Alignment-free cancelable iris biometric templates based on adaptive bloom filters C Rathgeb, F Breitinger, C Busch 2013 international conference on biometrics (ICB), 1-8, 2013 | 175 | 2013 |
Network and device forensic analysis of android social-messaging applications D Walnycky, I Baggili, A Marrington, J Moore, F Breitinger Digital Investigation 14, S77-S84, 2015 | 167 | 2015 |
On application of bloom filters to iris biometrics C Rathgeb, F Breitinger, C Busch, H Baier IET Biometrics 3 (4), 207-218, 2014 | 143 | 2014 |
Availability of datasets for digital forensics–and what is missing C Grajeda, F Breitinger, I Baggili Digital Investigation 22, S94-S105, 2017 | 129 | 2017 |
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy K Conlan, I Baggili, F Breitinger Digital investigation 18, S66-S75, 2016 | 129 | 2016 |
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages F Karpisek, I Baggili, F Breitinger Digital Investigation 15, 110-118, 2015 | 125 | 2015 |
Forensic State Acquisition from Internet of Things (FSAIoT) A general framework and practical approach for IoT forensics through IoT device state acquisition C Meffert, D Clark, I Baggili, F Breitinger Proceedings of the 12th International Conference on Availability …, 2017 | 111 | 2017 |
Similarity preserving hashing: Eligible properties and a new algorithm mrsh-v2 F Breitinger, H Baier Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013 | 110 | 2013 |
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III DR Clark, C Meffert, I Baggili, F Breitinger Digital Investigation 22, S3-S14, 2017 | 109 | 2017 |
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later VS Harichandran, F Breitinger, I Baggili, A Marrington Computers & Security 57, 1-13, 2016 | 100 | 2016 |
A survey on smartphone user’s security choices, awareness and education F Breitinger, R Tully-Doyle, C Hassenfeldt Computers & Security 88, 101647, 2020 | 92 | 2020 |
Approximate matching: definition and terminology F Breitinger, B Guttman, M McCarrin, V Roussev, D White URL http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-168.pdf, 2014 | 74 | 2014 |
Security aspects of piecewise hashing in computer forensics H Baier, F Breitinger 2011 Sixth International Conference on IT Security Incident Management and …, 2011 | 71 | 2011 |
User survey on phone security and usage F Breitinger, C Nickel BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the …, 2010 | 66 | 2010 |
Watch what you wear: preliminary forensic analysis of smart watches I Baggili, J Oduro, K Anthony, F Breitinger, G McGee 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 63 | 2015 |
Survey results on adults and cybersecurity education J Ricci, F Breitinger, I Baggili Education and Information Technologies 24, 231-249, 2019 | 61 | 2019 |
A fuzzy hashing approach based on random sequences and hamming distance F Breitinger, H Baier | 61 | 2012 |
FRASH: A framework to test algorithms of similarity hashing F Breitinger, G Stivaktakis, H Baier Digital Investigation 10, S50-S58, 2013 | 59 | 2013 |
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications X Zhang, I Baggili, F Breitinger Computers & Security 70, 516-531, 2017 | 53 | 2017 |
Towards bloom filter-based indexing of iris biometric data C Rathgeb, F Breitinger, H Baier, C Busch 2015 international conference on biometrics (ICB), 422-429, 2015 | 53 | 2015 |