default search action
Harald Baier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Matthias Deutschmann, Harald Baier:
Ubi est indicium? On forensic analysis of the UBI file system. Forensic Sci. Int. Digit. Investig. 48: 301689 (2024) - [j21]Dennis Wolf, Thomas Göbel, Harald Baier:
Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation. Forensic Sci. Int. Digit. Investig. 48: 301690 (2024) - [j20]Markus Demmel, Thomas Göbel, Patrik Gonçalves, Harald Baier:
Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices. DTRAP 5(3): 30:1-30:19 (2024) - [j19]Lisa Rzepka, Jenny Ottmann, Felix C. Freiling, Harald Baier:
Causal Inconsistencies Are Normal in Windows Memory Dumps (Too). DTRAP 5(3): 31:1-31:20 (2024) - [c71]Michael Mundt, Harald Baier, Antje Raab-Düsterhöft:
Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration. ARES 2024: 21:1-21:12 - [c70]Leon Twenning, Harald Baier:
Towards arbitrating in a dispute - on responsible usage of client-side perceptual hashing against illegal content distribution. EICC 2024: 105-114 - [c69]Thomas Göbel, Harald Baier, Dennis Wolf:
Scenario-based Data Set Generation for Use in Digital Forensics: A Case Study. INFORMATIK 2024: 355-370 - 2023
- [j18]Samantha Klier, Jan Varenkamp, Harald Baier:
Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows. DTRAP 4(3): 34:1-34:17 (2023) - [j17]Thomas Göbel, Harald Baier, Frank Breitinger:
Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable. DTRAP 4(3): 38:1-38:18 (2023) - [j16]Michael Mundt, Harald Baier:
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions. DTRAP 4(4): 54:1-54:23 (2023) - [c68]Michael Mundt, Harald Baier:
Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review. ICDF2C (1) 2023: 33-57 - [c67]Leon Twenning, Harald Baier, Thomas Göbel:
Using Perceptual Hashing for Targeted Content Scanning. IFIP Int. Conf. Digital Forensics 2023: 125-142 - [c66]Samantha Klier, Harald Baier:
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers. NordSec 2023: 281-303 - [c65]Patrik Gonçalves, Harald Baier:
Applying Activity-Based Models to Integrate Labeled Preset Key Events in Intra-Day Human Mobility Scenarios. VEHITS 2023: 281-288 - 2022
- [j15]Thomas Göbel, Stephan Maltan, Jan Türr, Harald Baier, Florian Mann:
ForTrace - A holistic forensic data set synthesis framework. Digit. Investig. 40(Supplement): 301344 (2022) - [j14]Thomas Göbel, Frieder Uhlig, Harald Baier, Frank Breitinger:
FRASHER - A framework for automated evaluation of similarity hashing. Digit. Investig. 42(Supplement): 301407 (2022) - [j13]Patrik Gonçalves, Klara Dolos, Michelle Stebner, Andreas Attenberger, Harald Baier:
Revisiting the dataset gap problem - On availability, assessment and perspective of mobile forensic corpora. Digit. Investig. 43(Supplement): 301439 (2022) - [c64]Michael Mundt, Harald Baier:
Mapping Cyber-Physical Threats for Critical Infrastructures. CRITIS 2022: 164-179 - [c63]Samantha Klier, Harald Baier:
Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View. ICDF2C 2022: 19-33 - [c62]Michael Mundt, Harald Baier:
Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security. ICDF2C 2022: 417-434 - [c61]Martin Lukner, Thomas Göbel, Harald Baier:
Realistic and Configurable Synthesis of Malware Traces in Windows Systems. IFIP Int. Conf. Digital Forensics 2022: 21-44 - [c60]Patrik Gonçalves, Andreas Attenberger, Harald Baier:
Smartphone Data Distributions and Requirements for Realistic Mobile Device Forensic Corpora. IFIP Int. Conf. Digital Forensics 2022: 47-63 - 2021
- [c59]Thomas Göbel, Frieder Uhlig, Harald Baier:
Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows. ICDF2C 2021: 72-92 - [c58]Michael Mundt, Harald Baier:
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework. ICDF2C 2021: 139-158 - [c57]Thomas Göbel, Frieder Uhlig, Harald Baier:
Evaluation of Network Traffic Analysis Using Approximate Matching Algorithms. IFIP Int. Conf. Digital Forensics 2021: 89-108 - 2020
- [c56]Thomas Göbel, Thomas Schäfer, Julien Hachenberger, Jan Türr, Harald Baier:
A Novel Approach for Generating Synthetic Datasets for Digital Forensics. IFIP Int. Conf. Digital Forensics 2020: 73-93 - [c55]Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras:
Distributed DDoS Defense: A collaborative Approach at Internet Scale. NOMS 2020: 1-6
2010 – 2019
- 2019
- [j12]Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger:
On efficiency of artifact lookup strategies in digital forensics. Digit. Investig. 28 Supplement: S116-S125 (2019) - [j11]Lorenz Liebler, Harald Baier:
Towards exact and inexact approximate matching of executable binaries. Digit. Investig. 28 Supplement: S12-S21 (2019) - [j10]Christian Meng, Harald Baier:
