Îçҹ̽»¨

Publications

2017

68.
Keller J, Spenger G, Wendzel S. Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). 2017. p. 17—22.             
67.
Wendzel S, Mazurczyk W, Haas G. Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). 2017. p. 29—34.             
66.
Wendzel S, Caviglione L, Mazurczyk W, Lalande J. Network Information Hiding and Science 2.0: Can it be a Match?. International Journal of Electronics and Telecommunications (IJET). 2017; 62(2):217—222.             
65.
Mazurczyk W, Caviglione L, Wendzel S. Recent Advancements in Digital Forensics — Part 1. IEEE Security and Privacy (S&P). 2017; 15(6):10—11.             
64.
Wendzel S, Mazurczyk W, Haas G. Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM). 2017; 6(2):105—126.             
63.
Caviglione L, Wendzel S, Mazurczyk W. The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy. 2017; 15(6):12—17.             
62.
Kobekova A, Bültermann L, Tonejc J, Wendzel S. Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2017. p. 515—526.      

2016

61.
Wendzel S, Mazurczyk W, Zander S. A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (J.UCS). 2016; 22(11):1456—1486.             
60.
Kaur J, Wendzel S, Eissa O, Tonejc J, Meier M. Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN). 2016; 9(15):2986—2997.             
59.
Wendzel S, Ploetner J. Einstieg in Linux. 7 ed. Rheinwerk Verlag; 2016.
58.
Wendzel S. How to Increase the Security of Smart Buildings. Communications of the ACM (CACM). 2016; 59(5):47–49.             
57.
Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K. Information Hiding in Communication Networks. Fundamentals, Mechanisms, and Applications. Wiley-IEEE; 2016.       
56.
Wendzel S, Kasem-Madani S. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Journal of Cyber Security and Mobility (JCSM). 2016;             
55.
Naumann M, Wendzel S, Mazurczyk W, Keller J. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN). 2016; 9(15):2972—2985.             
54.
Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K. On importance of steganographic cost for network steganography. Security and Communication Networks (SCN). 2016; 9(8):781—790.             
53.
Wendzel S, Mazurczyk W. Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). New York, NY, USA: ACM; 2016. p. 1739–1741.             
52.
Meier M, Reinhardt D, Wendzel S. Sicherheit 2016 — Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2016.      
51.
Wendzel S, Keller J. Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS). 2016; 22(9):1201—1202.             

2015

50.
Szczypiorski K, Janicki A, Wendzel S. "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT 2015). 2015. p. 747—752.             
49.
Caviglione L, Lalande J, Mazurczyk W, Wendzel S. Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 165—177.             
48.
Anhaus EM, Wendzel S. BACtag — Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec; 2015. p. 417—248.      
47.
Kaur J, Wendzel S, Meier M. Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop. 2015. p. 422—428.             
46.
Wendzel S, Palmer C. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.. Journal of Universal Computer Science (J.UCS). 2015; 21(12):1684—1705.             
45.
Kaur J, Herdin C, Tonejc J, Wendzel S, Meier M, Szlósarczyk S. Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2015. p. 148—155.
44.
Wendzel S, Zander S, Fechner B, Herdin C. Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR). 2015; 47(3):1—26.