default search action
Katrin Franke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Evidence in the fog - Triage in fog computing systems. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301506 (2023) - [j22]Radina Stoykova, Katrin Franke:
Reliability validation enabling framework (RVEF) for digital forensics in criminal investigations. Forensic Sci. Int. Digit. Investig. 45: 301554 (2023) - [c69]Katrin Franke:
Advancing Knowledge Discoveries in Criminal Investigations with Semantic Textual Similarity. JURIX 2023: 269-274 - [c68]Pawel A. Pierzchlewicz, Konstantin Willeke, Arne Nix, Pavithra Elumalai, Kelli Restivo, Tori Shinn, Cate Nealley, Gabrielle Rodriguez, Saumil S. Patel, Katrin Franke, Andreas S. Tolias, Fabian H. Sinz:
Energy Guided Diffusion for Generating Neurally Exciting Images. NeurIPS 2023 - 2022
- [j21]Radina Stoykova, Rune Nordvik, Munnazzar Ahmed, Katrin Franke, Stefan Axelsson, Fergus Toolan:
Legal and technical questions of file system reverse engineering. Comput. Law Secur. Rev. 46: 105725 (2022) - [j20]Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Quantifying data volatility for IoT forensics with examples from Contiki OS. Digit. Investig. 40(Supplement): 301343 (2022) - [j19]Radina Stoykova, Stig Andersen, Katrin Franke, Stefan Axelsson:
Reliability assessment of digital forensic investigations in the Norwegian police. Digit. Investig. 40(Supplement): 301351 (2022) - 2021
- [j18]Rune Nordvik, Radina Stoykova, Katrin Franke, Stefan Axelsson, Fergus Toolan:
Reliability validation for file system interpretation. Digit. Investig. 37: 301174 (2021) - [j17]Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Coffee forensics - Reconstructing data in IoT devices running Contiki OS. Digit. Investig. 37 Supplement: 301188 (2021) - [c67]Qi Zhang, Ali Dehghantanha, Katrin Franke, Reza M. Parizi:
Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges. HICSS 2021: 1-3 - [c66]Dominic Gonschorek, Larissa Höfling, Klaudia P. Szatko, Katrin Franke, Timm Schubert, Benjamin A. Dunn, Philipp Berens, David A. Klindt, Thomas Euler:
Removing Inter-Experimental Variability from Functional Data in Systems Neuroscience. NeurIPS 2021: 3706-3719 - 2020
- [j16]Rune Nordvik, Kyle Porter, Fergus Toolan, Stefan Axelsson, Katrin Franke:
Generic Metadata Time Carving. Digit. Investig. 33 Supplement: 301005 (2020) - [c65]Amit Kumar Meena, Neminath Hubballi, Yogendra Singh, Vimal Bhatia, Katrin Franke:
Network Security Systems Log Analysis for Trends and Insights: A Case Study. IEEE ANTS 2020: 1-6 - [c64]Linn-Mari Kristiansen, Vinti Agarwal, Katrin Franke, Raj Sanjay Shah:
CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning. IEEE BigData 2020: 2299-2308 - [c63]Pratibha Khandait, Neminath Hubballi, Katrin Franke:
POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters. AsiaCCS 2020: 889-891 - [c62]Jan William Johnsen, Katrin Franke:
Identifying Proficient Cybercriminals Through Text and Network Analysis. ISI 2020: 1-7 - [c61]Cornelius Schröder, David A. Klindt, Sarah Strauß, Katrin Franke, Matthias Bethge, Thomas Euler, Philipp Berens:
System Identification with Biophysical Constraints: A Circuit Model of the Inner Retina. NeurIPS 2020 - [c60]Radina Stoykova, Katrin Franke:
Standard Representation for Digital Forensic Processing. SADFE 2020: 46-56
2010 – 2019
- 2019
- [j15]Luke E. Rogerson, Zhijian Zhao, Katrin Franke, Thomas Euler, Philipp Berens:
Bayesian hypothesis testing and experimental design for two-photon imaging data. PLoS Comput. Biol. 15(8) (2019) - [j14]Luke E. Rogerson, Zhijian Zhao, Katrin Franke, Thomas Euler, Philipp Berens:
Correction: Bayesian hypothesis testing and experimental design for two-photon imaging data. PLoS Comput. Biol. 15(10) (2019) - [c59]Vinti Agarwal, Neminath Hubballi, Ambika Shrestha Chitrakar, Katrin Franke:
Identifying Anomalous HTTP Traffic with Association Rule Mining. ANTS 2019: 1-6 - [c58]Jan William Johnsen, Katrin Franke:
