@inproceedings{Pieterse_2015,doi = {10.1109/issa.2015.7335065},url = {http://dx.doi.org/10.1109/issa.2015.7335065},year = 2015,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Heloise Pieterse and Martin S. Olivier and Renier P. van Heerden},title = {Playing hide-and-seek: Detecting the manipulation of Android Timestamps},booktitle = {2015 Information Security for South Africa ({ISSA})}}
@inproceedings{Hauger_2015,doi = {10.1109/issa.2015.7335071},url = {http://dx.doi.org/10.1109/issa.2015.7335071},year = 2015,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Werner K. Hauger and Martin S. Olivier},title = {The state of database forensic research},booktitle = {2015 Information Security for South Africa ({ISSA})}}
@inproceedings{Olivier_2015,doi = {10.1109/issa.2015.7335077},url = {http://dx.doi.org/10.1109/issa.2015.7335077},year = 2015,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Martin S Olivier},title = {Towards a digital forensic science},booktitle = {2015 Information Security for South Africa ({ISSA})}}
2015
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES