Tom Neubert

According to our database1, Tom Neubert authored at least 17 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover.
Digit. Investig., 2022

Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
Visual Feature Space Analyses of Face Morphing Detectors.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Extended <i>StirTrace</i> benchmarking of biometric and forensic qualities of morphed face images.
IET Biom., 2018

Generalized Benford's Law for Blind Detection of Morphed Face Images.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Automatic Generation and Detection of Visually Faultless Facial Morphs.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 6: VISAPP, Porto, Portugal, February 27, 2017

Face Morphing Detection: An Approach Based on Image Degradation Analysis.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Image pre-processing detection: Evaluation of Benford's law, spatial and frequency domain feature performance.
Proceedings of the First International Workshop on Sensing, 2016


  Loading...