Internet of Things security and forensics: Challenges and opportunities M Conti, A Dehghantanha, K Franke, S Watson Future Generation Computer Systems 78, 544-546, 2018 | 686 | 2018 |
Using codebooks of fragmented connected-component contours in forensic and historic writer identification L Schomaker, K Franke, M Bulacu Pattern Recognition Letters 28 (6), 719-727, 2007 | 157 | 2007 |
Machine learning aided static malware analysis: A survey and tutorial A Shalaginov, S Banin, A Dehghantanha, K Franke Cyber threat intelligence, 7-45, 2018 | 133 | 2018 |
Improving effectiveness of intrusion detection by correlation feature selection H Nguyen, K Franke, S Petrovic 2010 International conference on availability, reliability and security, 17-24, 2010 | 133 | 2010 |
A computer-based system to support forensic studies on handwritten documents K Franke, M Köppen International Journal on Document Analysis and Recognition 3, 218-231, 2001 | 124 | 2001 |
Icdar 2009 signature verification competition VL Blankers, CE van den Heuvel, KY Franke, LG Vuurpijl 2009 10th International Conference on Document Analysis and Recognition …, 2009 | 121 | 2009 |
Automatic writer identification using fragmented connected-component contours L Schomaker, M Bulacu, K Franke Ninth International Workshop on Frontiers in Handwriting Recognition, 185-190, 2004 | 114 | 2004 |
Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networks I Deliu, C Leichter, K Franke 2017 IEEE International Conference on Big Data (Big Data), 3648-3656, 2017 | 93 | 2017 |
Computational forensics: An overview K Franke, SN Srihari Computational Forensics: Second International Workshop, IWCF 2008 …, 2008 | 86 | 2008 |
Ink texture analysis for writer identification K Franke, O Bunnemeyer, T Sy Proceedings Eighth International Workshop on Frontiers in Handwriting …, 2002 | 84* | 2002 |
Application of the generic feature selection measure in detection of web attacks HT Nguyen, C Torrano-Gimenez, G Alvarez, S Petrović, K Franke Computational Intelligence in Security for Information Systems: 4th …, 2011 | 79 | 2011 |
Privacy-respecting digital investigation A Dehghantanha, K Franke 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 77 | 2014 |
Towards a generic feature-selection measure for intrusion detection HT Nguyen, K Franke, S Petrovic 2010 20th international conference on pattern recognition, 1529-1532, 2010 | 69 | 2010 |
Two-stage approach for word-wise script identification S Chanda, S Pal, K Franke, U Pal 2009 10th International Conference on Document Analysis and Recognition, 926-930, 2009 | 69 | 2009 |
Ink-deposition model: The relation of writing and ink deposition processes K Franke, S Rose Ninth International Workshop on Frontiers in Handwriting Recognition, 173-178, 2004 | 65 | 2004 |
Text independent writer identification for Oriya script S Chanda, K Franke, U Pal 2012 10th IAPR International Workshop on Document Analysis Systems, 369-373, 2012 | 59 | 2012 |
WANDA: A generic Framework applied in Forensic Handwriting Analysis and Writer Identification. K Franke, L Schomaker, C Veenhuis, C Taubenheim, I Guyon, L Vuurpijl, ... HIS 105, 927-938, 2003 | 59 | 2003 |
The WANDA measurement tool for forensic document examination M Van Erp, L Vuurpijt, K Franke, L Schomaker Journal of Forensic Document Examination 28, 5-14, 2018 | 58 | 2018 |
Combining expert knowledge with automatic feature extraction for reliable web attack detection C Torrano‐Gimenez, HT Nguyen, G Alvarez, K Franke Security and Communication Networks 8 (16), 2750-2767, 2015 | 57 | 2015 |
Collecting cyber threat intelligence from hacker forums via a two-stage, hybrid process using support vector machines and latent dirichlet allocation I Deliu, C Leichter, K Franke 2018 IEEE International Conference on Big Data (Big Data), 5008-5013, 2018 | 53 | 2018 |