bring2lite: A Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records. Digit. Investig. 29 Supplement: S31-S41 (2019) - [c54]Thomas Göbel, Jan Türr, Harald Baier:
Revisiting Data Hiding Techniques for Apple File System. ARES 2019: 41:1-41:10 - 2018
- [j9]Thomas Göbel, Harald Baier:
Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding. Digit. Investig. 24 Supplement: S111-S120 (2018) - [j8]Christian Rathgeb, Nicolas Buchmann, Heinz Hofbauer, Harald Baier, Andreas Uhl, Christoph Busch:
Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems. IET Biom. 7(4): 356-364 (2018) - [c53]Katharina Kuhnert, Jessica Steinberger, Harald Baier:
Botnet Detection in Anonymous Networks. AIMS 2018: 11-15 - [c52]Christian Rathgeb, Torsten Schlett, Nicolas Buchmann, Harald Baier, Christoph Busch:
Multi-sample Compression of Iris Images Using High Efficiency Video Coding. ICB 2018: 291-296 - [c51]Lorenz Liebler, Harald Baier:
On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving. ICDF2C 2018: 3-22 - [c50]Thomas Göbel, Harald Baier:
fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques. ICDF2C 2018: 23-42 - [c49]Thomas Göbel, Harald Baier:
Anti-Forensic Capacity and Detection Rating of Hidden Data in the Ext4 Filesystem. IFIP Int. Conf. Digital Forensics 2018: 87-110 - [c48]Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras, Gabi Dreo:
DDoS defense using MTD and SDN. NOMS 2018: 1-9 - 2017
- [c47]Nicolas Buchmann, Christian Rathgeb, Harald Baier, Christoph Busch, Marian Margraf:
Enhancing Breeder Document Long-Term Security Using Blockchain Technology. COMPSAC (2) 2017: 744-748 - [c46]Lorenz Liebler, Harald Baier:
Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics. ICDF2C 2017: 158-172 - 2016
- [c45]Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras:
In Whom Do We Trust - Sharing Security Events. AIMS 2016: 111-124 - [c44]Nicolas Buchmann, Christian Rathgeb, Johannes Wagner, Christoph Busch, Harald Baier:
A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes. BIOSIG 2016: 281-288 - [c43]Sebastian Abt, Harald Baier:
Correlating network events and transferring labels in the presence of IP address anonymisation. CNSM 2016: 64-72 - [c42]Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras:
Collaborative DDoS defense using flow-based security event information. NOMS 2016: 516-522 - 2015
- [j7]Harald Baier:
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions. it Inf. Technol. 57(6): 347-356 (2015) - [c41]Sebastian Abt, Harald Baier:
A research process that ensures reproducible network security research. CNSM 2015: 71-77 - [c40]Christian Rathgeb, Harald Baier, Christoph Busch, Frank Breitinger:
Towards Bloom filter-based indexing of iris biometric data. ICB 2015: 422-429 - [c39]Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier:
How to exchange security events? Overview and evaluation of formats and protocols. IM 2015: 261-269 - [c38]Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras:
Collaborative attack mitigation and response: A survey. IM 2015: 910-913 - [c37]Simon Thurner, Marcel Grun, Sven Schmitt, Harald Baier:
Improving the Detection of Encrypted Data on Storage Devices. IMF 2015: 26-39 - [c36]Sven Ossenbuhl, Jessica Steinberger, Harald Baier:
Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack? IMF 2015: 51-67 - [c35]Sebastian Abt, Reinhard Stampp, Harald Baier:
Towards reproducible cyber-security research through complex node automation. NTMS 2015: 1-5 - 2014
- [j6]Frank Breitinger, Harald Baier, Douglas White:
On the database lookup problem of approximate matching. Digit. Investig. 11(Supplement 1): S1-S9 (2014) - [j5]Christian Rathgeb, Frank Breitinger, Christoph Busch, Harald Baier:
On application of bloom filters to iris biometrics. IET Biom. 3(4): 207-218 (2014) - [j4]Nicolas Buchmann, Harald Baier:
Towards a more secure and scalable verifying PKI of eMRTD. J. Comput. Secur. 22(6): 1025-1049 (2014) - [j3]Frank Breitinger, Christian Rathgeb, Harald Baier:
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach. J. Digit. Forensics Secur. Law 9(2): 155-166 (2014) - [c34]Nicolas Buchmann, Christian Rathgeb, Harald Baier, Christoph Busch:
Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area. APF 2014: 172-190 - [c33]Sebastian Abt, Harald Baier:
Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research. BADGERS@ESORICS 2014: 40-55 - [c32]Sebastian Abt, Harald Baier:
A Plea for Utilising Synthetic Data when Performing Machine Learning Based Cyber-Security Experiments. AISec@CCS 2014: 37-45 - [c31]Lisa Schehlmann, Sebastian Abt, Harald Baier:
Blessing or curse? Revisiting security aspects of Software-Defined Networking. CNSM 2014: 382-387 - [c30]Frank Breitinger, Georg Ziroff, Steffen Lange, Harald Baier:
Similarity Hashing Based on Levenshtein Distances. IFIP Int. Conf. Digital Forensics 2014: 133-147 - [c29]Harald Baier, Julian Knauer:
AFAUC - Anti-forensics of Storage Devices by Alternative Use of Communication Channels. IMF 2014: 14-26 - [c28]Sebastian Abt, Sebastian Gärtner, Harald Baier:
A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. SIN 2014: 25 - 2013
- [j2]Frank Breitinger, Georgios Stivaktakis, Harald Baier:
FRASH: A framework to test algorithms of similarity hashing. Digit. Investig. 10(Supplement): S50-S58 (2013) - [c27]Jessica Steinberger, Lisa Schehlmann, Sebastian Abt, Harald Baier:
Anomaly Detection and Mitigation at Internet Scale: A Survey. AIMS 2013: 49-60 - [c26]Sebastian Abt, Christian Dietz, Harald Baier, Slobodan Petrovic:
Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow. AIMS 2013: 148-159 - [c25]Nicolas Buchmann, Roel Peeters, Harald Baier, Andreas Pashalidis:
Security considerations on extending PACE to a biometric-based connection establishment. BIOSIG 2013: 15-26 - [c24]Harald Baier:
Have a Break - Have a Security Centre: From DZI to CASED. Number Theory and Cryptography 2013: 3-18 - [c23]Nicolas Buchmann, Harald Baier:
Towards a More Secure and Scalable Verifying PKI of eMRTD. EuroPKI 2013: 102-118 - [c22]Sebastian Abt, Sascha Wener, Harald Baier:
Performance Evaluation of Classification and Feature Selection Algorithms for NetFlow-based Protocol Recognition. GI-Jahrestagung 2013: 2184-2197 - [c21]Lisa Schehlmann, Harald Baier:
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes. GI-Jahrestagung 2013: 2225-2239 - [c20]Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Rybalchenko, Martin Steinebach:
Towards a Process Model for Hash Functions in Digital Forensics. ICDF2C 2013: 170-186 - [c19]Frank Breitinger, Knut Petter Astebol, Harald Baier, Christoph Busch:
mvHash-B - A New Approach for Similarity Preserving Hashing. IMF 2013: 33-44 - 2012
- [c18]Frank Breitinger, Harald Baier:
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. ICDF2C 2012: 167-182 - [c17]Sebastian Abt, Harald Baier:
Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data. INC 2012: 37-50 - [c16]Frank Breitinger, Harald Baier:
Properties of a similarity preserving hash function and their realization in sdhash. ISSA 2012: 1-8 - [c15]Harald Baier, Achim Brand:
On the Investigation of Application Specific Data within Digital Forensics. WDFIA 2012: 38-54 - 2011
- [c14]Sebastian Abt, Christoph Busch, Harald Baier:
A quality score honoring approach to semantic conformance assessment of minutiae-based feature extractors. BIOSIG 2011: 21-32 - [c13]Christian Maaser, Harald Baier:
A concept for monitoring self-transforming code using memory page access control management. ICCST 2011: 1-7 - [c12]Frank Breitinger, Harald Baier:
Performance Issues About Context-Triggered Piecewise Hashing. ICDF2C 2011: 141-155 - [c11]Harald Baier, Frank Breitinger:
Security Aspects of Piecewise Hashing in Computer Forensics. IMF 2011: 21-36 - [c10]Assem Nazar, Mark M. Seeger, Harald Baier:
Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible Service. NordSec 2011: 189-204 - 2010
- [c9]Christoph Kemetmüller, Mark M. Seeger, Harald Baier, Christoph Busch:
Manipulating Mobile Devices with a Private GSM Base Station - A Case Study. INC 2010: 223-234 - [c8]Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch, Harald Baier:
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation. ISSA 2010
2000 – 2009
- 2009
- [c7]Harald Baier, Tobias Straub:
A Note on the Protection Level of Biometric Data in Electronic Passports. BIOSIG 2009: 189-192 - [c6]Harald Baier, Vangelis Karatsiolis:
Validity Models of Electronic Signatures and Their Enforcement in Practice. EuroPKI 2009: 255-270 - [c5]Harald Baier, Tobias Straub:
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten - Lessons Learned!? GI Jahrestagung 2009: 1717-1731 - 2004
- [c4]Tobias Straub, Harald Baier:
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications. EuroPKI 2004: 112-125 - 2003
- [j1]Harald Baier, Günter Köhler:
How to Compute the Coefficients of the Elliptic Modular Function j(z). Exp. Math. 12(1): 115-121 (2003) - 2002
- [b1]Harald Baier:
Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography. Darmstadt University of Technology, Germany, 2002, pp. 1-259 - 2001
- [c3]Harald Baier:
Efficient Computation of Singular Moduli with Application in Cryptography. FCT 2001: 71-82 - [c2]Harald Baier:
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. INDOCRYPT 2001: 99-107 - 2000
- [c1]Johannes Buchmann, Harald Baier:
Efficient Construction of Cryptographically Strong Elliptic Curves. INDOCRYPT 2000: 191-202
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint