Dirk Pawlaszczyk

Dirk Pawlaszczyk
Hochschule Mittweida | HSMW · Department of Informatics

Professor

About

36
Publications
15,592
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
166
Citations
Introduction
Dirk Pawlaszczyk currently works at the Department of Informatics, Hochschule Mittweida. Dirk does research in IT Security and Privacy, Software Engineering and Artificial Intelligence. Their current project is 'forensics, following digital traces' and Security in fabrication environments.
Additional affiliations
September 2011 - present
Hochschule Mittweida
Position
  • Professor (Full)
Description
  • Introduction to IT-Security, Cloud Computing and Cloud Forensics, Network Forensics, Algorithm and Data Structures, Programming with Java, Design of secure Systems , Security Management and Data Privacy, Software Project, Malware Analysis and Detection

Publications

Publications (36)
Article
Full-text available
Cloud services and cloud storage solutions are special challenges in digital forensic investigations. Cloud services allow their users, with relatively little technical knowledge, store, manage and share content with others. At the same time investigators are faced with a wide range of technical, legal and organizational issues. Unfortunately, evid...
Chapter
Full-text available
SQLite is, without doubt, the most widely used database systemworldwide at the moment. The single file database system is used, among other things, in operating systems for cell phones, such as Android, iOS or Symbian OS. On a typical smartphone, we usually find several hundred SQLite databases used by a wide variety of apps. Due to its widespread...
Chapter
Full-text available
Java Serialization is a popular technique for storing object states in the Java programming language. In the field of mobile forensics, we come across such artefacts. App developers very often resort to this technique to make their application state persistent. Serialization is also used when transferring data over a network between two Java applic...
Book
Full-text available
This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints about the forensic value of possible artefacts, along with an outline of tools that can decode the relevant data. The book is organized into two distinct...
Article
Full-text available
The complexity and constant changes in mobile forensics require special training of investigators with datasets that are as realistic as possible. Even today, the generation of training data is almost exclusively done manually. This paper presents a novel open-source framework called AutoPoD-Mobile. The framework supports the creation of case-based...
Article
Full-text available
Mobile forensics today is an essential part of nearly every criminal investigation. This contribution tries to shed light on the question, to which extent mobile forensics has reached its zenith. Moreover, is it turned out whether we are heading for a crisis in the future? In this context, a literature survey is presented that attempts to identify...
Conference Paper
Full-text available
The digital transformation is unstoppable. The Internet of Things forms the basis of our digital information society. Growing cybercrime is one of the greatest challenges in this context. Targeted and complex cyberattacks on converged network infrastructures require innovative detection strategies to detect and classify multi-level malware and thei...
Conference Paper
Full-text available
Auch in kleineren und mittelständigen Unternehmen werden industrielle Steuerungssysteme eingesetzt die auch in diesen Unternehmen immer weiter in das Unternehmensnetzwerk integriert werden. Der Sicherheitsaspekt darf dabei nicht vernachlässigt werden. Besonders kleine und mittelständige Unternehmen brauchen Lösung, die kostengünstige und ohne große...
Article
Full-text available
Forensic analysis and evidence collection for web browser activity is a recurring problem in digital investigation. It is not unusual for a suspect to cover his traces. Accordingly, the recovery of previously deleted data such as web cookies and browser history are important. Fortunately, many browsers and thousands of apps used the same database s...
Experiment Findings
Just download the first version of the program.
Technical Report
Full-text available
A number of standards identified previously provide a background to cover the current needs of the practitioners working in the area of digital forensics. However, some elements of the chain of custody in mobile forensics may be missed by standardisation, underrepresented or not covered adequately. This report outlines the standardisation gaps in m...
Technical Report
Full-text available
The objective of the present document is to analyse the status of current standardisation in mobile forensics and to point towards actions that can increase its effectiveness, ensure inclusion of all relevant stakeholders and their interests and improve the quality of mobile forensics processes and procedures. Further objective of the document is t...
Article
Advertising networks bring companies together that run advertisements on websites or within apps. Targeting capabilities of the advertisers have increased drastically over the last years due to the availability user data and advances in data science: whether users log on to social networks or use a mobile app, they leave their traces everywhere and...
Article
Full-text available
Advertising networks bring companies together that run advertisements on websites or within apps. Targeting capabilities of the advertisers have increased drastically over the last years due to the availability user data and advances in data science: whether users log on to social networks or use a mobile app, they leave their traces everywhere and...
Article
Full-text available
In the recent past, smart speakers and personal assistants like Alexa have been used as evidence in different criminal cases. With more than 6 million Echo devices in 2019 worldwide, there is a good chance for the constantly active devices to record criminal behavior. That is reason enough to take a closer look at the subject. This article discusse...
Conference Paper
How can Android applications be examined for malicious behavior in a quick and easy manner? Is the process of analysis automatable? Can the results be categorized in an easy way? The growing number of mobile malware for Android and their increasingly complex structures and intelligent concealment techniques are bringing investigative agencies to th...
Experiment Findings
Full-text available
