{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:45:20Z","timestamp":1775745920774,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319125671","type":"print"},{"value":"9783319125688","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_8","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T16:38:21Z","timestamp":1412872701000},"page":"101-116","source":"Crossref","is-referenced-by-count":4,"title":["Schema Reconstruction in Database Forensics"],"prefix":"10.1007","author":[{"given":"Oluwasola Mary","family":"Adedayo","sequence":"first","affiliation":[]},{"given":"Martin","family":"Olivier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-39891-9_14","volume-title":"Proceedings of the Fourth International Conference on Digital Forensics and Cyber Crime","author":"O. Adedayo","year":"2013","unstructured":"O. Adedayo and M. Olivier, On the completeness of reconstructed data for database forensics, Proceedings of the Fourth International Conference on Digital Forensics and Cyber Crime, pp. 220\u2013238, 2013."},{"key":"8_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-24212-0_7","volume-title":"Advances in Digital Forensics VII","author":"H. Beyers","year":"2011","unstructured":"H. Beyers, M. Olivier and G. Hancke, Assembling metadata for database forensics, in Advances in Digital Forensics VII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 89\u201399, 2011."},{"key":"8_CR3","volume-title":"The Relational Model for Database Management, Version 2","author":"E. Codd","year":"1990","unstructured":"E. Codd, The Relational Model for Database Management, Version 2, Addison-Wesley, Reading, Massachusetts, 1990."},{"key":"8_CR4","volume-title":"Fundamentals of Database Systems","author":"R. Elmasri","year":"2011","unstructured":"R. Elmasri and S. Navathe, Fundamentals of Database Systems, Addison-Wesley, Boston, Massachusetts, 2011."},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.diin.2012.09.002","volume":"9","author":"O. Fasan","year":"2012","unstructured":"O. Fasan and M. Olivier, Correctness proof for database reconstruction algorithm, Digital Investigation, vol. 9(2), pp. 138\u2013150, 2012.","journal-title":"Digital Investigation"},{"key":"8_CR6","first-page":"97","volume-title":"Proceedings of the Seventh International Workshop on Digital Forensics and Incident Analysis","author":"O. Fasan","year":"2012","unstructured":"O. Fasan and M. Olivier, On dimensions of reconstruction in database forensics, Proceedings of the Seventh International Workshop on Digital Forensics and Incident Analysis, pp. 97\u2013106, 2012."},{"key":"8_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-33962-2_19","volume-title":"Advances in Digital Forensics VIII","author":"O. Fasan","year":"2012","unstructured":"O. Fasan and M. Olivier, Reconstruction in database forensics, in Advances in Digital Forensics VIII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 273\u2013287, 2012."},{"key":"8_CR8","volume-title":"SQL Server Forensic Analysis","author":"K. Fowler","year":"2009","unstructured":"K. Fowler, SQL Server Forensic Analysis, Addison-Wesley, Boston, Massachusetts, 2009."},{"key":"8_CR9","first-page":"1028","volume-title":"Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications","author":"P. Fruhwirt","year":"2010","unstructured":"P.\u00a0Fruhwirt, M.\u00a0Huber, M.\u00a0Mulazzani and E. Weippl, InnoDB database forensics, Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications, pp. 1028\u20131036, 2010."},{"key":"8_CR10","first-page":"625","volume-title":"Proceedings of the Seventh International Conference on Availability, Reliability and Security","author":"P. Fruhwirt","year":"2012","unstructured":"P.\u00a0Fruhwirt, P.\u00a0Kieseberg, S.\u00a0Schrittwieser, M.\u00a0Huber and E.\u00a0Weippl, InnoDB database forensics: Reconstructing data manipulation queries from redo logs, Proceedings of the Seventh International Conference on Availability, Reliability and Security, pp. 625\u2013633, 2012."},{"issue":"S","key":"8_CR11","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"S. Garfinkel","year":"2010","unstructured":"S. Garfinkel, Digital forensics research: The next 10 years, Digital Investigation, vol. 7(S), pp. S64\u2013S73, 2010.","journal-title":"Digital Investigation"},{"key":"8_CR12","unstructured":"D. Litchfield, Oracle Forensics, Parts 1\u20136, NGSSoftware Insight Security Research Publication, Next Generation Security Software, Manchester, United Kingdom, 2007\u20132008."},{"key":"8_CR13","volume-title":"Introduction to Database Systems","author":"S. Nebiker","year":"2010","unstructured":"S. Nebiker and S. Bleisch, Introduction to Database Systems, Geographic Information Technology Training Alliance, Zurich, Switzerland, 2010."},{"issue":"3-4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.diin.2008.10.001","volume":"5","author":"M. Olivier","year":"2009","unstructured":"M. Olivier, On metadata context in database forensics, Digital Investigation, vol. 5(3-4), pp. 115\u2013123, 2009.","journal-title":"Digital Investigation"},{"key":"8_CR15","unstructured":"G. Palmer, A Road Map for Digital Forensic Research, Report from the First Digital Forensic Research Workshop, DFRWS Technical Report, DTR-T001-01 Final, Utica, New York, 2001."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:30:14Z","timestamp":1548030614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}