Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ulf Losche, Maik Morgenstern, Hendrik Pilz |
Platform Independent Malware Analysis Framework. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felix C. Freiling, Michael Gruhn |
What is Essential Data in Digital Forensic Analysis? |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kiltz, Jana Dittmann, Claus Vielhauer |
Supporting Forensic Design - A Course Profile to Teach Forensics. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christof Kier, Gerald Madlmayr, Alexander Nawratil, Michael Schafferer, Christian Schanes, Thomas Grechenig |
Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felix Ramisch, Martin Rieger |
Recovery of SQLite Data Using Expired Indexes. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gruhn |
Windows NT pagefile.sys Virtual Memory Analysis. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jana Dittmann, Holger Morgenstern (eds.) |
Ninth International Conference on IT Security Incident Management & IT Forensics, IMF 2015, Magdeburg, Germany, May 18-20, 2015 |
IMF |
2015 |
DBLP BibTeX RDF |
|
1 | Michael Schiefer |
Smart Home Definition and Security Threats. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sven Ossenbuhl, Jessica Steinberger, Harald Baier |
Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack? |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Dewald |
Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ronny Merkel |
Latent Fingerprint Aging from a Hyperspectral Perspective: First Qualitative Degradation Studies Using UV/VIS Spectroscopy. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Knut Bellin, Reiner Creutzburg |
Conception of a Master Course for IT and Media Forensics Part II: Android Forensics. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simon Thurner, Marcel Grun, Sven Schmitt, Harald Baier |
Improving the Detection of Encrypted Data on Storage Devices. |
IMF |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Niklas Fechner, Matthias Kirchner |
The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Harald Baier, Julian Knauer |
AFAUC - Anti-forensics of Storage Devices by Alternative Use of Communication Channels. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Cathrine Hove, Marte Tarnes, Maria B. Line, Karin Bernsmed |
Information Security Incident Management: Identified Practice in Large Organizations. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Felix C. Freiling, Holger Morgenstern, Sandra Frings, Oliver Göbel 0001, Detlef Günther, Jens Nedon, Dirk Schadt (eds.) |
Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014 |
IMF |
2014 |
DBLP BibTeX RDF |
|
1 | Robert Altschaffel, Jana Dittmann, Christian Krätzer, Stefan Kiltz |
A Hierarchical Model for the Description of Internet-Based Communication. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun |
Information Security Incident Management: Planning for Failure. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Harsch, Steffen Idler, Simon Thurner |
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christian Hilgers, Holger Macht, Tilo Müller, Michael Spreitzenbarth |
Post-Mortem Memory Analysis of Cold-Booted Android Devices. |
IMF |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Rass, Sebastian Kurowski |
On Bayesian Trust and Risk Forecasting for Compound Systems. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sven Kälber, Andreas Dewald, Felix C. Freiling |
Forensic Application-Fingerprinting Based on File System Metadata. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Vömel, Hermann Lenz |
Visualizing Indicators of Rootkit Infections in Memory Forensics. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Trojahn, Lei Pan 0002, Fabian Schmidt |
Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Wundram, Felix C. Freiling, Christian Moch |
Anti-forensics: The Next Step in Digital Forensics Tool Testing. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Stüttgen, Andreas Dewald, Felix C. Freiling |
Selective Imaging Revisited. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel 0001, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt (eds.) |
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013 |
IMF |
2013 |
DBLP BibTeX RDF |
|
1 | Frank Breitinger, Knut Petter Astebol, Harald Baier, Christoph Busch 0001 |
mvHash-B - A New Approach for Similarity Preserving Hashing. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert Floodeen, John Haller, Brett C. Tjaden |
Identifying a Shared Mental Model Among Incident Responders. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maria B. Line |
A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann |
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Karin Bernsmed, Inger Anne Tøndel |
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Holger Morgenstern, Ralf Ehlert, Sandra Frings, Oliver Göbel 0001, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt (eds.) |
Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany, May 10-12, 2011 |
IMF |
2011 |
DBLP BibTeX RDF |
|
1 | Andreas Dewald, Felix C. Freiling, Tim Weber |
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mario Hildebrandt, Stefan Kiltz, Jana Dittmann |
A Common Scheme for Evaluation of Forensic Software. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gerhard Koschorreck |
Automated Audit of Compliance and Security Controls. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hanan Hibshi, Timothy Vidas, Lorrie Faith Cranor |
Usability of Forensics Tools: A User Study. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Metzger, Wolfgang Hommel, Helmut Reiser |
Integrated Security Incident Management - Concepts and Real-World Experiences. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Poisel, Simon Tjoa |
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Rass |
Towards a Rapid-Alert System for Security Incidents. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Accorsi, Claus Wonnemann, Thomas Stocker |
Towards Forensic Data Flow Analysis of Business Process Logs. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Harald Baier, Frank Breitinger |
Security Aspects of Piecewise Hashing in Computer Forensics. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Terrence Ziemniak |
Use of Machine Learning Classification Techniques to Detect Atypical Behavior in Medical Applications. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Kurowski, Sandra Frings |
Computational Documentation of IT Incidents as Support for Forensic Operations. |
IMF |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christian Moch, Felix C. Freiling |
The Forensic Image Generator Generator (Forensig2). |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guido Schryen |
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Grillo, Alessandro Lentini, Gianluigi Me, Matteo Ottoni |
Fast User Classifying to Establish Forensic Analysis Priorities. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mark Wozar |
Technique to Interrogate an Image of RAM. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Kamran Ahmed, Mukhtar Hussain, Asad Raza |
An Automated User Transparent Approach to log Web URLs for Forensic Analysis. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stephen D. Wolthusen |
Overcast: Forensic Discovery in Cloud Environments. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robert Altschaffel, Stefan Kiltz, Jana Dittmann |
From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Goebel 0001, Ralf Ehlert, Sandra Frings, Detlef Günther, Holger Morgenstern, Dirk Schadt (eds.) |
IMF 2009, Fifth International Conference on IT Security Incident Management and IT Forensics, Stuttgart, Germany, 15-17 September 2009 |
IMF |
2009 |
DBLP BibTeX RDF |
|
1 | Serguei A. Mokhov, Emil Vassev |
Self-Forensics Through Case Studies of Small-to-Medium Software Systems. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Accorsi |
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jan Kohlrausch |
Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kamol Kaemarungsi, Nawattapon Yoskamtorn, Kitisak Jirawannakool, Nuttapong Sanglerdsinlapachai, Chanin Luangingkasut |
Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ziyad S. Al-Salloum, Stephen D. Wolthusen |
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Yasin, Muhammad Arif Wahla, Firdous Kausar |
Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Felix C. Freiling, Thorsten Holz, Martin Mink |
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Serguei A. Mokhov, Mourad Debbabi |
File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Chakravarthy Gundabattula, Vinay G. Vaidya |
Building a State Tracing Linux Kernel. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Udo Helmbrecht |
New Challenges for IT-Security Research in ITC (Keynote). |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Felix Lindner 0003 |
Network Infrastructure Forensics (Invited). |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Tsvetomir Tsvetanov, Stanislav Simeonov |
Network Flow Security Baselining. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Steven W. Wood |
A Forensic Computing Framework to Fit Any Legal System. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li 0001, Jian-Ping Wu |
Attacking Test and Online Forensics in IPv6 Networks. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Meng-Da Wu, Stephen D. Wolthusen |
Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Jack Cole |
Incident Management and Forensics Put in Context (Invited). |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Thomas Richard McEvoy, Stephen D. Wolthusen |
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Oliver Göbel 0001, Sandra Frings, Detlef Günther, Jens Nedon, Dirk Schadt (eds.) |
IT-Incidents Management & IT-Forensics - IMF 2008, Conference Proceedings, September 23-25, 2008, Mannheim, Germany |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Fred-Mario Silberbach |
Investigations and Prosecution in Cases of Computer Crime (Invited). |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Marthie Lessing |
Live Forensic Acquisition as Alternative to Traditional Forensic Process. |
IMF |
2008 |
DBLP BibTeX RDF |
|
1 | Sandra Frings |
IT Incident Management and Structured Documentation. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Carlos C. Solari |
The Security Landscape in a Converged IP World. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Felix C. Freiling, Bastian Schwittay |
A Common Process Model for Incident Response and Computer Forensics. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Joseph C. Sremack, Alexandre V. Antonov |
Taxonomy of Anti-Computer Forensics Threats. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Sandra Frings, Oliver Göbel 0001, Detlef Günther, Hardo Hase, Jens Nedon, Dirk Schadt, Arslan Brömme (eds.) |
IT-Incidents Management & IT-Forensics - IMF 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Klaus Brunnstein |
About the Role of IT Security in the Information Society. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Vijay K. Gurbani, Debra L. Cook, Lawrence E. Menten, Thomas B. Reddington |
A Case Study on Constructing a Security Event Management System. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Tohru Sato, Jumpei Watase |
Information-Sharing System for Vulnerability Information Dissemination in Large-Scale Organization. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Felix C. Freiling, Bastian Schwittay |
Towards Reliable Rootkit Detection in Live Response. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Harish Daiya, Maximillian Dornseif, Felix C. Freiling |
Testing Forensic Hash Tools on Sparse Files. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Fritjof Haft, Pascal Hassenpflug, Hans Lecker |
Proposal of a System for Computer-Based Case and Evidence. |
IMF |
2007 |
DBLP BibTeX RDF |
|
1 | Andrea Rigioni |
Incident Response and the Role of External Services (Invited Speech). |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Philip Anderson 0002, Maximillian Dornseif, Felix C. Freiling, Thorsten Holz, Alastair Irons, Christopher Laing, Martin Mink |
A Comparative Study of Teaching Forensics at a University Degree Level. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Andreas Schuster |
Pool Allocations as an Information Source in Windows Memory Forensics. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Johannes Wiik, Jose J. Gonzalez, Klaus-Peter Kossakowski |
Effectiveness of Proactive CSIRT Services. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Rolf Schulz |
Technical Development of Cyber Crime. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Jochen Kaiser, Alexander Vitzthum, Peter Holleczek, Falko Dressler |
Automated Resolving of Security Incidents as a Key Mechanism to Fight Massive Infections of Malicious Software. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Thorsten Voss, Klaus-Peter Kossakowski |
Detecting New Patterns of Attacks - Results and Applications of Large Scale Sensoring Networks. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Bernd Grobauer, Jens Ingo Mehlau, Jürgen Sander |
CarmentiS: A Co-Operative Approach Towards Situation Awareness and Early Warning for the Internet. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | James R. Lyle |
The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary (Keynote). |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Maria B. Line, Eirik Albrechtsen, Stig Ole Johnsen, Odd Helge Longva, Stefanie A. Hillen |
Monitoring of Incident Response Management Performance. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Oliver Göbel 0001, Dirk Schadt, Sandra Frings, Hardo Hase, Detlef Günther, Jens Nedon (eds.) |
IT-Incidents Management & IT-Forensics - IMF 2006, Conference Proceedings, October, 18th-19th, 2006, Stuttgart. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Anselm R. Garbe, Oliver Goebel 0001 |
A Distributed Security Announcement Authoring System with CAIF Support. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Maria B. Line, Lillian Røstad |
Establishing a Centre for Information Security: Experiences from the Trial Period and Recommendations to Similar Initiatives. |
IMF |
2006 |
DBLP BibTeX RDF |
|
1 | Neil Mitchison |
The Challenge of Electronic Evidence: The European Response. |
IMF |
2003 |
DBLP BibTeX RDF |
|
1 | Dietmar Mauersberger |
Einführung in die IT-Forensik. |
IMF |
2003 |
DBLP BibTeX RDF |
|