Publications 2011

 

[1] Bian Yang, Zhibo Chen, Christoph Busch. "Raster Image Representation of Fingerprint Minutiae," The 26th ACM Symposium on Applied Computing 2011 (SAC'11), Taichung, Mar.21-24, 2011. (ACM Press)
[2] Hai Thanh Nguyen, Katrin Franke and Slobodan Petrovic. A General L1-norm Support Vector Machine for Feature Selection. In Proceedings of the International Conference on Machine Learning and Computing (ICMLC 2011), Singapore, 26-28 February, 2011 (accepted for publication).
[3]  Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic. Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. In International Journal of Mobile Computing and Multimedia Communication. (invited journal paper, in press).
[4]  Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic. Feature Extraction Methods for Intrusion Detection. In the book titled: "Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions". (invited book chapter, in press).
[5] Davrondzhon Gafurov, Christoph Busch, Patrick Bours and Bian Yang, “Fusion in Fingerprint Authentication: Two Finger Types vs. Two Scanner Types”, ACM Symposium on Applied Computing (Applied Biometrics Track), TaiChung, Taiwan, March 21-24, 2011.
[6] Lisa Rajbhandari and Einar Arthur Snekkenes. Using Game Theory to Analyze Risk to Privacy: An Initial Insight. In post-proceedings of the PrimeLife/IFIP Summer School 2010, Springer Boston. 2011
[7] Flaglien, A.O., Franke, K., Årnes, A. (2011). "deLinker: Cross Evidence Malware Identification in Digital Forensic". In Proceedings of the Seventh Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 30 - February 2, 2011 (in press). 2011
[8] Martin Aastrup Olsen, Daniel Hartung, Christoph Busch and Rasmus Larsen, "Convolution Approach for Feature Detection in Topological Skeletons Obtained from Vascular Patterns", in IEEE Symposium Series on Computational Intelligence - SSCI 2011.
[9] D. Hartung and C. Busch. Biometrische fingererkennung - fusion on fingerabdruck, fingervenen- und fingergelenkbild. In 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen. SecuMedia-Verlag, 10.-12. Mai, 2011. In Vorbereitung.
[10] D. Hartung and C. Busch. Biometric Transaction Authentication Protocol: Formal Model Verification and ”Four-Eyes” Principle Extension. In Financial Cryptography, 2nd Workshop on Real-Life Cryptographic Protocols and Standardization, 2011.
[11] Kirsi Helkala, "Password Education Based on Guidelines Tailored to Different Password Categories", Journal of Computers, Vol 6, No 5 (2011), 969-975, May 2011
[12] Hewa Balisane, Mohammad Omar Derawi, Patrick Bours, Waqar Ahmed, and Peter Twigg, "Performance of Gait Recognition in Children's Walking Compared to Adults", In Security and Communication Networks (IWSCN), 2011 3rd International Workshop on, May 2011.
[13] Claudia Nickel, Mohammad O. Derawi, Patrick Bours, and Christoph Busch, "Scenario test of accelerometer-based biometric gait recognition", In Security and Communication Networks (IWSCN), 2011 3rd International Workshop on, May 2011.
[14] Gazmend Bajrami, Mohammad Omar Derawi, and Patrick Bours, "Towards an automatic gait recognition system using activity recognition (wearable based)", In Security and Communication Networks (IWSCN), 2011 3rd International Workshop on, May 2011.
[15] Mark Seeger and Patrick Bours, "How to comprehensively describe a biometric update mechnism for keystroke dynamics", In Security and Communication Networks (IWSCN), 2011 3rd International Workshop on, May 2011.
[16] Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez, Slobodan Petrovic, and Katrin Franke, "Applying feature selection to payload-based web application firewalls", In Security and Communication Networks (IWSCN), 2011 3rd International Workshop on, May 2011.
[17] Hewa Balisane, Mohammad Omar Derawi, Patrick Bours, Waqar Ahmed, and Peter Twigg, "Gait recognition in children under special circumstances", In Security and Communication Networks (IWSCN), 2011 3rd International Workshop on, May 2011.
[18] Nguyen, H.T., Franke, K., Petrovic, S. (2011). "A New Ensemble-Feature-Selection Framework for Intrusion Detection". In 11th International Conference on Intelligent Systems Design and Applications (ISDA) November 22-24, 2011 - Córdoba, Spain (accepted for publication).
[19] N. Nguyen, C. Torrano, G. Alvarez, S. Petrovic, K. Franke, "Application of the Generic Feature Selection Measure in Detection of Web Attacks", in 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2011), vol. 6694 of LNCS, 25-32, Springer-Verlag, Málaga, Spain, June, 2011.
[20] Nguyen, H.T., Franke, K., Petrovic, S. (2011). "Feature Selection via Mixed 0-1 Programming Problem". The 18th Machine Learning Summer School is co-organized by INRIA and PASCAL, Bordeaux, France, 4-17 September, 2011. (poster paper, accepted).
[21] Berg, P.E., Franke, K., and Nguyen, H.T. (2011). Feature Selection for Botnet Malware Detection. In 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), July 7-8th, 2011, Amsterdam, The Netherlands. (poster paper, accepted).
