182 results on '"Dittmann, Jana"'
Search Results
2. Digital Forensics in Industrial Control Systems
3. Capture and Analysis of Latent Marks
4. Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling
5. Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans
6. E-Learning of IT Security Threats: A Game Prototype for Children
7. Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling
8. Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions
9. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics
10. Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications
11. Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany
12. Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain
13. IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data
14. Program Comprehension in Preprocessor-Based Software
15. Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation
16. Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans
17. Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries
18. Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR
19. Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis
20. Nicht-wahrnehmbare fragile Wasserzeichen zur Integritätsprüfung
21. Offene Probleme und Herausforderungen
22. Anwendungen
23. Nicht-wahrnehmbare robuste Wasserzeichen zur Urheberidentifizierung
24. Digitale Wasserzeichen
25. Digitale Fingerabdrücke zur Kundenidentifizierung
26. Allgemeine Sicherheitsanforderungen in Multimedia-Applikationen
27. Anhang
28. Motivation und Einführung
29. Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature
30. Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks
31. Security-Relevant Challenges of Selected Systems for Multi-user Interaction
32. Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
33. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
34. Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats
35. Microphone Classification Using Fourier Coefficients
36. Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face
37. Evaluation of Fusion for Similarity Searching in Online Handwritten Documents
38. Digital Watermarking
39. Biometrics for User Authentication
40. Advanced Studies on Reproducibility of Biometric Hashes
41. Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
42. Digital Signatures Based on Invertible Watermarks for Video Authentication
43. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification
44. Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk Assessment
45. Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity
46. Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing
47. Ensuring Media Integrity on Third-Party Infrastructures
48. Secure Production of Digital Media
49. Virtual Communities: Trust, Identity, Participation, and Technology
50. Zusammenfassung und Ausblick
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.