Katrin Franke

Orcid: 0000-0002-4899-9410

According to our database1, Katrin Franke authored at least 93 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reliability validation enabling framework (RVEF) for digital forensics in criminal investigations.
Forensic Sci. Int. Digit. Investig., June, 2023

Evidence in the fog - Triage in fog computing systems.
Forensic Sci. Int. Digit. Investig., March, 2023

Energy Guided Diffusion for Generating Neurally Exciting Images.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Advancing Knowledge Discoveries in Criminal Investigations with Semantic Textual Similarity.
Proceedings of the Legal Knowledge and Information Systems, 2023

2022
Reliability assessment of digital forensic investigations in the Norwegian police.
Digit. Investig., 2022

Quantifying data volatility for IoT forensics with examples from Contiki OS.
Digit. Investig., 2022

Legal and technical questions of file system reverse engineering.
Comput. Law Secur. Rev., 2022

2021
Coffee forensics - Reconstructing data in IoT devices running Contiki OS.
Digit. Investig., 2021

Reliability validation for file system interpretation.
Digit. Investig., 2021

Removing Inter-Experimental Variability from Functional Data in Systems Neuroscience.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Generic Metadata Time Carving.
Digit. Investig., 2020

Standard Representation for Digital Forensic Processing.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

System Identification with Biophysical Constraints: A Circuit Model of the Inner Retina.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Identifying Proficient Cybercriminals Through Text and Network Analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Network Security Systems Log Analysis for Trends and Insights: A Case Study.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Correction: Bayesian hypothesis testing and experimental design for two-photon imaging data.
PLoS Comput. Biol., 2019

Bayesian hypothesis testing and experimental design for two-photon imaging data.
PLoS Comput. Biol., 2019

The impact of preprocessing in natural language for open source intelligence and criminal investigation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Identifying Anomalous HTTP Traffic with Association Rule Mining.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Internet of Things security and forensics: Challenges and opportunities.
Future Gener. Comput. Syst., 2018

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial.
CoRR, 2018

Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces.
Proceedings of the Computational Science - ICCS 2018, 2018

Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process using Support Vector Machines and Latent Dirichlet Allocation.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness.
Appl. Soft Comput., 2017

A deep neuro-fuzzy method for multi-label malware classification and fuzzy rules extraction.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks.
Proceedings of the International Conference on Computational Science, 2017

Cyber crime investigations in the era of big data.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networks.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
The functional diversity of retinal ganglion cells in the mouse.
Nat., 2016

Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps.
Int. J. Hybrid Intell. Syst., 2016

Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy.
Int. J. Hybrid Intell. Syst., 2016

Study of Soft Computing Methods for Large-Scale Multinomial Malware Types and Families Detection.
Proceedings of the Recent Developments and the New Direction in Soft-Computing Foundations and Applications, 2016

Automated intelligent multinomial classification of malware species using dynamic behavioural analysis.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Understanding Neuro-Fuzzy on a class of multinomial malware detection problems.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Combining expert knowledge with automatic feature extraction for reliable web attack detection.
Secur. Commun. Networks, 2015

Editorial for big data issue.
Digit. Investig., 2015

Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications.
Proceedings of the Advances in Computational Intelligence, 2015

Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications.
Proceedings of the Hybrid Intelligent Systems, 2015

A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection.
Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), 2015

2014
Practical use of Approximate Hash Based Matching in digital investigations.
Digit. Investig., 2014

Privacy-respecting digital investigation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
Enhancing the effectiveness of Web Application Firewalls by generic feature selection.
Log. J. IGPL, 2013

2012
Cursive Handwritten Segmentation and Recognition for Instructional Videos.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

A General Lp-norm Support Vector Machine via Mixed 0-1 Programming.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

Off-line signature verification using G-SURF.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Generic feature selection measure for botnet malware detection.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Font identification - In context of an Indic script.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Adaptive Intrusion Detection System via online machine learning.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

Similar shaped part-based character recognition using G-SURF.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

Clustering document fragments using background color and texture information.
Proceedings of the Document Recognition and Retrieval XIX, 2012

Text Independent Writer Identification for Oriya Script.
Proceedings of the 10th IAPR International Workshop on Document Analysis Systems, 2012

2011
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
Int. J. Mob. Comput. Multim. Commun., 2011

A new ensemble-feature-selection framework for intrusion detection.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

Identifying Malware Using Cross-Evidence Correlation.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Identification of Indic Scripts on Torn-Documents.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Application of the Generic Feature Selection Measure in Detection of Web Attacks.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Structural handwritten and machine print classification for sparse content and arbitrary oriented document fragments.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Comparison of Feature-Selection Methods for Intrusion Detection.
Proceedings of the Computer Network Security, 2010

Towards a Generic Feature-Selection Measure for Intrusion Detection.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Verification of Video Source Camera Competition (CAMCOM 2010).
Proceedings of the Recognizing Patterns in Signals, Speech, Images and Videos, 2010

Script Identification - A Han and Roman Script Perspective.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Text Independent Writer Identification for Bengali Script.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Document-Zone Classification in Torn Documents.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
Proceedings of the ARES 2010, 2010

2009
Analysis of Authentic Signatures and Forgeries.
Proceedings of the Computational Forensics, Third International Workshop, 2009

Advancing Digital Forensics.
Proceedings of the Information Assurance and Security Education and Training, 2009

Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Two-stage Approach for Word-wise Script Identification.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

ICDAR 2009 Signature Verification Competition.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

2008
Computational Forensics: An Overview.
Proceedings of the Computational Forensics, Second International Workshop, 2008

Stroke-Morphology Analysis Using Super-Imposed Writing Movements.
Proceedings of the Computational Forensics, Second International Workshop, 2008

A Color Morphology based on Pareto-dominance Relation and Hypervolume Measure.
Proceedings of the 4th European Conference on Colour in Graphics, 2008

2007
Using codebooks of fragmented connected-component contours in forensic and historic writer identification.
Pattern Recognit. Lett., 2007

Pareto-dominated Hypervolume Measure: An Alternative Approach to Color Morphology.
Proceedings of the 7th International Conference on Hybrid Intelligent Systems, 2007

A New Two-Stage Search Procedure for Misuse Detection.
Proceedings of the Future Generation Communication and Networking, 2007

Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Computational Forensics: Towards Hybrid-Intelligent Crime Investigation.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Tiny GAs for image processing applications.
IEEE Comput. Intell. Mag., 2006

2004
Automatic writer identification using fragmented connected-component contours.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

Ink-deposition model: the relation of writing and ink deposition processes.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

The WANDAML markup language for digital document annotation.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

Biometric User Authentication on Smart Cards by Means of Handwritten Signatures.
Proceedings of the Biometric Authentication, First International Conference, 2004

2003
WANDA: A generic Framework applied in Forensic Handwriting Analysis and Writer Identification.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

Biometrische Benutzerauthentisierung auf Smartcards mittels handschriftlicher Unterschriften.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2002
Ink texture analysis for writer identification.
Proceedings of the Eighth International Workshop on Frontiers in Handwriting Recognition, 2002

Static Signature Verification Employing a Kosko-Neuro-fuzzy Approach.
Proceedings of the Advances in Soft Computing, 2002

Soft-Biometrics: Soft-Computing Technologies for Biometric-Applications.
Proceedings of the Advances in Soft Computing, 2002

2001
A computer-based system to support forensic studies on handwritten documents.
Int. J. Document Anal. Recognit., 2001

2000
Fuzzy Image Processing by Using Dubois and Prade Fuzzy Norms.
Proceedings of the 15th International Conference on Pattern Recognition, 2000


  Loading...