The impact of preprocessing in natural language for open source intelligence and criminal investigation. IEEE BigData 2019: 4248-4254 - 2018
- [j13]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things security and forensics: Challenges and opportunities. Future Gener. Comput. Syst. 78: 544-546 (2018) - [c57]Isuf Deliu, Carl Leichter, Katrin Franke:
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process using Support Vector Machines and Latent Dirichlet Allocation. IEEE BigData 2018: 5008-5013 - [c56]Jan William Johnsen, Katrin Franke:
Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces. ICCS (3) 2018: 379-386 - [i2]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things Security and Forensics: Challenges and Opportunities. CoRR abs/1807.10438 (2018) - [i1]Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke:
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial. CoRR abs/1808.01201 (2018) - 2017
- [j12]Andrii Shalaginov, Katrin Franke:
Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness. Appl. Soft Comput. 52: 359-375 (2017) - [c55]Isuf Deliu, Carl Leichter, Katrin Franke:
Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networks. IEEE BigData 2017: 3648-3656 - [c54]Andrii Shalaginov, Jan William Johnsen, Katrin Franke:
Cyber crime investigations in the era of big data. IEEE BigData 2017: 3672-3676 - [c53]Jan William Johnsen, Katrin Franke:
Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks. ICCS 2017: 2388-2392 - [c52]Andrii Shalaginov, Katrin Franke:
A deep neuro-fuzzy method for multi-label malware classification and fuzzy rules extraction. SSCI 2017: 1-8 - 2016
- [j11]Andrii Shalaginov, Katrin Franke:
Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy. Int. J. Hybrid Intell. Syst. 13(1): 15-26 (2016) - [j10]Andrii Shalaginov, Katrin Franke:
Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps. Int. J. Hybrid Intell. Syst. 13(3-4): 195-206 (2016) - [j9]Tom Baden, Philipp Berens, Katrin Franke, Miroslav Román Rosón, Matthias Bethge, Thomas Euler:
The functional diversity of retinal ganglion cells in the mouse. Nat. 529(7586): 345-350 (2016) - [c51]Andrii Shalaginov, Lars Strande Grini, Katrin Franke:
Understanding Neuro-Fuzzy on a class of multinomial malware detection problems. IJCNN 2016: 684-691 - [c50]Andrii Shalaginov, Katrin Franke:
Automated intelligent multinomial classification of malware species using dynamic behavioural analysis. PST 2016: 70-77 - [c49]Lars Strande Grini, Andrii Shalaginov, Katrin Franke:
Study of Soft Computing Methods for Large-Scale Multinomial Malware Types and Families Detection. WCSC 2016: 337-350 - 2015
- [j8]Zeno J. M. H. Geradts, Katrin Franke:
Editorial for big data issue. Digit. Investig. 15: 18-19 (2015) - [j7]Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Álvarez, Katrin Franke:
Combining expert knowledge with automatic feature extraction for reliable web attack detection. Secur. Commun. Networks 8(16): 2750-2767 (2015) - [c48]Andrii Shalaginov, Katrin Franke:
A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection. IFSA-EUSFLAT 2015 - [c47]Andrii Shalaginov, Katrin Franke:
Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications. HIS 2015: 199-210 - [c46]Andrii Shalaginov, Katrin Franke:
A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications. IWANN (2) 2015: 549-563 - [c45]Andrii Shalaginov, Katrin Franke:
Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations. SoCPaR 2015: 31-36 - 2014
- [j6]Petter Christian Bjelland, Katrin Franke, André Årnes:
Practical use of Approximate Hash Based Matching in digital investigations. Digit. Investig. 11(Supplement 1): S18-S26 (2014) - [c44]Ali Dehghantanha, Katrin Franke:
Privacy-respecting digital investigation. PST 2014: 129-138 - 2013
- [j5]Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Katrin Franke, Slobodan Petrovic:
Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Log. J. IGPL 21(4): 560-570 (2013) - 2012
- [c43]Sukalpa Chanda, Katrin Franke, Umapada Pal:
