Search

Your search keyword '"Dittmann, Jana"' showing total 713 results

Search Constraints

Start Over You searched for: Author "Dittmann, Jana" Remove constraint Author: "Dittmann, Jana"
713 results on '"Dittmann, Jana"'

Search Results

1. A Revised Taxonomy of Steganography Embedding Patterns

3. A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper)

10. Digital Forensics in Industrial Control Systems

15. Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling

16. Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans

17. E-Learning of IT Security Threats: A Game Prototype for Children

20. Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling

21. Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions

23. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics

24. Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications

25. Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany

27. IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data

28. Program Comprehension in Preprocessor-Based Software

29. Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation

30. Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans

31. Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

32. Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR

33. Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis

42. Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature

43. Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks

44. Security-Relevant Challenges of Selected Systems for Multi-user Interaction

49. Statistical Detection of Malicious PE-Executables for Fast Offline Analysis

50. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

Catalog

Books, media, physical & digital resources