default search action
York Yannikos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Jeong-Eun Choi, Karla Schäfer, York Yannikos:
Scientific Appearance in Telegram. ICWSM 2024: 2091-2096 - 2023
- [j5]York Yannikos, Julian Heeger, Martin Steinebach:
Scraping and Analyzing Data of a Large Darknet Marketplace. J. Cyber Secur. Mobil. 12(2): 161-186 (2023) - [c21]Florian Platzer, York Yannikos:
Trust Assessment of a Darknet Marketplace. TrustCom 2023: 1806-1813 - 2022
- [c20]York Yannikos, Julian Heeger, Martin Steinebach:
Data Acquisition on a Large Darknet Marketplace. ARES 2022: 53:1-53:6 - [c19]Waldemar Berchtold, Huajian Liu, Simon Bugert, York Yannikos, Jingcun Wang, Julian Heeger, Martin Steinebach, Marco Frühwein:
Recognition of objects from looted excavations by smartphone app and deep learning. MOBMU 2022: 1-4 - [p1]Sandra Wittmer, Florian Platzer, Martin Steinebach, York Yannikos:
Deanonymisierung im Tor-Netzwerk - Technische Möglichkeiten und rechtliche Rahmenbedingungen. Selbstbestimmung, Privatheit und Datenschutz 2022: 151-169 - 2021
- [c18]Julian Heeger, York Yannikos, Martin Steinebach:
exHide: Hiding Data within the exFAT File System. ARES 2021: 77:1-77:8 - [c17]York Yannikos, Quang Anh Dang, Martin Steinebach:
Comparison of Cyber Attacks on Services in the Clearnet and Darknet. IFIP Int. Conf. Digital Forensics 2021: 39-61
2010 – 2019
- 2019
- [c16]York Yannikos, Julian Heeger, Maria Brockmeyer:
An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces. ARES 2019: 50:1-50:7 - [c15]Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, York Yannikos:
Detection and Analysis of Tor Onion Services. ARES 2019: 66:1-66:10 - 2018
- [c14]York Yannikos, Annika Schäfer, Martin Steinebach:
Monitoring Product Sales in Darknet Shops. ARES 2018: 59:1-59:7 - 2017
- [c13]York Yannikos, Martin Steinebach, Michael Rettig:
Benefits of combining forensic image creation and file carving. Media Watermarking, Security, and Forensics 2017: 22-27 - 2014
- [j4]Christian Winter, Martin Steinebach, York Yannikos:
Fast indexing strategies for robust image hashes. Digit. Investig. 11(Supplement 1): S27-S35 (2014) - [c12]Martin Steinebach, Huajian Liu, York Yannikos:
Efficient Cropping-Resistant Robust Image Hashing. ARES 2014: 579-585 - [c11]Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, Michael Seefried:
Using Approximate Matching to Reduce the Volume of Digital Data. IFIP Int. Conf. Digital Forensics 2014: 149-163 - [c10]York Yannikos, Lukas Graner, Martin Steinebach, Christian Winter:
Data Corpora for Digital Forensics Education and Research. IFIP Int. Conf. Digital Forensics 2014: 309-325 - 2013
- [j3]Christian Winter, Markus Schneider, York Yannikos:
F2S2: Fast forensic similarity search through indexing piecewise hash signatures. Digit. Investig. 10(4): 361-371 (2013) - [c9]York Yannikos, Christian Winter:
Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing. ARES 2013: 498-505 - [c8]Martin Steinebach, Huajian Liu, York Yannikos:
FaceHash: Face Detection and Robust Hashing. ICDF2C 2013: 102-115 - [c7]York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi:
Hash-Based File Content Identification Using Distributed Systems. IFIP Int. Conf. Digital Forensics 2013: 119-134 - [c6]York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter:
Automating Video File Carving and Content Identification. IFIP Int. Conf. Digital Forensics 2013: 195-212 - 2012
- [c5]Christian Winter, Markus Schneider, York Yannikos:
Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis. ARES 2012: 255-261 - [c4]York Yannikos, Christian Winter, Markus Schneider:
Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework. ARES 2012: 613-619 - [c3]Martin Steinebach, Huajian Liu, York Yannikos:
ForBild: efficient robust image hashing. Media Watermarking, Security, and Forensics 2012: 83030O - 2011
- [c2]Christian Winter, Markus Schneider, York Yannikos:
Detecting Fraud Using Modified Benford Analysis. IFIP Int. Conf. Digital Forensics 2011: 129-141 - 2010
- [j2]Dennis Heinson, York Yannikos, Frederik Franke, Christian Winter, Markus Schneider:
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen - Methoden zur Aufklärung verbotener Handlungen im Spannungsfeld rechtlicher Interessen. Datenschutz und Datensicherheit 34(2): 75-79 (2010) - [j1]York Yannikos, Christian Winter, Frederik Franke, Markus Schneider:
Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge. Datenschutz und Datensicherheit 34(2): 90-95 (2010) - [c1]York Yannikos, Frederik Franke, Christian Winter, Markus Schneider:
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data. ICWF 2010: 200-211
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint