Login / Signup
Tom Neubert
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 19
Top Topics
Control System
Spatial Domain
Illumination Compensation
Information Hiding
Top Venues
IH&MMSec
ARES
CoRR
IET Biom.
</>
Publications
</>
Tom Neubert
,
Bjarne Peuker
,
Laura Buxhoidt
,
Eric Schueler
,
Claus Vielhauer
Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware.
CoRR
(2024)
Tom Neubert
,
Antonio José Caballero Morcillo
,
Claus Vielhauer
Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems.
ARES
(2022)
Kevin Lamshöft
,
Tom Neubert
,
Jonas Hielscher
,
Claus Vielhauer
,
Jana Dittmann
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover.
Digit. Investig.
40 (Supplement) (2022)
Tom Neubert
,
Claus Vielhauer
,
Christian Kraetzer
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks.
ARES
(2021)
Steffen Wendzel
,
Luca Caviglione
,
Wojciech Mazurczyk
,
Aleksandra Mileva
,
Jana Dittmann
,
Christian Krätzer
,
Kevin Lamshöft
,
Claus Vielhauer
,
Laura Hartmann
,
Jörg Keller
,
Tom Neubert
A Revised Taxonomy of Steganography Embedding Patterns.
ARES
(2021)
Kevin Lamshöft
,
Tom Neubert
,
Christian Krätzer
,
Claus Vielhauer
,
Jana Dittmann
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
IH&MMSec
(2021)
Steffen Wendzel
,
Luca Caviglione
,
Wojciech Mazurczyk
,
Aleksandra Mileva
,
Jana Dittmann
,
Christian Krätzer
,
Kevin Lamshöft
,
Claus Vielhauer
,
Laura Hartmann
,
Jörg Keller
,
Tom Neubert
A Revised Taxonomy of Steganography Embedding Patterns.
CoRR
(2021)
Mario Hildebrandt
,
Kevin Lamshöft
,
Jana Dittmann
,
Tom Neubert
,
Claus Vielhauer
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
IH&MMSec
(2020)
Clemens Seibold
,
Anna Hilsmann
,
Andrey Makrushin
,
Christian Kraetzer
,
Tom Neubert
,
Jana Dittmann
,
Peter Eisert
Visual Feature Space Analyses of Face Morphing Detectors.
WIFS
(2019)
Andrey Makrushin
,
Tom Neubert
,
Jana Dittmann
Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control.
VISIGRAPP (4: VISAPP)
(2019)
Tom Neubert
,
Christian Kraetzer
,
Jana Dittmann
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
IH&MMSec
(2019)
Tom Neubert
,
Christian Kraetzer
,
Jana Dittmann
Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
EUSIPCO
(2018)
Tom Neubert
,
Andrey Makrushin
,
Mario Hildebrandt
,
Christian Kraetzer
,
Jana Dittmann
benchmarking of biometric and forensic qualities of morphed face images.
IET Biom.
7 (4) (2018)
Andrey Makrushin
,
Christian Kraetzer
,
Tom Neubert
,
Jana Dittmann
Generalized Benford's Law for Blind Detection of Morphed Face Images.
IH&MMSec
(2018)
Christian Kraetzer
,
Andrey Makrushin
,
Tom Neubert
,
Mario Hildebrandt
,
Jana Dittmann
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
IH&MMSec
(2017)
Mario Hildebrandt
,
Tom Neubert
,
Andrey Makrushin
,
Jana Dittmann
Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps.
IWBF
(2017)
Tom Neubert
Face Morphing Detection: An Approach Based on Image Degradation Analysis.
IWDW
(2017)
Andrey Makrushin
,
Tom Neubert
,
Jana Dittmann
Automatic Generation and Detection of Visually Faultless Facial Morphs.
VISIGRAPP (6: VISAPP)
(2017)
Tom Neubert
,
Mario Hildebrandt
,
Jana Dittmann
Image pre-processing detection: Evaluation of Benford's law, spatial and frequency domain feature performance.
SPLINE
(2016)