Tom Neubert
According to our database1,
Tom Neubert
authored at least 18 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
1
1
1
1
3
1
3
2
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware.
CoRR, 2024
2022
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover.
Digit. Investig., 2022
Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
Extended <i>StirTrace</i> benchmarking of biometric and forensic qualities of morphed face images.
IET Biom., 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
Proceedings of the 26th European Signal Processing Conference, 2018
2017
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 6: VISAPP, Porto, Portugal, February 27, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
2016
Image pre-processing detection: Evaluation of Benford's law, spatial and frequency domain feature performance.
Proceedings of the First International Workshop on Sensing, 2016