Author of the publication

InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.

, , , , and . Sicherheit, volume P-228 of LNI, page 363-374. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI., , , and . CD-MAKE, volume 12844 of Lecture Notes in Computer Science, page 1-20. Springer, (2021)Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI., , , and . CD-MAKE, volume 11015 of Lecture Notes in Computer Science, page 1-8. Springer, (2018)Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations., , , , , , , , , and . CD-MAKE, volume 13480 of Lecture Notes in Computer Science, page 362-375. Springer, (2022)Protecting Anonymity in Data-Driven Biomedical Science., , , , and . Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, volume 8401 of Lecture Notes in Computer Science, Springer, (2014)Real-Time Forensics Through Endpoint Visibility., , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2017)Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach., , , , , , and . BIRS-IMLKE, volume 10344 of Lecture Notes in Computer Science, page 13-50. Springer, (2015)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 79-90. Springer, (2014)Penetration Testing Artificial Intelligence., , , and . ERCIM News, (2020)InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs., , , , and . Inf. Secur. Tech. Rep., 17 (4): 227-238 (2013)