[22] Nguyen, H.T., Franke, K., Petrovic, S. (2011). "On General Definition of L1-norm Support-Vector Machine for Feature Selection". In Proceedings of the International Journal of Machine Learning and Computing, ISSN: 2010-3700, (invited journal paper, in press).
[23] Nguyen, H.T., Franke, K., Petrovic, S. (2011). "Reliability in A Feature-Selection Process for Intrusion Detection". In the book titled: "RELIABLE KNOWLEDGE DISCOVERY", Springer. (accepted book chapter, in press).
[24]  Mohammad O. Derawi, Hewa Balisane, Patrick Bours, Waqar Ahmed, and Peter Twigg, “Gait Recognition for Children over a Longer Period”, BIOSIG 2011, October 2011.
[25]  Bendik B. Mjaaland, Patrick Bours, and Danilo Gligoroski, “Walk the Walk: Attacking Gait Biometrics By Imitation”, Information Security Conference, 2011, Vol 6531, pp 361-380, 2011.
[26]  Davrondzhon Gafurov, Patrick Bours, and Einar Snekkenes, “User Authentication Based on Foot Motion”, Signal, Image and Video Processing, pp 1-11, 2011.
[27] Hanno Langweg, Benjamin Adolphi, and Svein Engen (2011). "An Analysis of SpyEye Detection and Removal Tools". Proceedings of NISK 2011 Norsk Informasjonssikkerhetskonferanse. Pp. 65-74.
[28] Benjamin Adolphi, Svein Engen, and Hanno Langweg (2011). "Comparison of Malware Protection in Smart Card-Based User Authentication". Proceedings of NISK 2011 Norsk Informasjonssikkerhetskonferanse. Pp. 75-86.
[29] Knut Borg, Øystein Nilsen, Rune Søbye, and Hanno Langweg (2011). "Inexpensive Data Hiding on USB Memory Sticks". Proceedings of NISK 2011 Norsk Informasjonssikkerhetskonferanse. Pp. 55-63.
[30] Hanno Langweg (2011). "Comparison of Malware Protection of Electronic Signature Applications". Preproceedings of NordSec 2011. Pp. 111-118.
[31] Hanno Langweg, Knut Borg, Øystein Nilsen, and Rune Søbye (2011). "Kostengünstiger Datenschutz auf USB-Sticks". Proceedings of D-A-CH Security 2011. Pp. 11-18.
[32] Hanno Langweg, Benjamin Daniel Adolphi, and Svein Engen (2011). "An Analysis of SpyEye Detection and Removal Tools". Høgskolen i Gjøviks notatserie (ISSN 1890-5196) 2011:03.
[33] K. Graffi, C. Groß, D. Stingl, D. Hartung, A. Kovacevic, and R. Steinmetz. Lifesocial.kom: A secure and p2p-based solution for online social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference, Jan 2011.
[34] D. Hartung. Entropy Estimator and Formal Model for Vascular Skeletons. In 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, 2011.
[35] D. Hartung, S. Martin, and C. Busch. Quality Estimation for Vascular Pattern Recognition. In IEEE International Conference on Hand-based Biometrics (ICHB), 2011.
[36] D. Hartung, M. A. Olsen, H. Xu, and C. Busch. Spectral Minutiae for Vein Pattern Recognition. In IEEE International Joint Conference on Biometrics (IJCB), 2011.
[37] D. Hartung, K. Wold, K. Graffi, and S. Petrovic. Towards a Biometric Random Number Generator A General Approach For True Random Extraction From Biometric Samples. In BIOSIG, 2011.
[38] J. Uriarte-Antonio, D. Hartung, J. E. S. Pascual, and R. Sanchez-Reillo. Vascular Biometrics based on a Minutiae Extraction Approach. In IEEE 45th International Carnahan Conference on Security, 2011.
[39] Mohammad O. Derawi, Bian Yang and Christoph Busch, “Fingerprint Recognition with Embedded Cameras on Mobile Phones,” in 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, 2011. (LNCS)
[40] Shen Wang, Bian Yang, and Xiamu Niu, “Hiding Traces of the Inconsistent Block Artifact Grid in JPEG Images,” ICIC Express Letters, vol.5, no.1, January, 2011.
[41] Bian Yang and Christoph Busch, “Augmented Fingerprint Minutiae Vicinity,” in proceedings of the 18th International Conference on Image Processing (ICIP), Brussels, Belgium, September 11-14, 2011.
[42] Bian Yang, Christoph Busch, Koen de Groot, Haiyun Xu, and Raymond N.J. Veldhuis, “Decision Level Fusion of Fingerprint Minutiae Based Pseudonymous Identifiers,” in proceedings of IEEE International Conference on Hand-Based Biometrics (ICHB), Hong Kong, China, Nov.17-18, 2011.
[43] Bian Yang, Christoph Busch, “Keyed Scalable Minutiae Coding,” in proceedings of IEEE International Conference on Hand-Based Biometrics (ICHB), Hong Kong, China, Nov.17-18, 2011.