Der vorliegende Bericht fasst die Ergebnisse eines im Auftrag mit dem MDR durchgeführten Projektes zusammen. Es sollte die Frage geklärt werden, inwieweit Anforderungen der Datensicherheit und des Datenschutzes bei den Wahlkampf-Apps verschiedener Parteien Berücksichtigung finden. Hierfür wurden insgesamt 3 Apps von den Parteien CDU, SPD, die Grüne...
Conference Paper
Information technology (IT) has become an integral part of production and manufacturing networks as well as critical infrastructures in the context of the fourth industrial revolution. Standard IT merges with components of factory automation and process control systems. The increasing digitization and the rise of intelligent networking opens up eno...
Presentation
Full-text available
IT-Sicherheit und Industrie 4.0 – ein unterschätztes Thema? - Die Präsentation beschäftigt sich mit dem Thema IT-Sicherheit von industriellen Prozessen und stellt einen Ansatz vor, der im Rahmen des Projekt 3SAFE entwickelt wurde.
Presentation
Full-text available
Der Vortrag beleuchtet die Nachverfolgung von Transaktionen im Bitcoin-Netzwerk.
Chapter
Full-text available
Der vorliegenden Beitrag beschäftigt sich mit Vorgehensweisen zur Sicherung und Verfolgung digitaler Spuren. Wie sich zeigt, sind die Prinzipien der klassischen Forensik auch auf digitale Tatorte anwendbar und behalten im Cyberspace ihre Gültigkeit. Ausgehend von unterschiedlichen Tatorten, werden wesentlichen Schritte der Spurensicherung und Verfo...
Presentation
Full-text available
Keynote im Rahmen der Sächsische Industrie- und Technologiemesse in Chemnitz zum Thema IT-Sicherheit im verarbeitenden Gewerbe.
Article
Full-text available
Zusammenfassung Die Parallelisierung von Anwendungen, d.h. das Zerlegen eines Anwendungsproblems in Teilprobleme, die von mehreren Prozessen getrennt bearbeitet werden können, wird in der Verteilten Künstlichen Intelligenz ebenso wie in der Simulationstechnik seit vielen Jahren diskutiert. Innerhalb der VKI sind die Forscher vorrangig an flexiblen...
Conference Paper
Full-text available
Research on systems of autonomous agents, called multiagent systems (MAS), has received much interest in the domain of (distributed) artificial intelligence in recent years. MAS are most suitable for the development of distributed applications within an uncertain and dynamically changing environment (Logan 2005). For validation of such systems agen...
Conference Paper
Full-text available
Agent-based simulation (ABS) is a paradigm which has received much attention within the last years. For enabling industrial use of ABS scalable solutions are required which can be executed on a distributed computing architecture. Such solutions must be capable of simulating complex models with hundreds or more complex deliberative agents with reall...
Thesis
Full-text available
Research on systems of autonomous agents, called multiagent systems (MAS), has received much interest in the domain of (distributed) artificial intelligence in recent years. MAS are most suitable for the development of distributed applications with uncertain and a dynamically changing environment. Simulation is the imitation of a systems behaviour...
Conference Paper
Full-text available
Die Planung und Gestaltung effizienter unternehmensübergreifender Transportnetze rückt zu- nehmend in den Fokus betriebswirtschaftlicher Betrachtungen. Für eine flexible über- betriebliche Koordination und informationstechnische Integration von Güterflüssen in Liefer - ketten wird dabei immer häufiger der Einsatz von Softwareagenten diskutiert. Zur...
Conference Paper
Full-text available
In this paper we describe a time management approach to distributed agent-based simulation. We propose a new time management policy by joining optimistic synchronization techniques and domain-specific knowledge based on agent communication protocols. With respect to our experimental results, we assume that our approach helps to prevent too optimist...
Conference Paper
Full-text available
Simulating large scale, distributed systems of autonomous decision-makers, e.g. global logistics supply networks, is a huge challenge for hardware and software infrastructure as well as managing the process of simulation. Facing this challenge, we are going to introduce an architecture for large scale grid-based simulation infrastructure to enable...
Cover Page
Full-text available
Mass Customization (MC) as a modern competitive strategy enables enterprises to act in dynamic markets with high customer satisfaction. But, for a successful implementation of this management concept, effective information logistics is essential. Ontologies are considered as a promising approach for optimizing inter-organizational and distributed c...
Article
Full-text available
Zusammenfassung: Agentenbasierte Simulation ist eine Analysetechnik die es erlaubt, dass Verhalten komplexer Systeme sowie emergente Phänomene zu studieren. In diesem Beitrag wird ein ereignisbasierter Simulationsdienst vorgestellt, der die Durchführung verteilter Simulations-experimente auf Basis eines optimistischen Synchronisationsansatzes unter...
Article
Full-text available
Zusammenfassung: Die kundenindividuelle Massenprodukt ion stellt ein konzeptionelles Gerüst für die Kombination von Massenproduktion und individualisierten Leistungen be- reit. Die informationstechnische Abbildung des Produktkonfigurationsprozesses sowie die logistische Abwicklung der gesamten Wertschöpfungserstellung sind hierbei zwei Heraus- ford...
Article
Full-text available
Agentenbasierte Simulation erlaubt es, dass Verhalten komplexer Systeme sowie emergente Phänomene zu studieren. Die Komplexität der mittels Agententechnologie zu lösenden Problemstellungen und somit die Größe der zu simulierenden Modelle nimmt stetig zu. Gleichzeitig wird der Entwicklung von Werkzeugen zur effizienten Durchführung von agenten- basi...
Article
Full-text available
Multi Agent based Simulation is a tool which can be adapted to a multitude of logistic problems. It permits support to study the dynamic behavior of complex systems, such as large transport networks. Even if agent based simulation is a powerful tool, some problems exist. To simulate an increasing number of entities, the underlying simulation system...
Article
1 Personal Data Name: Dipl.-Wirtsch.-Inf. Dirk Pawlaszczyk (dirk.pawlaszczyk@tu-ilmenau.de) PhD Thesis Advisor: Professor Dr. Peter Gmilkowsky Affiliation: Fachgebiet Wirtschaftsinformatik für Industriebetriebe an der Technischen Universität Ilmenau 2 Introduction Modelling and simulating entities that perceive the environment, reason upon their pe...

Network

Cited By