Search

Your search keyword '"Dittmann, Jana"' showing total 182 results

Search Constraints

Start Over You searched for: Author "Dittmann, Jana" Remove constraint Author: "Dittmann, Jana" Publication Type eBooks Remove constraint Publication Type: eBooks
182 results on '"Dittmann, Jana"'

Search Results

1. A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper)

2. Digital Forensics in Industrial Control Systems

4. Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling

5. Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans

6. E-Learning of IT Security Threats: A Game Prototype for Children

7. Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling

8. Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions

9. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics

10. Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications

11. Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany

13. IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data

14. Program Comprehension in Preprocessor-Based Software

15. Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation

16. Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans

17. Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

18. Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR

19. Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis

29. Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature

30. Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks

31. Security-Relevant Challenges of Selected Systems for Multi-user Interaction

32. Statistical Detection of Malicious PE-Executables for Fast Offline Analysis

33. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

34. Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats

35. Microphone Classification Using Fourier Coefficients

36. Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face

37. Evaluation of Fusion for Similarity Searching in Online Handwritten Documents

40. Advanced Studies on Reproducibility of Biometric Hashes

41. Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures

42. Digital Signatures Based on Invertible Watermarks for Video Authentication

43. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification

44. Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk Assessment

45. Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity

46. Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing

48. Secure Production of Digital Media

Catalog

Books, media, physical & digital resources