Text Independent Writer Identification for Oriya Script. Document Analysis Systems 2012: 369-373 - [c42]Sukalpa Chanda, Katrin Franke, Umapada Pal:
Clustering document fragments using background color and texture information. DRR 2012: 82970U - [c41]Sukalpa Chanda, Umapada Pal, Katrin Franke:
Similar shaped part-based character recognition using G-SURF. HIS 2012: 179-184 - [c40]Hai Thanh Nguyen, Katrin Franke:
Adaptive Intrusion Detection System via online machine learning. HIS 2012: 271-277 - [c39]Sukalpa Chanda, Umapada Pal, Katrin Franke:
Font identification - In context of an Indic script. ICPR 2012: 1655-1658 - [c38]Srikanta Pal, Sukalpa Chanda, Umapada Pal, Katrin Franke, Michael Blumenstein:
Off-line signature verification using G-SURF. ISDA 2012: 586-591 - [c37]Peter Ekstrand Berg, Katrin Franke, Hai Thanh Nguyen:
Generic feature selection measure for botnet malware detection. ISDA 2012: 711-717 - [c36]Hai Thanh Nguyen, Katrin Franke:
A General Lp-norm Support Vector Machine via Mixed 0-1 Programming. MLDM 2012: 40-49 - [c35]Ali Shariq Imran, Sukalpa Chanda, Faouzi Alaya Cheikh, Katrin Franke, Umapada Pal:
Cursive Handwritten Segmentation and Recognition for Instructional Videos. SITIS 2012: 155-160 - 2011
- [j4]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. Int. J. Mob. Comput. Multim. Commun. 3(1): 21-34 (2011) - [c34]Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Slobodan Petrovic, Katrin Franke:
Application of the Generic Feature Selection Measure in Detection of Web Attacks. CISIS 2011: 25-32 - [c33]Sukalpa Chanda, Katrin Franke, Umapada Pal:
Identification of Indic Scripts on Torn-Documents. ICDAR 2011: 713-717 - [c32]Anders Flaglien, Katrin Franke, André Årnes:
Identifying Malware Using Cross-Evidence Correlation. IFIP Int. Conf. Digital Forensics 2011: 169-182 - [c31]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
A new ensemble-feature-selection framework for intrusion detection. ISDA 2011: 213-218 - [e5]Hiroshi Sako, Katrin Franke, Shuji Saitoh:
Computational Forensics - 4th International Workshop, IWCF 2010, Tokyo, Japan, November 11-12, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6540, Springer 2011, ISBN 978-3-642-19375-0 [contents] - 2010
- [c30]Hai Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. ARES 2010: 17-24 - [c29]Sukalpa Chanda, Katrin Franke, Umapada Pal:
Document-Zone Classification in Torn Documents. ICFHR 2010: 25-30 - [c28]Wiger van Houten, Zeno J. M. H. Geradts, Katrin Franke, Cor J. Veenman:
Verification of Video Source Camera Competition (CAMCOM 2010). ICPR Contests 2010: 22-28 - [c27]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Towards a Generic Feature-Selection Measure for Intrusion Detection. ICPR 2010: 1529-1532 - [c26]Sukalpa Chanda, Katrin Franke, Umapada Pal, Tetsushi Wakabayashi:
Text Independent Writer Identification for Bengali Script. ICPR 2010: 2005-2008 - [c25]Sukalpa Chanda, Umapada Pal, Katrin Franke, Fumitaka Kimura:
Script Identification - A Han and Roman Script Perspective. ICPR 2010: 2708-2711 - [c24]Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke:
A Comparison of Feature-Selection Methods for Intrusion Detection. MMM-ACNS 2010: 242-255 - [c23]Sukalpa Chanda, Katrin Franke, Umapada Pal:
Structural handwritten and machine print classification for sparse content and arbitrary oriented document fragments. SAC 2010: 18-22
2000 – 2009
- 2009
- [c22]Sukalpa Chanda, Srikanta Pal, Katrin Franke, Umapada Pal:
Two-stage Approach for Word-wise Script Identification. ICDAR 2009: 926-930 - [c21]Katrin Franke:
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations. ICDAR 2009: 1310-1314 - [c20]Vivian L. Blankers, C. Elisa van den Heuvel, Katrin Franke, Louis Vuurpijl:
ICDAR 2009 Signature Verification Competition. ICDAR 2009: 1403-1407 - [c19]Katrin Franke, Erik Hjelmås, Stephen D. Wolthusen:
Advancing Digital Forensics. World Conference on Information Security Education 2009: 288-295 - [c18]Katrin Franke:
