3.625
Keywords: Realm, Mobile Database, Recovery, Realm, Mobile Database, Recovery
10.13089/JKIISC.2018.28.3.625
Keywords: Realm, Mobile Database, Recovery, Realm, Mobile Database, Recovery
The Research on Data Concealing and Detection of SQLite Database
Jae-hyoung Lee,
Jaehyung Cho,
Kiwon Hong,
Jongsung Kim,
Vol. 27, No. 6, pp. 1347-1359,
Dec.
2017
10.13089/JKIISC.2017.27.6.1347
Keywords: database, Digital Forensics, SQLite, Concealing, Detection
10.13089/JKIISC.2017.27.6.1347
Keywords: database, Digital Forensics, SQLite, Concealing, Detection
Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server
Jiho Shin,
Vol. 27, No. 2, pp. 223-232,
Apr.
2017
10.13089/JKIISC.2017.27.2.223
Keywords: Microsoft SQL Server, database, Delete, Truncate, Drop, Recovery, Page
10.13089/JKIISC.2017.27.2.223
Keywords: Microsoft SQL Server, database, Delete, Truncate, Drop, Recovery, Page