{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:27:13Z","timestamp":1770748033945,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662449653","type":"print"},{"value":"9783662449660","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_19","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T11:41:36Z","timestamp":1409139696000},"page":"201-210","source":"Crossref","is-referenced-by-count":16,"title":["Forensic Analysis for Monitoring Database Transactions"],"prefix":"10.1007","author":[{"given":"Harmeet Kaur","family":"Khanuja","sequence":"first","affiliation":[]},{"given":"Dattatraya S.","family":"Adane","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"E. Bertino","year":"2005","unstructured":"Bertino, E., Sandhu, R.: Database Security \u2212 Concepts, Approaches, and challenges. IEEE Transactions on Dependable and Secure Computing\u00a02(1), 2\u201319 (2005)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"19_CR2","unstructured":"Richardson, R.: CSI\/FBI Computer Crime and Security Survey (2011), http:\/\/www.gocsi.com"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Raghavan, S.: Digital forensic research: current state of the art. In: CSI Publications. Springer (2012)","DOI":"10.1007\/s40012-012-0008-7"},{"key":"19_CR4","unstructured":"Jun, T.: On Developing Intelligent Surveillant System of Suspicious Financial Transaction. IEEE (2010)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Pavlou, K.E., Snodgrass, R.T.: Forensic analysis of database tampering, ACM Transactions on Database Systems (TODS) 33(4), Article 30, 47+25 pages (2008)","DOI":"10.1145\/1412331.1412342"},{"key":"19_CR6","unstructured":"Godbole, N., Belapure, S.: Cyber Security, Understanding Computer Forensics and Legal Perspectives. Wiley-India (2011) ISBN: 978-81-265-2179-1"},{"key":"19_CR7","unstructured":"Pavlou, K.E.: Database Forensics in the Service of Information Accountability\/ SIGMOD\/PODS PhD Poster Session, Poster Presented (2011)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Pavlou, K.E., Snodgrass, R.T.: Dragoon: An Information Accountability System for High-Performance Databases. In: Demonstration. International Conference on Data Engineering, ICDE (2012)","DOI":"10.1109\/ICDE.2012.139"},{"issue":"3-4","key":"19_CR9","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.diin.2008.10.001","volume":"5","author":"M.S. Olivier","year":"2009","unstructured":"Olivier, M.S.: On metadata context in Database Forensics. Digital Investigation\u00a05(3-4), 115\u2013123 (2009), www.sciencedirect.com","journal-title":"Digital Investigation"},{"key":"19_CR10","unstructured":"RBI Rules, http:\/\/rbidocs.rbi.org.in\/rdocs\/content\/Pdfs\/68787.pdf"},{"key":"19_CR11","unstructured":"RBI Rules, http:\/\/rbidocs.rbi.org.in\/rdocs\/notification\/PDFs\/PM2212A_II.pdf"},{"key":"19_CR12","unstructured":"Sarbanes-Oxley (SOX) Compliance Checklist SOX-Compliance (2011), https:\/\/correlog.com\/support-public\/SOX-Compliance.pdf"},{"key":"19_CR13","unstructured":"Anti Money Laundering Rules, http:\/\/www.dor.gov.in\/sites\/upload_files\/revenue\/files\/PML%20%28Amendment%29%20Act,%202012.pdf"},{"key":"19_CR14","unstructured":"Bhaskaran, R.: CEO, Indian Institute of Banking and Finance. Anti Money Laundering & Know Your Customer (KYC). Macmillan Publisher India (2012) ISBN 13: 978-0230-33196-9"},{"key":"19_CR15","unstructured":"Shafer, G.: Dempster\u2013Shafer theory (2002)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Sentz, K., Ferson, S.: Combination of Evidence in Dempster\u2013Shafer Theory. Sandia National Laboratories (2002)","DOI":"10.2172\/800792"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. The Annals of Mathematical Statistics\u00a038(2), 325\u2013339 (1967), doi:10.1214\/aoms\/1177698950","DOI":"10.1214\/aoms\/1177698950"},{"key":"19_CR18","unstructured":"Khanuja, H.K., Adane, D.S.: Database Security Threats and challenges in Database Forensic: A survey. In: Proceedings of 2011 International Conference on Advancements in Information Technology, AIT 2011 (2011), http:\/\/www.ipcsit.com\/vol20\/33-ICAIT2011-A4072.pdf"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Khanuja, H.K., Adane, D.S.: A Framework For Database Forensic Analysis. Published in Computer Science & Engineering: An International Journal (CSEIJ)\u00a02(3) (2012)","DOI":"10.5121\/cseij.2012.2303"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Khanuja, H.K., Adane, D.S.: Forensic Analysis of Databases by Combining Multiple Evidences. International Journal of Computers & Technology. Council for Innovative Research\u00a07(3) (2013)","DOI":"10.24297\/ijct.v7i3.3446"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Panigrahi, S., Sural, S., Majumdar, A.K.: Detection of Intrusive Activity in Databases by Combining Multiple Evidences and Belief Update. In: IEEE Symposium on Computational Intelligence in Cyber Security (2009)","DOI":"10.1109\/CICYBS.2009.4925094"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Wang, X., Dong, G.: Research on Money Laundering Detection Based on Improved Minimum Spanning Tree Clustering and Its Application. In: Proceedings of the 2009 Second International Symposium on Knowledge Acquisition and Modeling, vol.\u00a002, pp. 62\u201364. IEEE Computer Society (2009)","DOI":"10.1109\/KAM.2009.221"},{"key":"19_CR23","unstructured":"Lv, L.-T., Ji, N., Zhang, J.-L.: A RBF neural network model for anti-money laundering. In: International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR 2008. IEEE (2008)"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Wang, S.-N., Yang, J.-G.: A Money Laundering Risk Evaluation Method Based on Decision Tree. In: International Conference on Machine Learning and Cybernetics. IEEE (2007)","DOI":"10.1109\/ICMLC.2007.4370155"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Tang, J., Yin, J.: Developing an intelligent data discriminating system of anti-money laundering based on SVM. In: International Conference on Machine Learning and Cybernetics, Guangzhou, China, vol.\u00a06, pp. 3453\u20133457. IEEE (2005)","DOI":"10.1109\/ICMLC.2005.1527539"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Srivastava, R.P.: The Dempster-Shafer Theory of Belief Functions for Managing Uncertainties: An Introduction and Fraud Risk Assessment Illustration. Australian Accounting Review\u00a021(3), 282\u2013291","DOI":"10.1111\/j.1835-2561.2011.00135.x"},{"key":"19_CR27","series-title":"STUDFUZZ","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-7908-1798-0_6","volume-title":"Belief Functions in Business Decisions","author":"K. Harrison","year":"2002","unstructured":"Harrison, K., Srivastava, R.P., Plumlee, R.D.: \u2018Auditors\u2019 Evaluations of Uncertain Audit Evidence: Belief Functions versus Probabilities. In: Srivastava, R.P., Mock, T. (eds.) Belief Functions in Business Decisions. STUDFUZZ, vol.\u00a088, pp. 161\u2013183. Physica-Verlag, Springer-Verlag Company, Heidelberg (2002)"},{"key":"19_CR28","unstructured":"Financial Intelligence Unit- India (FIU-IND), http:\/\/fiuindia.gov.in\/"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:50:52Z","timestamp":1746355852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}