Stefan Kiltz

Orcid: 0009-0001-1261-8081

According to our database1, Stefan Kiltz authored at least 43 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT).
Proceedings of the Sicherheit, 2024

Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

2022
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Data-Centric Examination Approach (DCEA) for a qualitative determination of error, loss and uncertainty in digital and digitised forensics.
PhD thesis, 2020

2019
Digital Forensics in Industrial Control Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2019

2016
A semantic framework for a better understanding, investigation and prevention of organized financial crime.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

2015
Supporting Forensic Design - A Course Profile to Teach Forensics.
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015

ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics.
Proceedings of the Media Watermarking, 2014

A Hierarchical Model for the Description of Internet-Based Communication.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

2013
Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes.
Proceedings of the Media Watermarking, 2013

Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms.
Proceedings of the Media Watermarking, 2013

Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes.
Proceedings of the Multimedia Content and Mobile Devices 2013, 2013

Proposal of a privacy-enhancing fingerprint capture for a decentralized police database system from a legal perspective using the example of Germany and the EU.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013

Forensics on GPU Coprocessing in Databases - Research Challenges, First Experiments, and Countermeasures.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013

2012
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data.
Proceedings of the Computer Safety, Reliability, and Security, 2012

High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection.
Proceedings of the Media Watermarking, 2012

Challenges in contact-less latent fingerprint processing in crime scenes: Review of sensors and image processing investigations.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures.
Reliab. Eng. Syst. Saf., 2011

Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors.
Proceedings of the Media Forensics and Security III, 2011

Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics.
Proceedings of the Image Quality and System Performance VIII, 2011

Detection of malicious traces in crime scene forensics: An enhanced optical dot pattern analysis for untreated traces of printed amino acid residues.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

A Common Scheme for Evaluation of Forensic Software.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011

Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (CWL).
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011

Database-Centric Chain-of-Custody in Biometric Forensic Systems.
Proceedings of the Biometrics and ID Management, 2011

Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners.
Proceedings of the Three-Dimensional Imaging, 2011

2010
A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

2009
Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats.
Proceedings of the Computer Safety, 2009

From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy.
Proceedings of the IMF 2009, 2009

A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

2008
Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment.
Proceedings of the Computer Safety, 2007

2005
Security analysis for biometric data in ID documents.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005


  Loading...