Harald Baier
Orcid: 0000-0002-9254-6398
According to our database1,
Harald Baier
authored at least 93 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices.
DTRAP, 2024
Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation.
Forensic Sci. Int. Digit. Investig., 2024
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024
Towards arbitrating in a dispute - on responsible usage of client-side perceptual hashing against illegal content distribution.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions.
DTRAP, 2023
Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows.
DTRAP, 2023
Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable.
DTRAP, 2023
Applying Activity-Based Models to Integrate Labeled Preset Key Events in Intra-Day Human Mobility Scenarios.
Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems, 2023
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
2022
Revisiting the dataset gap problem - On availability, assessment and perspective of mobile forensic corpora.
Digit. Investig., 2022
Digit. Investig., 2022
Proceedings of the Advances in Digital Forensics XVIII, 2022
Smartphone Data Distributions and Requirements for Realistic Mobile Device Forensic Corpora.
Proceedings of the Advances in Digital Forensics XVIII, 2022
Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
Proceedings of the Critical Information Infrastructures Security, 2022
2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
2020
Proceedings of the NOMS 2020, 2020
Proceedings of the Advances in Digital Forensics XVI, 2020
2019
bring2lite: A Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records.
Digit. Investig., 2019
Digit. Investig., 2019
Digit. Investig., 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems.
IET Biom., 2018
Digit. Investig., 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
Proceedings of the 2018 International Conference on Biometrics, 2018
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018
2017
Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Correlating network events and transferring labels in the presence of IP address anonymisation.
Proceedings of the 12th International Conference on Network and Service Management, 2016
A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016
2015
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
it Inf. Technol., 2015
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015
Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the International Conference on Biometrics, 2015
Proceedings of the 11th International Conference on Network and Service Management, 2015
2014
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach.
J. Digit. Forensics Secur. Law, 2014
A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
AFAUC - Anti-forensics of Storage Devices by Alternative Use of Communication Channels.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the 10th International Conference on Network and Service Management, 2014
A Plea for Utilising Synthetic Data when Performing Machine Learning Based Cyber-Security Experiments.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014
2013
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Performance Evaluation of Classification and Feature Selection Algorithms for NetFlow-based Protocol Recognition.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Proceedings of the Number Theory and Cryptography, 2013
Security considerations on extending PACE to a biometric-based connection establishment.
Proceedings of the 2013 BIOSIG, 2013
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013
2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data.
Proceedings of the Ninth International Network Conference (INC 2012), 2012
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012
2011
Proceedings of the Information Security Technology for Applications, 2011
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011
A concept for monitoring self-transforming code using memory page access control management.
Proceedings of the International Carnahan Conference on Security Technology, 2011
A quality score honoring approach to semantic conformance assessment of minutiae-based feature extractors.
Proceedings of the BIOSIG 2011, 2011
2010
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
2009
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten - Lessons Learned!?
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the BIOSIG 2009, 2009
2004
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
Proceedings of the Public Key Infrastructure, 2004
2003
Exp. Math., 2003
2002
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography.
PhD thesis, 2002
2001
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Fundamentals of Computation Theory, 13th International Symposium, 2001
2000
Proceedings of the Progress in Cryptology, 2000