Follow
Frank Breitinger
Title
Cited by
Cited by
Year
Alignment-free cancelable iris biometric templates based on adaptive bloom filters
C Rathgeb, F Breitinger, C Busch
2013 international conference on biometrics (ICB), 1-8, 2013
1932013
Network and device forensic analysis of android social-messaging applications
D Walnycky, I Baggili, A Marrington, J Moore, F Breitinger
Digital Investigation 14, S77-S84, 2015
1842015
On application of bloom filters to iris biometrics
C Rathgeb, F Breitinger, C Busch, H Baier
IET Biometrics 3 (4), 207-218, 2014
1562014
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy
K Conlan, I Baggili, F Breitinger
Digital investigation 18, S66-S75, 2016
1522016
Availability of datasets for digital forensics–and what is missing
C Grajeda, F Breitinger, I Baggili
Digital Investigation 22, S94-S105, 2017
1492017
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages
F Karpisek, I Baggili, F Breitinger
Digital Investigation 15, 110-118, 2015
1412015
Forensic State Acquisition from Internet of Things (FSAIoT) A general framework and practical approach for IoT forensics through IoT device state acquisition
C Meffert, D Clark, I Baggili, F Breitinger
Proceedings of the 12th International Conference on Availability …, 2017
1322017
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III
DR Clark, C Meffert, I Baggili, F Breitinger
Digital Investigation 22, S3-S14, 2017
1272017
A survey on smartphone user’s security choices, awareness and education
F Breitinger, R Tully-Doyle, C Hassenfeldt
Computers & Security 88, 101647, 2020
1162020
Similarity preserving hashing: Eligible properties and a new algorithm mrsh-v2
F Breitinger, H Baier
Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013
1152013
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later
VS Harichandran, F Breitinger, I Baggili, A Marrington
Computers & Security 57, 1-13, 2016
1072016
The role of national cybersecurity strategies on the improvement of cybersecurity education
S AlDaajeh, H Saleous, S Alrabaee, E Barka, F Breitinger, KKR Choo
Computers & Security 119, 102754, 2022
942022
Approximate matching: definition and terminology
F Breitinger, B Guttman, M McCarrin, V Roussev, D White
URL http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-168.pdf, 2014
842014
User survey on phone security and usage
F Breitinger, C Nickel
Gesellschaft für Informatik eV, 2010
772010
Watch what you wear: preliminary forensic analysis of smart watches
I Baggili, J Oduro, K Anthony, F Breitinger, G McGee
2015 10th International Conference on Availability, Reliability and Security …, 2015
76*2015
Survey results on adults and cybersecurity education
J Ricci, F Breitinger, I Baggili
Education and Information Technologies 24, 231-249, 2019
742019
Security aspects of piecewise hashing in computer forensics
H Baier, F Breitinger
2011 Sixth International Conference on IT Security Incident Management and …, 2011
742011
ChatGPT for digital forensic investigation: The good, the bad, and the unknown
M Scanlon, F Breitinger, C Hargreaves, JN Hilgert, J Sheppard
Forensic Science International: Digital Investigation 46, 301609, 2023
682023
FRASH: A framework to test algorithms of similarity hashing
F Breitinger, G Stivaktakis, H Baier
Digital Investigation 10, S50-S58, 2013
642013
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
X Zhang, I Baggili, F Breitinger
Computers & Security 70, 516-531, 2017
632017
The system can't perform the operation now. Try again later.
Articles 1–20