Author of the publication

A quality score honoring approach to semantic conformance assessment of minutiae-based feature extractors.

, , and . BIOSIG, volume P-191 of LNI, page 21-32. GI, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Botnet Detection in Anonymous Networks., , and . AIMS, page 11-15. IFIP, (2018)Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics., and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 158-172. Springer, (2017)COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes., and . GI-Jahrestagung, volume P-220 of LNI, page 2225-2239. GI, (2013)A Note on the Protection Level of Biometric Data in Electronic Passports., and . BIOSIG, volume P-155 of LNI, page 189-192. GI, (2009)A Novel Approach for Generating Synthetic Datasets for Digital Forensics., , , , and . IFIP Int. Conf. Digital Forensics, volume 589 of IFIP Advances in Information and Communication Technology, page 73-93. Springer, (2020)Revisiting Data Hiding Techniques for Apple File System., , and . ARES, page 41:1-41:10. ACM, (2019)Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View., and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 19-33. Springer, (2022)Mapping Cyber-Physical Threats for Critical Infrastructures., and . CRITIS, volume 13723 of Lecture Notes in Computer Science, page 164-179. Springer, (2022)Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows., , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-92. Springer, (2021)Using Perceptual Hashing for Targeted Content Scanning., , and . IFIP Int. Conf. Digital Forensics, volume 687 of IFIP Advances in Information and Communication Technology, page 125-142. Springer, (2023)