On application of bloom filters to iris biometrics C Rathgeb, F Breitinger, C Busch, H Baier IET Biometrics 3 (4), 207-218, 2014 | 156 | 2014 |
Similarity preserving hashing: Eligible properties and a new algorithm mrsh-v2 F Breitinger, H Baier Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013 | 115 | 2013 |
Blessing or curse? Revisiting security aspects of Software-Defined Networking L Schehlmann, S Abt, H Baier 10th International Conference on Network and Service Management (CNSM) and …, 2014 | 102 | 2014 |
Security aspects of piecewise hashing in computer forensics H Baier, F Breitinger 2011 Sixth International Conference on IT Security Incident Management and …, 2011 | 72 | 2011 |
How to exchange security events? overview and evaluation of formats and protocols J Steinberger, A Sperotto, M Golling, H Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 70 | 2015 |
Are we missing labels? A study of the availability of ground-truth in network security research S Abt, H Baier 2014 third international workshop on building analysis datasets and …, 2014 | 66 | 2014 |
FRASH: A framework to test algorithms of similarity hashing F Breitinger, G Stivaktakis, H Baier Digital Investigation 10, S50-S58, 2013 | 64 | 2013 |
A fuzzy hashing approach based on random sequences and hamming distance F Breitinger, H Baier | 63 | 2012 |
Enhancing breeder document long-term security using blockchain technology N Buchmann, C Rathgeb, H Baier, C Busch, M Margraf 2017 IEEE 41st annual computer software and applications conference (COMPSAC …, 2017 | 61 | 2017 |
Towards bloom filter-based indexing of iris biometric data C Rathgeb, F Breitinger, H Baier, C Busch 2015 international conference on biometrics (ICB), 422-429, 2015 | 54 | 2015 |
DDoS defense using MTD and SDN J Steinberger, B Kuhnert, C Dietz, L Ball, A Sperotto, H Baier, A Pras, ... NOMS 2018-2018 IEEE/IFIP network operations and management symposium, 1-9, 2018 | 52 | 2018 |
mvhash-b-A new approach for similarity preserving hashing F Breitinger, KP Astebøl, H Baier, C Busch 2013 Seventh International Conference on IT Security Incident Management and …, 2013 | 47 | 2013 |
Towards automated incident handling: How to select an appropriate response against a network-based attack? S Ossenbühl, J Steinberger, H Baier 2015 Ninth International Conference on IT Security Incident Management & IT …, 2015 | 43 | 2015 |
Performance issues about context-triggered piecewise hashing F Breitinger, H Baier Digital Forensics and Cyber Crime: Third International ICST Conference …, 2012 | 43 | 2012 |
Security and implementation analysis of the similarity digest sdhash F Breitinger, H Baier, J Beckingham First international baltic conference on network security & forensics (nesefo), 2012 | 42 | 2012 |
Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding T Göbel, H Baier Digital Investigation 24, S111-S120, 2018 | 36 | 2018 |
Anomaly Detection and mitigation at Internet scale: A survey J Steinberger, L Schehlmann, S Abt, H Baier Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 …, 2013 | 36 | 2013 |
On the database lookup problem of approximate matching F Breitinger, H Baier, D White Digital Investigation 11, S1-S9, 2014 | 34 | 2014 |
Collaborative DDoS defense using flow-based security event information J Steinberger, B Kuhnert, A Sperotto, H Baier, A Pras NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 516-522, 2016 | 32 | 2016 |
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography H Baier Technische Universität, 2002 | 32 | 2002 |