Author of the publication

Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files.

, and . TrustCom/BigDataSE, page 466-475. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards GDPR-compliant data processing in modern SIEM systems., , , , , , , , , and 1 other author(s). Comput. Secur., (2021)Efficient Fingerprint Matching for Forensic Event Reconstruction.. ICDF2C, volume 351 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 98-120. Springer, (2020)Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files., and . TrustCom/BigDataSE, page 466-475. IEEE, (2019)BMCLeech: Introducing Stealthy Memory Forensics to BMC., , and . Digit. Investig., (2020)All your System Memory are belong to us: From Low-Level Memory Acquisition to High-Level Forensic Event Reconstruction.. University of Erlangen-Nuremberg, Germany, (2021)Advances in Forensic Data Acquisition., , , , and . IEEE Des. Test, 35 (5): 63-74 (2018)A universal taxonomy and survey of forensic memory acquisition techniques., , and . Digital Investigation, 28 (Supplement): 56-69 (2019)Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data., , , , , , and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 329-345. Springer, (2022)Introducing DINGfest: An architecture for next generation SIEM systems., , , , , , and . Sicherheit, volume P-281 of LNI, page 257-260. Gesellschaft für Informatik e.V., (2018)