[1] 中国互联网络信息中心.第37次中国互联网发展状况统计报告[R/OL].[2016-02-12]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201601/t20160122_53271.htm. (China Internet Network Information Center. The 37th statistical report on Internet development of China[R/OL].[2016-02-12]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201601/t20160122_53271.htm.). [2] 中国电子银行网.2015年第一季度网络犯罪数据研究报告[R/OL].[2016-04-29]. http://hy.cebnet.com.cn/20150504/101173514.html. (CEBNET. Cybercrime data report of the first quarter of 2015[R/OL].[2016-04-29]. http://hy.cebnet.com.cn/20150504/101173514.html.). [3] RAMISCH F, RIEGER M. Recovery of SQLite data using expired indexes[C]//IMF 2015:Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics. Piscataway, NJ:IEEE, 2015:19-25. [4] KANG W-H, LEE S-W, MOON B, et al. X-FTL:transactional FTL for SQLite databases[C]//SIGGMOD 2013:Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2013:97-108. [5] 孟贺.基于Android的即时通讯系统的设计与实现[D]. 济南:山东大学, 2014:17-23.(MENG H. The design and development of instant messaging system based on Android platform[D]. Jinan:Shandong University, 2014:17-23.). [6] HAND S, LIN Z, GU G, et al. Bin-Carver:automatic recovery of binary executable files[J]. Digital Investigation, 2012, 9(Supp.):S108-S117. [7] LEE S, SHON T. Improved deleted file recovery technique for Ext2/3 file system[J]. The Journal of Supercomputing, 2014, 70(1):20-30. [8] XU M, YAO J, REN Y, et al. A reconstructing Android user behavior approach based on YAFFS2 and SQLite[J]. Journal of Computers, 2014, 9(10):2294-2302. [9] WU B, XU M, ZHANG H, et al. A recovery approach for SQLite history recorders from YAFFS2[C]//ICT-EurAsia 2013:Proceedings of the 2013 International Conference on Information and Communication Technology, LNCS 7804. Berlin:Springer-Verlag, 2013:295-299. [10] SQLite. File format For SQLite databases[EB/OL].[2016-04-29]. http://www.sqlite.org/fileformat2.html. [11] PARK J, CHUNG H, LEE S. Forensic analysis techniques for fragmented flash memory pages in smartphones[J]. Digital Investigation, 2012, 9(2):109-118. [12] PEREIRA M T. Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records[J]. Digital Investigation, 2009, 5(3/4):93-103. [13] JEON S, BANG J, BYUN K, et al. A recovery method of deleted record for SQLite database[J]. Personal & Ubiquitous Computing, 2012, 16(6):707-715. [14] AL MUTAWA N, BAGGILI I, MARRINGTON A. Forensic analysis of social networking applications on mobile devices[J]. Digital Investigation, 2012, 9(Supp.):S24-S33. |