default search action
Stefan Kiltz
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Stefan Kiltz, Jana Dittmann, Fabian Loewe, Christian Heidecke, Max John, Jonas Mädel, Fabian Preißler:
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets. IH&MMSec 2024: 125-130 - [c41]Jana Dittmann, Christian Krätzer, Stefan Kiltz, Robert Altschaffel, Claus Vielhauer, Steffen Wendzel, Sandro Wefel, Holger Nitsch:
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). Sicherheit 2024: 265-269 - 2022
- [c40]Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann:
Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective. ARES 2022: 135:1-135:12 - [c39]Stefan Kiltz, Robert Altschaffel, Jana Dittmann:
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics. IH&MMSec 2022: 107-112 - 2021
- [c38]Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann:
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis. ARES 2021: 61:1-61:8 - [c37]Robert Altschaffel, Jonas Hielscher, Stefan Kiltz, Jana Dittmann:
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences. IH&MMSec 2021: 23-33 - 2020
- [b1]Stefan Kiltz:
Data-Centric Examination Approach (DCEA) for a qualitative determination of error, loss and uncertainty in digital and digitised forensics. Otto-von-Guericke University Magdeburg, Germany, 2020
2010 – 2019
- 2019
- [c36]Robert Altschaffel, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Digital Forensics in Industrial Control Systems. SAFECOMP 2019: 128-136 - 2016
- [c35]Ronny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann:
A semantic framework for a better understanding, investigation and prevention of organized financial crime. Sicherheit 2016: 55-66 - 2015
- [c34]Christian Arndt, Stefan Kiltz, Jana Dittmann, Robert Fischer:
ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties. IH&MMSec 2015: 91-96 - [c33]Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Supporting Forensic Design - A Course Profile to Teach Forensics. IMF 2015: 85-95 - 2014
- [c32]Robert Altschaffel, Jana Dittmann, Christian Krätzer, Stefan Kiltz:
A Hierarchical Model for the Description of Internet-Based Communication. IMF 2014: 85-94 - [c31]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics. Media Watermarking, Security, and Forensics 2014: 902808 - 2013
- [c30]Matthias Pocs, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Proposal of a privacy-enhancing fingerprint capture for a decentralized police database system from a legal perspective using the example of Germany and the EU. BTW Workshops 2013: 75-88 - [c29]Sebastian Breß, Stefan Kiltz, Martin Schäler:
Forensics on GPU Coprocessing in Databases - Research Challenges, First Experiments, and Countermeasures. BTW Workshops 2013: 115-129 - [c28]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes. Multimedia Content and Mobile Devices 2013: 86670S - [c27]Robert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application. IMF 2013: 113-121 - [c26]Robert Fischer, Claus Vielhauer, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms. Media Watermarking, Security, and Forensics 2013: 86650F - [c25]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes. Media Watermarking, Security, and Forensics 2013: 866509 - [e2]Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt:
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6307-5 [contents] - 2012
- [c24]Stefan Kiltz, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer:
Challenges in contact-less latent fingerprint processing in crime scenes: Review of sensors and image processing investigations. EUSIPCO 2012: 1504-1508 - [c23]Mario Hildebrandt, Stefan Kiltz, Jennifer Sturm, Jana Dittmann, Claus Vielhauer:
High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection. Media Watermarking, Security, and Forensics 2012: 83030J - [c22]Tobias Hoppe, Sven Kuhlmann, Stefan Kiltz, Jana Dittmann:
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data. SAFECOMP 2012: 125-136 - 2011
- [j1]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1): 11-25 (2011) - [c21]Marcus Leich, Stefan Kiltz, Christian Krätzer, Jana Dittmann, Claus Vielhauer:
Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners. Three-Dimensional Imaging, Interaction, and Measurement 2011: 786412 - [c20]Martin Schäler, Sandro Schulze, Stefan Kiltz:
Database-Centric Chain-of-Custody in Biometric Forensic Systems. BIOID 2011: 250-261 - [c19]Stefan Kiltz, Marcus Leich, Jana Dittmann, Claus Vielhauer, Michael Ulrich:
Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (CWL). Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2011: 78810G - [c18]Mario Hildebrandt, Ronny Merkel, Marcus Leich, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor. DSP 2011: 1-6 - [c17]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
A Common Scheme for Evaluation of Forensic Software. IMF 2011: 92-106 - [c16]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Ronny Merkel:
Detection of malicious traces in crime scene forensics: An enhanced optical dot pattern analysis for untreated traces of printed amino acid residues. ISPA 2011: 672-677 - [c15]Stefan Kiltz, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer, Christian Kraetzer:
Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics. IQSP 2011: 78670U - [c14]Marcus Leich, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors. Media Forensics and Security 2011: 78800S - [c13]Mario Hildebrandt, Stefan Kiltz, Ina Grossmann, Claus Vielhauer:
Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy. MM&Sec 2011: 1-8 - [c12]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles. MM&Sec 2011: 33-40 - [e1]Holger Morgenstern, Ralf Ehlert, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt:
Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany, May 10-12, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4403-8 [contents] - 2010
- [c11]Stefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann:
A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition. Sicherheit 2010: 93-104 - [c10]Tobias Hoppe, Sönke Holthusen, Sven Tuchscheerer, Stefan Kiltz, Jana Dittmann:
Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung. Sicherheit 2010: 153-164
2000 – 2009
- 2009
- [c9]Stefan Kiltz, Tobias Hoppe, Jana Dittmann, Claus Vielhauer:
Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump. GI Jahrestagung 2009: 1619-1633 - [c8]Stefan Kiltz, Tobias Hoppe, Jana Dittmann:
A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump. DPS 2009: 1-6 - [c7]Robert Altschaffel, Stefan Kiltz, Jana Dittmann:
From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. IMF 2009: 54-68 - [c6]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats. SAFECOMP 2009: 145-158 - 2008
- [c5]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. IAS 2008: 295-298 - [c4]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. SAFECOMP 2008: 235-248 - [c3]Andrey Makrushin, Jana Dittmann, Stefan Kiltz, Tobias Hoppe:
Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache. Sicherheit 2008: 315-327 - 2007
- [c2]Andreas Lang, Jana Dittmann, Stefan Kiltz, Tobias Hoppe:
Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment. SAFECOMP 2007: 40-53 - 2005
- [c1]Sascha Schimke, Stefan Kiltz, Claus Vielhauer, Ton Kalker:
Security analysis for biometric data in ID documents. Security, Steganography, and Watermarking of Multimedia Contents 2005: 474-485
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint