default search action
Frank Breitinger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Samuele Mombelli, James R. Lyle, Frank Breitinger:
FAIRness in digital forensics datasets' metadata - and how to improve it. Forensic Sci. Int. Digit. Investig. 48: 301681 (2024) - [j53]Gaëtan Michelet, Frank Breitinger:
ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models. Forensic Sci. Int. Digit. Investig. 48: 301683 (2024) - [j52]Frank Breitinger, Jan-Niclas Hilgert, Christopher Hargreaves, John Sheppard, Rebekah Overdorf, Mark Scanlon:
DFRWS EU 10-year review and future directions in Digital Forensic Research. Forensic Sci. Int. Digit. Investig. 48: 301685 (2024) - [j51]Lisa Marie Dreier, Céline Vanini, Christopher James Hargreaves, Frank Breitinger, Felix C. Freiling:
Beyond timestamps: Integrating implicit timing information into digital forensic timelines. Forensic Sci. Int. Digit. Investig. 49: 301755 (2024) - [j50]Céline Vanini, Christopher James Hargreaves, Harm van Beek, Frank Breitinger:
Was the clock correct? Exploring timestamp interpretation through time anchors for digital forensic event reconstruction. Forensic Sci. Int. Digit. Investig. 49: 301759 (2024) - [j49]Jenny Ottmann, Frank Breitinger, Felix C. Freiling:
An Experimental Assessment of Inconsistencies in Memory Forensics. ACM Trans. Priv. Secur. 27(1): 2:1-2:29 (2024) - [i9]Akila Wickramasekara, Frank Breitinger, Mark Scanlon:
SoK: Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency. CoRR abs/2402.19366 (2024) - 2023
- [j48]Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard:
ChatGPT for digital forensic investigation: The good, the bad, and the unknown. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301609 (2023) - [j47]Thomas Göbel, Harald Baier, Frank Breitinger:
Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable. DTRAP 4(3): 38:1-38:18 (2023) - [j46]Johannes Schneider, Frank Breitinger:
Towards AI forensics: Did the artificial intelligence system do it? J. Inf. Secur. Appl. 76: 103517 (2023) - [i8]Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard:
ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown. CoRR abs/2307.10195 (2023) - [i7]Peter Coates, Frank Breitinger:
Identifying document similarity using a fast estimation of the Levenshtein Distance based on compression and signatures. CoRR abs/2307.11496 (2023) - [i6]Jenny Ottmann, Üsame Cengiz, Frank Breitinger, Felix C. Freiling:
As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous Consistency. CoRR abs/2307.12060 (2023) - [i5]Frank Breitinger, Jan-Niclas Hilgert, Christopher Hargreaves, John Sheppard, Rebekah Overdorf, Mark Scanlon:
DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research. CoRR abs/2312.11292 (2023) - [i4]Gaëtan Michelet, Frank Breitinger:
ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (Local) Large Language Models. CoRR abs/2312.14607 (2023) - 2022
- [j45]Saleh H. Aldaajeh, Heba Saleous, Saed Alrabaee, Ezedin Barka, Frank Breitinger, Kim-Kwang Raymond Choo:
The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119: 102754 (2022) - [j44]Thomas Göbel, Frieder Uhlig, Harald Baier, Frank Breitinger:
FRASHER - A framework for automated evaluation of similarity hashing. Digit. Investig. 42(Supplement): 301407 (2022) - [j43]Frank Breitinger, Xiaolu Zhang, Darren Quick:
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage. Digit. Investig. 43(Supplement): 301443 (2022) - [j42]Jan Huck, Frank Breitinger:
Wake Up Digital Forensics' Community and Help Combat Ransomware. IEEE Secur. Priv. 20(4): 61-70 (2022) - [i3]Leo Irudayam, Frank Breitinger:
Teaching Blockchain in K9-12: Instruction materials and their assessment. CoRR abs/2211.05933 (2022) - 2021
- [j41]Miguel Martín-Pérez, Ricardo J. Rodríguez, Frank Breitinger:
Bringing order to approximate matching: Classification and attacks on similarity digest algorithms. Digit. Investig. 36 Supplement: 301120 (2021) - [j40]Radek Hranický, Frank Breitinger, Ondrej Rysavý, John Sheppard, Florin Schaedler, Holger Morgenstern, Simon Malik:
What do incident response practitioners need to know? A skillmap for the years ahead. Digit. Investig. 37 Supplement: 301184 (2021) - [j39]Stephen O'Shaughnessy, Frank Breitinger:
Malware family classification via efficient Huffman features. Digit. Investig. 37 Supplement: 301192 (2021) - [j38]Xiaolu Zhang, Frank Breitinger, Engelbert Luechinger, Stephen O'Shaughnessy:
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations. Digit. Investig. 39: 301285 (2021) - [j37]Frank Breitinger, Ryan Tully-Doyle, Kristen Przyborski, Lauren Beck, Ronald S. Harichandran:
First year students' experience in a Cyber World course - an evaluation. Educ. Inf. Technol. 26(1): 1069-1087 (2021) - [j36]Frank Breitinger, Ryan Tully-Doyle, Kristen Przyborski, Lauren Beck, Ronald S. Harichandran:
Correction to: first year students' experience in a CyberWorld course - an evaluation. Educ. Inf. Technol. 26(1): 1089 (2021) - 2020
- [j35]Frank Breitinger, Ryan Tully-Doyle, Courtney Hassenfeldt:
A survey on smartphone user's security choices, awareness and education. Comput. Secur. 88 (2020) - [j34]Vitor Hugo Galhardo Moia, Frank Breitinger, Marco Aurélio Amaral Henriques:
The impact of excluding common blocks for approximate matching. Comput. Secur. 89 (2020) - [j33]David Palmbach, Frank Breitinger:
Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability. Digit. Investig. 32 Supplement: 300920 (2020) - [j32]Tina Wu, Frank Breitinger, Stephen O'Shaughnessy:
Digital forensic tools: Recent advances and enhancing the status quo. Digit. Investig. 34: 300999 (2020) - [j31]Jan Pluskal, Frank Breitinger, Ondrej Rysavý:
Netfox detective: A novel open-source network forensics analysis tool. Digit. Investig. 35: 301019 (2020) - [i2]Johannes Schneider, Frank Breitinger:
Towards AI Forensics: Did the Artificial Intelligence System Do It? Why? CoRR abs/2005.13635 (2020)
2010 – 2019
- 2019
- [j30]Mark Debinski, Frank Breitinger, Parvathy Mohan:
Timeline2GUI: A Log2Timeline CSV parser and training scenarios. Digit. Investig. 28(Supplement): 34-43 (2019) - [j29]Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger:
On efficiency of artifact lookup strategies in digital forensics. Digit. Investig. 28 Supplement: S116-S125 (2019) - [j28]Peter Casey, Rebecca Lindsay-Decusati, Ibrahim M. Baggili, Frank Breitinger:
Inception: Virtual Space in Memory Space in Real Space - Memory Forensics of Immersive Virtual Reality with the HTC Vive. Digit. Investig. 29 Supplement: S13-S21 (2019) - [j27]Joseph Ricci, Frank Breitinger, Ibrahim M. Baggili:
Survey results on adults and cybersecurity education. Educ. Inf. Technol. 24(1): 231-249 (2019) - [j26]Joseph Ricci, Ibrahim M. Baggili, Frank Breitinger:
Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? IEEE Secur. Priv. 17(1): 34-42 (2019) - [c22]Tina Wu, Frank Breitinger, Ibrahim M. Baggili:
IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions. ARES 2019: 46:1-46:15 - [e2]Frank Breitinger, Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 259, Springer 2019, ISBN 978-3-030-05486-1 [contents] - 2018
- [j25]Cinthya Grajeda, Laura Sánchez, Ibrahim M. Baggili, Devon Clark, Frank Breitinger:
Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digit. Investig. 26 Supplement: S47-S58 (2018) - [j24]David Lillis, Frank Breitinger, Mark Scanlon:
Hierarchical Bloom Filter Trees for Approximate Matching. J. Digit. Forensics Secur. Law 13(1): 81-96 (2018) - [c21]Laoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger:
Digital Forensics in the Next Five Years. ARES 2018: 46:1-46:14 - [c20]Trevor Haigh, Frank Breitinger, Ibrahim M. Baggili:
If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. ICDF2C 2018: 45-65 - [c19]Robert Schmicker, Frank Breitinger, Ibrahim M. Baggili:
AndroParse - An Android Feature Extraction Framework and Dataset. ICDF2C 2018: 66-88 - 2017
- [j23]Xiaolu Zhang, Ibrahim M. Baggili, Frank Breitinger:
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. Comput. Secur. 70: 516-531 (2017) - [j22]George Denton, Filip Karpísek, Frank Breitinger, Ibrahim M. Baggili:
Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digit. Investig. 22 Supplement: S26-S38 (2017) - [j21]Devon Clark, Christopher Meffert, Ibrahim M. Baggili, Frank Breitinger:
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digit. Investig. 22 Supplement: S3-S14 (2017) - [j20]Cinthya Grajeda, Frank Breitinger, Ibrahim M. Baggili:
Availability of datasets for digital forensics - And what is missing. Digit. Investig. 22 Supplement: S94-S105 (2017) - [j19]Jason Moore, Ibrahim M. Baggili, Frank Breitinger:
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. J. Digit. Forensics Secur. Law 12(1): 15-30 (2017) - [c18]Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger:
Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. ARES 2017: 56:1-56:11 - [c17]David Lillis, Frank Breitinger, Mark Scanlon:
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees. ICDF2C 2017: 144-157 - [c16]Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim M. Baggili:
An Overview of the Usage of Default Passwords. ICDF2C 2017: 195-203 - [i1]David Lillis, Frank Breitinger, Mark Scanlon:
Hierarchical Bloom Filter Trees for Approximate Matching. CoRR abs/1712.04544 (2017) - 2016
- [j18]Vikram S. Harichandran, Frank Breitinger, Ibrahim M. Baggili, Andrew Marrington:
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Comput. Secur. 57: 1-13 (2016) - [j17]Xiaolu Zhang, Frank Breitinger, Ibrahim M. Baggili:
Rapid Android Parser for Investigating DEX files (RAPID). Digit. Investig. 17: 28-39 (2016) - [j16]Vikram S. Harichandran, Daniel Walnycky, Ibrahim M. Baggili, Frank Breitinger:
CuFA: A more formal definition for digital forensic artifacts. Digit. Investig. 18 Supplement: S125-S137 (2016) - [j15]Kevin J. Conlan, Ibrahim M. Baggili, Frank Breitinger:
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digit. Investig. 18 Supplement: S66-S75 (2016) - [j14]Christopher Meffert, Ibrahim M. Baggili, Frank Breitinger:
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digit. Investig. 18 Supplement: S87-S96 (2016) - [j13]Samer Al-khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim M. Baggili, Frank Breitinger:
Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. J. Digit. Forensics Secur. Law 11(2): 7-20 (2016) - [j12]Vikram S. Harichandran, Frank Breitinger, Ibrahim M. Baggili:
Bytewise Approximate Matching: The Good, The Bad, and The Unknown. J. Digit. Forensics Secur. Law 11(2): 59-78 (2016) - [j11]Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee:
Towards Syntactic Approximate Matching - A Pre-Processing Experiment. J. Digit. Forensics Secur. Law 11(2): 97-110 (2016) - 2015
- [j10]Daniel Walnycky, Ibrahim M. Baggili, Andrew Marrington, Jason Moore, Frank Breitinger:
Network and device forensic analysis of Android social-messaging applications. Digit. Investig. 14 Supplement 1: S77-S84 (2015) - [j9]Filip Karpísek, Ibrahim M. Baggili, Frank Breitinger:
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digit. Investig. 15: 110-118 (2015) - [c15]Ibrahim M. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee:
Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. ARES 2015: 303-311 - [c14]Ibrahim M. Baggili, Frank Breitinger:
Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. AAAI Spring Symposia 2015 - [c13]Christian Rathgeb, Harald Baier, Christoph Busch, Frank Breitinger:
Towards Bloom filter-based indexing of iris biometric data. ICB 2015: 422-429 - [c12]Vikas Gupta, Frank Breitinger:
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. ICDF2C 2015: 39-52 - [e1]Joshua I. James, Frank Breitinger:
Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 157, Springer 2015, ISBN 978-3-319-25511-8 [contents] - 2014
- [b1]Frank Breitinger:
On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. Darmstadt University of Technology, Germany, 2014 - [j8]Frank Breitinger, Georgios Stivaktakis, Vassil Roussev:
Evaluating detection error trade-offs for bytewise approximate matching algorithms. Digit. Investig. 11(2): 81-89 (2014) - [j7]Frank Breitinger, Georgios Stivaktakis, Vassil Roussev:
Erratum to "Evaluating detection error trade-offs for bytewise approximate matching algorithms" [Digit Invest 11 (2) 81-89]. Digit. Investig. 11(4): 363 (2014) - [j6]Frank Breitinger, Harald Baier, Douglas White:
On the database lookup problem of approximate matching. Digit. Investig. 11(Supplement 1): S1-S9 (2014) - [j5]Frank Breitinger, Vassil Roussev:
Automated evaluation of approximate matching algorithms on real data. Digit. Investig. 11(Supplement 1): S10-S17 (2014) - [j4]Christian Rathgeb, Frank Breitinger, Christoph Busch, Harald Baier:
On application of bloom filters to iris biometrics. IET Biom. 3(4): 207-218 (2014) - [j3]Frank Breitinger, Ibrahim M. Baggili:
File Detection On Network Traffic Using Approximate Matching. J. Digit. Forensics Secur. Law 9(2): 23-36 (2014) - [j2]Frank Breitinger, Christian Rathgeb, Harald Baier:
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach. J. Digit. Forensics Secur. Law 9(2): 155-166 (2014) - [c11]Frank Breitinger, Georg Ziroff, Steffen Lange, Harald Baier:
Similarity Hashing Based on Levenshtein Distances. IFIP Int. Conf. Digital Forensics 2014: 133-147 - [c10]Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, Michael Seefried:
Using Approximate Matching to Reduce the Volume of Digital Data. IFIP Int. Conf. Digital Forensics 2014: 149-163 - 2013
- [j1]Frank Breitinger, Georgios Stivaktakis, Harald Baier:
FRASH: A framework to test algorithms of similarity hashing. Digit. Investig. 10(Supplement): S50-S58 (2013) - [c9]Christian Rathgeb, Frank Breitinger, Christoph Busch:
Alignment-free cancelable iris biometric templates based on adaptive bloom filters. ICB 2013: 1-8 - [c8]Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Rybalchenko, Martin Steinebach:
Towards a Process Model for Hash Functions in Digital Forensics. ICDF2C 2013: 170-186 - [c7]Frank Breitinger, Kaloyan Petrov:
Reducing the Time Required for Hashing Operations. IFIP Int. Conf. Digital Forensics 2013: 101-117 - [c6]Frank Breitinger, Knut Petter Astebol, Harald Baier, Christoph Busch:
mvHash-B - A New Approach for Similarity Preserving Hashing. IMF 2013: 33-44 - 2012
- [c5]Frank Breitinger, Harald Baier:
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. ICDF2C 2012: 167-182 - [c4]Frank Breitinger, Harald Baier:
Properties of a similarity preserving hash function and their realization in sdhash. ISSA 2012: 1-8 - 2011
- [c3]Frank Breitinger, Harald Baier:
Performance Issues About Context-Triggered Piecewise Hashing. ICDF2C 2011: 141-155 - [c2]Harald Baier, Frank Breitinger:
Security Aspects of Piecewise Hashing in Computer Forensics. IMF 2011: 21-36 - 2010
- [c1]Frank Breitinger, Claudia Nickel:
User Survey on Phone Security and Usage. BIOSIG 2010: 139-144
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint