default search action
Robert Altschaffel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Jana Dittmann, Christian Krätzer, Stefan Kiltz, Robert Altschaffel, Claus Vielhauer, Steffen Wendzel, Sandro Wefel, Holger Nitsch:
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). Sicherheit 2024: 265-269 - 2023
- [c17]Natasha Edeh, Robert Altschaffel, Karl Waedt:
Generation of Plausible Synthetic Data for Stego-Malware Detection for Inter-zone IACS Protocols. GI-Jahrestagung 2023: 2041-2050 - 2022
- [c16]Hermann Strack, Marlies Gollnick, Sebastian Karius, Meiko Lips, Sandro Wefel, Robert Altschaffel, Guido Bacharach, Matthias Gottlieb, Hans Pongratz, Wolfgang Radenbach, Arn Waßmann:
Digitization of (Higher) Education Processes: Innovations, Security and Standards. ENIS 2022: 22-33 - [c15]Stefan Kiltz, Robert Altschaffel, Jana Dittmann:
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics. IH&MMSec 2022: 107-112 - [c14]Hermann Strack, Sebastian Karius, Marlies Gollnick, Meiko Lips, Sandro Wefel, Robert Altschaffel:
Preservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS. Open Identity Summit 2022: 125-130 - 2021
- [c13]Robert Altschaffel, Ivo Hempel, Oliver Keil, Josef Schindler, Martin Szemkus, Jana Dittmann, Matthias Lange, Karl Waedt, Yongjian Ding:
Supporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling. GI-Jahrestagung 2021: 1759-1769 - [c12]Robert Altschaffel, Jonas Hielscher, Stefan Kiltz, Jana Dittmann:
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences. IH&MMSec 2021: 23-33 - 2020
- [b1]Robert Altschaffel:
Computer forensics in cyber-physical systems: applying existing forensic knowledge and procedures from classical IT to automation and automotive. Otto-von-Guericke University Magdeburg, Germany, 2020
2010 – 2019
- 2019
- [c11]Robert Altschaffel, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Digital Forensics in Industrial Control Systems. SAFECOMP 2019: 128-136 - 2017
- [c10]Kevin Lamshöft, Robert Altschaffel, Jana Dittmann:
Adapting Organic Computing Architectures to an Automotive Environment to Increase Safety & Security. Automotive - Safety & Security 2017: 103-119 - 2015
- [c9]Robert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann:
Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions. SAFECOMP 2015: 47-58 - 2014
- [c8]Robert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann:
Beyond mileage: Towards more secure techniques to assess the fitness levels of smart cars. ICCVE 2014: 149-154 - [c7]Robert Altschaffel, Jana Dittmann, Christian Krätzer, Stefan Kiltz:
A Hierarchical Model for the Description of Internet-Based Communication. IMF 2014: 85-94 - 2013
- [c6]Robert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application. IMF 2013: 113-121 - 2011
- [c5]Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. IWDW 2011: 321-335 - [c4]Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann:
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario. MM&Sec 2011: 93-102 - 2010
- [c3]Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Modelling watermark communication protocols using the CASPER modelling language. MM&Sec 2010: 107-116 - [c2]Stefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann:
A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition. Sicherheit 2010: 93-104
2000 – 2009
- 2009
- [c1]Robert Altschaffel, Stefan Kiltz, Jana Dittmann:
From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. IMF 2009: 54-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint