default search action
Andreas Dewald
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2024 Special Issue. DTRAP 5(3): 26:1-26:2 (2024) - [c16]Matthias Stammler, Julian Lorenz, Eric Sax, Jürgen Becker, Matthias Hamann, Patrick Bidinger, Andreas Dewald, Paraskevi Georgouti, Alexios Camarinopoulos, Günter Becker, Klaus Finsterbusch, Maximilian Kirschner, Laurenz Adolph, Carl Philipp Hohl, Maria Rill, Daniel Vonderau, Victor Pazmino Betancourt:
UNCOVER: Data-Driven Design Support through Continuous Monitoring of Security Incidents. DATE 2024: 1-6 - 2023
- [j11]Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2023 Special Issue. DTRAP 4(3): 31:1-31:2 (2023) - [j10]Florian Bausch, Andreas Dewald:
Forensic Examination of Ceph. DTRAP 4(3): 37:1-37:18 (2023) - 2020
- [j9]Paul Prade, Tobias Groß, Andreas Dewald:
Forensic Analysis of the Resilient File System (ReFS) Version 3.4. Digit. Investig. 32 Supplement: 300915 (2020) - [c15]Florian Hantke, Andreas Dewald:
How can data from fitness trackers be obtained and analyzed with a forensic approach? EuroS&P Workshops 2020: 500-508
2010 – 2019
- 2019
- [j8]Frank Block, Andreas Dewald:
Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries. Digit. Investig. 29 Supplement: S3-S12 (2019) - 2018
- [c14]Jonas Plum, Andreas Dewald:
Forensic APFS File Recovery. ARES 2018: 47:1-47:10 - 2017
- [j7]Andreas Dewald, Sabine Seufert:
AFEIC: Advanced forensic Ext4 inode carving. Digit. Investig. 20 Supplement: S83-S91 (2017) - [j6]Frank Block, Andreas Dewald:
Linux memory forensics: Dissecting the user space process heap. Digit. Investig. 22 Supplement: S66-S75 (2017) - [j5]Johannes Stadlinger, Andreas Dewald:
A Forensic Email Analysis Tool Using Dynamic Visualization. J. Digit. Forensics Secur. Law 12(1): 7-14 (2017) - 2016
- [j4]Christian Zoubek, Sabine Seufert, Andreas Dewald:
Generic RAID reassembly using block-level entropy. Digit. Investig. 16 Supplement: S44-S54 (2016) - [c13]Johannes Bauer, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald:
Information leakage behind the curtain: Abusing anti-EMI features for covert communication. HOST 2016: 130-134 - 2015
- [j3]Frederik Armknecht, Andreas Dewald:
Privacy-preserving email forensics. Digit. Investig. 14 Supplement 1: S127-S136 (2015) - [j2]Andreas Dewald:
Characteristic evidence, counter evidence and reconstruction problems in forensic computing. it Inf. Technol. 57(6): 339-346 (2015) - [c12]Andreas Dewald:
Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing. IMF 2015: 77-82 - 2014
- [c11]Sven Kälber, Andreas Dewald, Steffen Idler:
Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata. Sicherheit 2014: 331-343 - [c10]Dominik Brodowski, Andreas Dewald, Felix C. Freiling, Steve Kovács, Martin Rieger:
Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen. Sicherheit 2014: 391-405 - 2013
- [c9]Johannes Stüttgen, Andreas Dewald, Felix C. Freiling:
Selective Imaging Revisited. IMF 2013: 45-58 - [c8]Sven Kälber, Andreas Dewald, Felix C. Freiling:
Forensic Application-Fingerprinting Based on File System Metadata. IMF 2013: 98-112 - [p1]Andreas Dewald, Felix C. Freiling, Sven Schmitt, Michael Spreitzenbarth, Stefan Vömel:
Systematische Probleme und Grenzen der forensischen Informatik. Jenseits von 1984 2013: 101-118 - 2012
- [b3]Andreas Dewald:
Formalisierung digitaler Spuren und ihre Einbettung in die Forensische Informatik. University of Erlangen-Nuremberg, 2012, pp. 1-236 - [j1]Matthias Bäcker, Andreas Dewald, Felix C. Freiling, Sven Schmitt:
Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren. Datenschutz und Datensicherheit 36(8): 597-602 (2012) - [c7]Andreas Dewald, Felix C. Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems:
Analyse und Vergleich von BckR2D2-I und II. Sicherheit 2012: 47-58 - 2011
- [b2]Andreas Dewald, Felix C. Freiling:
Forensische Informatik. Books on Demand GmbH 2011, ISBN 978-3-8423-7947-3, pp. I-VIII, 1-123 - [b1]Jan Göbel, Andreas Dewald:
Client-Honeypots - Exploring Malicious Websites. Oldenbourg 2011, ISBN 978-3-486-70526-3, pp. I-XIX, 1-214 - [c6]Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:
Exploring the Landscape of Cybercrime. SysSec@DIMVA 2011: 71-74 - [c5]Andreas Dewald, Felix C. Freiling, Tim Weber:
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. IMF 2011: 62-80 - [c4]Tilo Müller, Felix C. Freiling, Andreas Dewald:
TRESOR Runs Encryption Securely Outside RAM. USENIX Security Symposium 2011 - 2010
- [c3]Konrad Rieck, Tammo Krueger, Andreas Dewald:
Cujo: efficient detection and prevention of drive-by-download attacks. ACSAC 2010: 31-39 - [c2]Tilo Müller, Andreas Dewald, Felix C. Freiling:
AESSE: a cold-boot resistant implementation of AES. EUROSEC 2010: 42-47 - [c1]Andreas Dewald, Thorsten Holz, Felix C. Freiling:
ADSandbox: sandboxing JavaScript to fight malicious websites. SAC 2010: 1859-1864
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint