Martin Lambertz

Orcid: 0009-0007-1156-5807

According to our database1, Martin Lambertz authored at least 16 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Chances and Challenges of the Model Context Protocol in Digital Forensics and Incident Response.
CoRR, June, 2025

Advancing Event Reconstruction in Network Forensics: Extending and Evaluating SMB Command Fingerprinting.
Proceedings of the Digital Forensics Doctoral Symposium, 2025

Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics.
Proceedings of the Availability, Reliability and Security, 2025

2024
The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools.
DTRAP, 2024

Mount SMB.pcap: Reconstructing file systems and file operations from network traffic.
Digit. Investig., 2024

Forensic implications of stacked file systems.
Forensic Sci. Int. Digit. Investig., 2024

TLS key material identification and extraction in memory: Current state and future challenges.
Forensic Sci. Int. Digit. Investig., 2024

2023
About the applicability of Apache2 web server memory forensics.
Forensic Sci. Int. Digit. Investig., October, 2023

2022
ssdeeper: Evaluating and improving ssdeep.
Digit. Investig., 2022

2021
A forensic analysis of micromobility solutions.
Digit. Investig., 2021

2019
Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets.
Digit. Investig., 2019

2018
Resurrecting Portable Network Graphics using block generators.
Digit. Investig., 2018

Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit.
Digit. Investig., 2018

2017
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis.
Digit. Investig., 2017

2013
Resurrection: A Carver for Fragmented Files.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

2012
Applicability of crypto-based security approaches in tactical wireless multi-hop networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012


  Loading...