da/sec scientific talk

Im da/sec scientific talk werden Forschungsergebnisse, die erst kürzlich veröffentlicht wurden oder es demnächst werden, am Fachbereich Informatik präsentiert. Wir möchten mit Studenten/innen, Mitarbeitern/innen und Professoren/innen über unsere Forschung diskutieren und freuen uns auf Feedback zur Präsentation. Die scientific talks sind einerseits Ergebnispräsentationen und andererseits gegenseitige Hilfen beim Probevortragen, was jeden Studierenden betrifft, spätestens zum Studiumende.

The da/sec scientific talk is a platform for discussing recent research results of our group with our faculty of computer science. We like to share our knowledge with our students, colleagues, and professors. Please feel free to join the talks and to discuss recent gains and presentation styles with us. Our scientific talks are not only results presentations, but also presentation rehearsals. Where, at the latest in the end of studies, presentation rehearsals affect all students as well.


Upcoming talk


Archive


2024

2023


2022


2021


2020


2019


2018


2017


2016


2015


2014


List of our Scientific Afternoons, our previous event series at CASED

02.07.2014Daniel KoppTowards quantifying the IP spoofing phenomenon
02.07.2014Pascal PaulEine vergleichende Studie zu Textur Deskriptoren für Ohren-Erkennung
26.05.2014Frank BreitingerOn the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations
18.04.2014Nicolas BuchmannTowards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area
18.04.2014Anika PflugClassification of Ear Images Based on Texture Features
24.03.2014Andreas HeinemannUser Centric Security
24.03.2014Christian Rathgeb (Stefan Billeb)Efficient Two-Stage Speaker Identification
24.02.2014Lisa SchehlmannSecurity aspects of SDN
24.02.2014Johannes WagnerEffects of Severe Signal Degradation on Ear Biometrics
17.01.2014Andreas NautschSpeaker recognition
17.01.2014Lukas BielinskiNetzwerkforensik
   
16.12.2013Martin OlsenA tutorial on random forests
16.12.2013Christoph DietzelAnalyse mobiler Malware
25.11.2013Anders PedersenASM for Ear Recognition
25.11.2013Sven OssenbühlReaction strategies on anomalous events within flow-based data
18.10.2013Marta GomezFace recognition mit Bloom-Filtern
18.10.2013Sebastien GärtnerIdentifying people on their network fingerprint
30.09.2013Marius KlimmekTowards a flexible botnet simulation framework
30.09.2013Reinhard StamppEntwicklung eines Frameworks zur Synthese gutartigen Netzwerkverkehrs
26.08.2013Saad AzamFace recognition using Active Appearance Model
26.08.2013Jessica SteinbergerA FLEXible and efficient exchange format for network flow data
24.06.2013Ivan DanovModelling Blockwise Fingerprint Images with SOM
24.06.2013Nicolas BuchmannSecurity considerations on extending PACE to a biometric-based connection establishment
27.05.2013Reinhard StamppTowards a Framework for Synthesis of Benign Network Traffic
27.05.2013Raul Sanchez-Reillo (UC3M)R&D at UC3M Group for Identification Technologies (GUTI)
29.04.2013Vikas GuptaFile fragment detection on network level
29.04.2013Martin BoeckelerLandmarkdetektion fuer 3D-Gesichtserkennung
25.03.2013Christian DietzPassive Remote Detection of Network Address Translation (NAT) by using NetFlow
25.03.2013Marek DusioFingerprint Sample Quality
25.02.2013Malte WiestAutomatic Person Detection and Recognition in Surveillance Videos
25.02.2013Jessica SteinbergerIs network defense at ISP level feasible? A survey on anomaly detection and mitigation at Internet scale
28.01.2013Georgios StivaktakisFramework for testing Similarity Preserving Hash functions
28.01.2013Naser DamerMulti-Biometric Fusion
   
17.12.2012Heiko WitteA context-aware mobile biometric system
17.12.2012Anika PflugApplied Sciences or just Engineering? – Where`s the science in Biometrics?
26.11.2012Sebastian HohmannEar Recognition Using Local features
26.11.2012Simon ThurnerEntwicklung von Methoden zur Erkennung von Verschlüsselung und ihre Anwendung auf die digitale Forensik
29.10.2012Maboud Farzaneh Kaloorazi3D Ear Recognition based on Force Field Transform
29.10.2012Carmen GaißerRealization and evaluation of a command and control channel via IPv6 extension headers
29.10.2012Christopher KnöllDas Tablet in der Cloud: Forensische Untersuchung und rechtliche Handhabe anhand eines IPad“
28.08.2012Xuebing Zhou3D Face Recognition
28.08.2012Chrisitan RathgebIris Biometrics: Template Protection and Advanced Comparators
26.06.2012Sebastian AbtTowards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data
26.06.2012Ruediger Gad (FH Frankfurt a.M.)Performance Evaluation of On-Demand IP Address Assignment for Layer-2 Devices
29.05.2012Anton MakarovFingerprint quality estimation using Self-Organizing Maps
29.05.2012Arthur GervaisAttacks and defense mechanisms against industrial control systems (SCADA)
24.04.2012Frank BreitingerA Fuzzy Hashing Approach based on Random Sequences and Hamming Distance
24.04.2012Prof. Dr. Martin Kappes (FH Frankfurt)IT-Sicherheit in kleinen und mittelstaendischen Unternehmen
27.03.2012Heiko WitteBioAPI – A brief introduction
27.03.2012Claudia NickelAccelerometer-based Biometric Gait Recognition for Authentication on Smartphones
27.02.2012Pierre SchnarzBürgerbefragung zur IT-Sicherheit im Endanwenderbereich
27.02.2012Knut AsboelFuzzy Hashing based on Run-Length-Encoding using Dilation and Erosion
31.01.2012Philip Back3D Ear Detection Using Shape Index Histograms
   
19.12.2011Jesse BeckinghamSecurity Analysis of SD Hash
19.12.2011Georg ZiroffStatistical approach for fuzzy hashing
29.11.2011Julian KnauerSecurity Considerations of Password Protection of HDDs
29.11.2011Nicolas BuchmannEvaluation of the Security Infrastructure of MRTD