Cusack, Brian; Ayaw, Ar Kar - 2010
and used to replicate a SQL poisoning attack on a simulated Business System. A forensic investigation was then undertaken … the whole Business System is considered evidential. The scope of the inquiry includes the technical artefacts, the … investigations in RFID system architectures. …