Katrin Franke

According to our database1, Katrin Franke
  • authored at least 63 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Internet of Things security and forensics: Challenges and opportunities.
Future Generation Comp. Syst., 2018

2017
Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness.
Appl. Soft Comput., 2017

Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks.
Proceedings of the International Conference on Computational Science, 2017

2016
The functional diversity of retinal ganglion cells in the mouse.
Nature, 2016

Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps.
Int. J. Hybrid Intell. Syst., 2016

Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy.
Int. J. Hybrid Intell. Syst., 2016

Automated intelligent multinomial classification of malware species using dynamic behavioural analysis.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Understanding Neuro-Fuzzy on a class of multinomial malware detection problems.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Combining expert knowledge with automatic feature extraction for reliable web attack detection.
Security and Communication Networks, 2015

Editorial for big data issue.
Digital Investigation, 2015

Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications.
Proceedings of the Advances in Computational Intelligence, 2015

Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications.
Proceedings of the Hybrid Intelligent Systems, 2015

A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection.
Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), 2015

2014
Practical use of Approximate Hash Based Matching in digital investigations.
Digital Investigation, 2014

Privacy-respecting digital investigation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
Enhancing the effectiveness of Web Application Firewalls by generic feature selection.
Logic Journal of the IGPL, 2013

2012
Cursive Handwritten Segmentation and Recognition for Instructional Videos.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

A General Lp-norm Support Vector Machine via Mixed 0-1 Programming.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

Off-line signature verification using G-SURF.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Generic feature selection measure for botnet malware detection.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Font identification - In context of an Indic script.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Adaptive Intrusion Detection System via online machine learning.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

Similar shaped part-based character recognition using G-SURF.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

Clustering document fragments using background color and texture information.
Proceedings of the Document Recognition and Retrieval XIX, 2012

Text Independent Writer Identification for Oriya Script.
Proceedings of the 10th IAPR International Workshop on Document Analysis Systems, 2012

2011
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
IJMCMC, 2011

A new ensemble-feature-selection framework for intrusion detection.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

Identifying Malware Using Cross-Evidence Correlation.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Identification of Indic Scripts on Torn-Documents.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Application of the Generic Feature Selection Measure in Detection of Web Attacks.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Structural handwritten and machine print classification for sparse content and arbitrary oriented document fragments.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Comparison of Feature-Selection Methods for Intrusion Detection.
Proceedings of the Computer Network Security, 2010

Towards a Generic Feature-Selection Measure for Intrusion Detection.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Verification of Video Source Camera Competition (CAMCOM 2010).
Proceedings of the Recognizing Patterns in Signals, Speech, Images and Videos, 2010

Script Identification - A Han and Roman Script Perspective.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Text Independent Writer Identification for Bengali Script.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Document-Zone Classification in Torn Documents.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
Proceedings of the ARES 2010, 2010

2009
Analysis of Authentic Signatures and Forgeries.
Proceedings of the Computational Forensics, Third International Workshop, 2009

Advancing Digital Forensics.
Proceedings of the Information Assurance and Security Education and Training, 2009

Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Two-stage Approach for Word-wise Script Identification.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

ICDAR 2009 Signature Verification Competition.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

2008
Computational Forensics: An Overview.
Proceedings of the Computational Forensics, Second International Workshop, 2008

Stroke-Morphology Analysis Using Super-Imposed Writing Movements.
Proceedings of the Computational Forensics, Second International Workshop, 2008

A Color Morphology based on Pareto-dominance Relation and Hypervolume Measure.
Proceedings of the 4th European Conference on Colour in Graphics, 2008

2007
Using codebooks of fragmented connected-component contours in forensic and historic writer identification.
Pattern Recognition Letters, 2007

Pareto-dominated Hypervolume Measure: An Alternative Approach to Color Morphology.
Proceedings of the 7th International Conference on Hybrid Intelligent Systems (HIS 2007), 2007

A New Two-Stage Search Procedure for Misuse Detection.
Proceedings of the Future Generation Communication and Networking, 2007

Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Computational Forensics: Towards Hybrid-Intelligent Crime Investigation.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2004
Automatic writer identification using fragmented connected-component contours.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

Ink-deposition model: the relation of writing and ink deposition processes.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

The WANDAML markup language for digital document annotation.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

Biometric User Authentication on Smart Cards by Means of Handwritten Signatures.
Proceedings of the Biometric Authentication, First International Conference, 2004

2003
WANDA: A generic Framework applied in Forensic Handwriting Analysis and Writer Identification.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

Biometrische Benutzerauthentisierung auf Smartcards mittels handschriftlicher Unterschriften.
Proceedings of the INFORMATIK 2003 - Mit Sicherheit Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", 29. September, 2003

2002
Ink texture analysis for writer identification.
Proceedings of the Eighth International Workshop on Frontiers in Handwriting Recognition, 2002

Static Signature Verification Employing a Kosko-Neuro-fuzzy Approach.
Proceedings of the Advances in Soft Computing, 2002

Soft-Biometrics: Soft-Computing Technologies for Biometric-Applications.
Proceedings of the Advances in Soft Computing, 2002

2001
A computer-based system to support forensic studies on handwritten documents.
IJDAR, 2001

2000
Fuzzy Image Processing by Using Dubois and Prade Fuzzy Norms.
Proceedings of the 15th International Conference on Pattern Recognition, 2000


  Loading...