Author of the publication

ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties.

, , , and . IH&MMSec, page 91-96. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties., , , and . IH&MMSec, page 91-96. ACM, (2015)Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles., , , and . MM&Sec, page 33-40. ACM, (2011)Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache., , , and . Sicherheit, volume P-128 of LNI, page 315-327. GI, (2008)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)Digital Forensics in Industrial Control Systems., , , and . SAFECOMP, volume 11698 of Lecture Notes in Computer Science, page 128-136. Springer, (2019)Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor., , , , , and . DSP, page 1-6. IEEE, (2011)Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump., , , and . GI Jahrestagung, volume P-154 of LNI, page 1619-1633. GI, (2009)Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective., , , , , , , , and . ARES, page 135:1-135:12. ACM, (2022)Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics., , and . IH&MMSec, page 107-112. ACM, (2022)A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis., , , and . ARES, page 61:1-61:8. ACM, (2021)