Author of the publication

Digital Forensics in Industrial Control Systems.

, , , and . SAFECOMP, volume 11698 of Lecture Notes in Computer Science, page 128-136. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On performance optimization potentials regarding data classification in forensics., , and . BTW Workshops, volume P-242 of LNI, page 21-36. GI, (2015)Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles., , , and . MM&Sec, page 33-40. ACM, (2011)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)An evaluation of biometric fingerprint matchers in a forensic context using latent impressions., , and . MM&Sec, page 133-138. ACM, (2012)Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection., , , , and . IH&MMSec, page 115-120. ACM, (2020)Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks., , , and . EURASIP J. Inf. Secur., 2021 (1): 9 (2021)AR.Drone: security threat analysis and exemplary attack to track persons., , , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 8301 of SPIE Proceedings, page 83010G. SPIE, (2012)AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions., , , , , , , , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing., , , , and . IH&MMSec, page 21-32. ACM, (2017)Feature space fusion and feature selection for an enhanced robustness of the fingerprint forgery detection for printed artificial sweat.. ICME Workshops, page 1-6. IEEE Computer Society, (2015)