Analysis of Authentic Signatures and Forgeries. IWCF 2009: 150-164 - [e4]Zeno J. M. H. Geradts, Katrin Franke, Cor J. Veenman:
Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings. Lecture Notes in Computer Science 5718, Springer 2009, ISBN 978-3-642-03520-3 [contents] - 2008
- [c17]Mario Köppen, Katrin Franke:
A Color Morphology based on Pareto-dominance Relation and Hypervolume Measure. CGIV/MCS 2008: 423-426 - [c16]Katrin Franke, Sargur N. Srihari:
Computational Forensics: An Overview. IWCF 2008: 1-10 - [c15]Katrin Franke:
Stroke-Morphology Analysis Using Super-Imposed Writing Movements. IWCF 2008: 204-217 - [e3]Sargur N. Srihari, Katrin Franke:
Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings. Lecture Notes in Computer Science 5158, Springer 2008, ISBN 978-3-540-85302-2 [contents] - 2007
- [j3]Lambert Schomaker, Katrin Franke, Marius Bulacu:
Using codebooks of fragmented connected-component contours in forensic and historic writer identification. Pattern Recognit. Lett. 28(6): 719-727 (2007) - [c14]Katrin Franke, Sargur N. Srihari:
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation. IAS 2007: 383-386 - [c13]Slobodan Petrovic, Katrin Franke:
Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. IAS 2007: 405-410 - [c12]Slobodan Petrovic, Katrin Franke:
A New Two-Stage Search Procedure for Misuse Detection. FGCN (2) 2007: 418-422 - [c11]Mario Köppen, Katrin Franke:
Pareto-dominated Hypervolume Measure: An Alternative Approach to Color Morphology. HIS 2007: 234-239 - 2006
- [j2]Mario Köppen, Katrin Franke, Raul Vicente-Garcia:
Tiny GAs for image processing applications. IEEE Comput. Intell. Mag. 1(2): 17-26 (2006) - [e2]Katrin Franke, Klaus-Robert Müller, Bertram Nickolay, Ralf Schäfer:
Pattern Recognition, 28th DAGM Symposium, Berlin, Germany, September 12-14, 2006, Proceedings. Lecture Notes in Computer Science 4174, Springer 2006, ISBN 3-540-44412-2 [contents] - 2004
- [c10]Olaf Henniger, Katrin Franke:
Biometric User Authentication on Smart Cards by Means of Handwritten Signatures. ICBA 2004: 547-554 - [c9]Katrin Franke, Steffen Rose:
Ink-deposition model: the relation of writing and ink deposition processes. IWFHR 2004: 173-178 - [c8]Lambert Schomaker, Marius Bulacu, Katrin Franke:
Automatic writer identification using fragmented connected-component contours. IWFHR 2004: 185-190 - [c7]Katrin Franke, Isabelle Guyon, Lambert Schomaker, Louis Vuurpijl:
The WANDAML markup language for digital document annotation. IWFHR 2004: 563-568 - 2003
- [c6]Olaf Henniger, Katrin Franke:
Biometrische Benutzerauthentisierung auf Smartcards mittels handschriftlicher Unterschriften. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 351-362 - [c5]Katrin Franke, Lambert Schomaker, Christian Veenhuis, C. Taubenheim, Isabelle Guyon, Louis Vuurpijl, Merijn van Erp, G. Zwarts:
WANDA: A generic Framework applied in Forensic Handwriting Analysis and Writer Identification. HIS 2003: 927-938 - [e1]Ajith Abraham, Mario Köppen, Katrin Franke:
Design and Application of Hybrid Intelligent Systems, HIS03, the Third International Conference on Hybrid Intelligent Systems, Melbourne, Australia, December 14-17, 2003. Frontiers in Artificial Intelligence and Applications 105, IOS Press 2003, ISBN 1-58603-394-8 [contents] - 2002
- [c4]Katrin Franke, Javier Ruiz-del-Solar:
Soft-Biometrics: Soft-Computing Technologies for Biometric-Applications. AFSS 2002: 171-177 - [c3]Katrin Franke, Yu-Nong Zhang, Mario Köppen:
Static Signature Verification Employing a Kosko-Neuro-fuzzy Approach. AFSS 2002: 185-190 - [c2]Katrin Franke, Ottmar Bünnemeyer, Thorsten Sy:
Ink texture analysis for writer identification. IWFHR 2002: 268-273 - 2001
- [j1]Katrin Franke, Mario Köppen:
A computer-based system to support forensic studies on handwritten documents. Int. J. Document Anal. Recognit. 3(4): 218-231 (2001) - 2000
- [c1]Katrin Franke, Mario Köppen, Bertram Nickolay:
Fuzzy Image Processing by Using Dubois and Prade Fuzzy Norms. ICPR 2000: 3518-3521
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint