Login / Signup
IMF
2003
2007
2011
2015
2003
2015
Keyphrases
Publications
2015
Ninth International Conference on IT Security Incident Management & IT Forensics, IMF 2015, Magdeburg, Germany, May 18-20, 2015
IMF
(2015)
Felix Ramisch
,
Martin Rieger
Recovery of SQLite Data Using Expired Indexes.
IMF
(2015)
Ronny Merkel
Latent Fingerprint Aging from a Hyperspectral Perspective: First Qualitative Degradation Studies Using UV/VIS Spectroscopy.
IMF
(2015)
Michael Gruhn
Windows NT pagefile.sys Virtual Memory Analysis.
IMF
(2015)
Knut Bellin
,
Reiner Creutzburg
Conception of a Master Course for IT and Media Forensics Part II: Android Forensics.
IMF
(2015)
Stefan Kiltz
,
Jana Dittmann
,
Claus Vielhauer
Supporting Forensic Design - A Course Profile to Teach Forensics.
IMF
(2015)
Christof Kier
,
Gerald Madlmayr
,
Alexander Nawratil
,
Michael Schafferer
,
Christian Schanes
,
Thomas Grechenig
Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios.
IMF
(2015)
Sven Ossenbuhl
,
Jessica Steinberger
,
Harald Baier
Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?
IMF
(2015)
Andreas Dewald
Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing.
IMF
(2015)
Felix C. Freiling
,
Michael Gruhn
What is Essential Data in Digital Forensic Analysis?
IMF
(2015)
Michael Schiefer
Smart Home Definition and Security Threats.
IMF
(2015)
Simon Thurner
,
Marcel Grun
,
Sven Schmitt
,
Harald Baier
Improving the Detection of Encrypted Data on Storage Devices.
IMF
(2015)
Ulf Losche
,
Maik Morgenstern
,
Hendrik Pilz
Platform Independent Malware Analysis Framework.
IMF
(2015)
2014
Christian Hilgers
,
Holger Macht
,
Tilo Müller
,
Michael Spreitzenbarth
Post-Mortem Memory Analysis of Cold-Booted Android Devices.
IMF
(2014)
Alexander Harsch
,
Steffen Idler
,
Simon Thurner
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management.
IMF
(2014)
Cathrine Hove
,
Marte Tarnes
,
Maria B. Line
,
Karin Bernsmed
Information Security Incident Management: Identified Practice in Large Organizations.
IMF
(2014)
Robert Altschaffel
,
Jana Dittmann
,
Christian Krätzer
,
Stefan Kiltz
A Hierarchical Model for the Description of Internet-Based Communication.
IMF
(2014)
Maria B. Line
,
Inger Anne Tøndel
,
Martin Gilje Jaatun
Information Security Incident Management: Planning for Failure.
IMF
(2014)
Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014
IMF
(2014)
Niklas Fechner
,
Matthias Kirchner
The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings.
IMF
(2014)
Harald Baier
,
Julian Knauer
AFAUC - Anti-forensics of Storage Devices by Alternative Use of Communication Channels.
IMF
(2014)
2013
Maria B. Line
A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry.
IMF
(2013)
Johannes Stüttgen
,
Andreas Dewald
,
Felix C. Freiling
Selective Imaging Revisited.
IMF
(2013)
Stefan Rass
,
Sebastian Kurowski
On Bayesian Trust and Risk Forecasting for Compound Systems.
IMF
(2013)
Sven Kälber
,
Andreas Dewald
,
Felix C. Freiling
Forensic Application-Fingerprinting Based on File System Metadata.
IMF
(2013)
Robert Floodeen
,
John Haller
,
Brett C. Tjaden
Identifying a Shared Mental Model Among Incident Responders.
IMF
(2013)
Martin Wundram
,
Felix C. Freiling
,
Christian Moch
Anti-forensics: The Next Step in Digital Forensics Tool Testing.
IMF
(2013)
Robert Altschaffel
,
Robert Clausing
,
Christian Kraetzer
,
Tobias Hoppe
,
Stefan Kiltz
,
Jana Dittmann
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application.
IMF
(2013)
Karin Bernsmed
,
Inger Anne Tøndel
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management.
IMF
(2013)
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013
IMF
(2013)
Frank Breitinger
,
Knut Petter Astebol
,
Harald Baier
,
Christoph Busch
mvHash-B - A New Approach for Similarity Preserving Hashing.
IMF
(2013)
Stefan Vömel
,
Hermann Lenz
Visualizing Indicators of Rootkit Infections in Memory Forensics.
IMF
(2013)
Matthias Trojahn
,
Lei Pan
,
Fabian Schmidt
Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR.
IMF
(2013)
2011
Harald Baier
,
Frank Breitinger
Security Aspects of Piecewise Hashing in Computer Forensics.
IMF
(2011)
Gerhard Koschorreck
Automated Audit of Compliance and Security Controls.
IMF
(2011)
Andreas Dewald
,
Felix C. Freiling
,
Tim Weber
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions.
IMF
(2011)
Hanan Hibshi
,
Timothy Vidas
,
Lorrie Faith Cranor
Usability of Forensics Tools: A User Study.
IMF
(2011)
Stefan Rass
Towards a Rapid-Alert System for Security Incidents.
IMF
(2011)
Rafael Accorsi
,
Claus Wonnemann
,
Thomas Stocker
Towards Forensic Data Flow Analysis of Business Process Logs.
IMF
(2011)
Stefan Metzger
,
Wolfgang Hommel
,
Helmut Reiser
Integrated Security Incident Management - Concepts and Real-World Experiences.
IMF
(2011)
Rainer Poisel
,
Simon Tjoa
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art.
IMF
(2011)
Mario Hildebrandt
,
Stefan Kiltz
,
Jana Dittmann
A Common Scheme for Evaluation of Forensic Software.
IMF
(2011)
Sebastian Kurowski
,
Sandra Frings
Computational Documentation of IT Incidents as Support for Forensic Operations.
IMF
(2011)
Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany, May 10-12, 2011
IMF
(2011)
Terrence Ziemniak
Use of Machine Learning Classification Techniques to Detect Atypical Behavior in Medical Applications.
IMF
(2011)
2009
Antonio Grillo
,
Alessandro Lentini
,
Gianluigi Me
,
Matteo Ottoni
Fast User Classifying to Establish Forensic Analysis Priorities.
IMF
(2009)
Serguei A. Mokhov
,
Emil Vassev
Self-Forensics Through Case Studies of Small-to-Medium Software Systems.
IMF
(2009)
Muhammad Kamran Ahmed
,
Mukhtar Hussain
,
Asad Raza
An Automated User Transparent Approach to log Web URLs for Forensic Analysis.
IMF
(2009)
Guido Schryen
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors.
IMF
(2009)
Stephen D. Wolthusen
Overcast: Forensic Discovery in Cloud Environments.
IMF
(2009)