Publikationen
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2019
93.
Velinov A,
Mileva A,
Wendzel S,
Mazurczyk W.
Covert Channels in the MQTT-based Internet of Things.
ACCESS.
2019;
7161899—161915.
92.
Wendzel S,
Link F,
Eller D,
Mazurczyk W.
Detection of Size Modulation Covert Channels Using Countermeasure Variation.
Journal of Universal Computer Science (J.UCS).
2019;
25(11):1396—1416.
91.
Wendzel S,
Plötner J.
Einstieg in Linux .
8 ed.
Rheinwerk Verlag;
2019.
90.
Schmidbauer T,
Wendzel S,
Mileva A,
Mazurczyk W.
Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In:
Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).
New York, NY, USA:
ACM;
2019.
p. 64:1—64:10.
89.
Wendzel S,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019).
ACM;
2019.
88.
Wendzel S.
Protocol-independent Detection of "Message Ordering" Network Covert Channels. In:
Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).
New York, NY, USA:
ACM;
2019.
p. 63:1—63:8.
87.
Mazurczyk W,
Caviglione L,
Wendzel S.
Recent Advancements in Digital Forensics, Part 2.
IEEE Security and Privacy (S&P).
2019;
17(1):7—8.
86.
Lv Z,
Mazurczyk W,
Wendzel S,
Song H.
Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Transactions on Industrial Informatics (TII).
2019;
15(12):6468—6471.
85.
Mazurczyk W,
Szary P,
Wendzel S,
Caviglione L.
Towards Reversible Storage Network Covert Channels. In:
Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).
New York, NY, USA:
ACM;
2019.
p. 69:1—69:8.
2018
84.
Wendzel S.
Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In:
Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).
ACM;
2018 Aug. 20.
p. 13:1—13:8.
83.
Mazurczyk W,
Wendzel S,
Cabaj K.
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In:
Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).
ACM;
2018 Aug. 20.
p. 10:1—10:10.
82.
Keidel R,
Wendzel S,
Zillien S,
Conner ES,
Haas G.
WoDiCoF — A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.
Journal of Universal Computer Science (J.UCS).
2018 Jul. 17;
24(5):556—576.
81.
Leznik M,
,
Griesinger F,
Seybold D,
Domaschka J.
Done yet? A critical introspective of the cloud management toolbox. In:
2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).
2018 Jun..
p. 1—8.
80.
,
Griesinger F,
Domaschka J.
Continuous Anything for Distributed Research Projects.
Dependability Engineering.
2018;
Dependability Engineering23.
79.
Zillien S,
Wendzel S.
Detection of covert channels in TCP retransmissions. In:
Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018).
Springer;
2018.
p. 203—218.
78.
Caviglione L,
Mazurczyk W,
Wendzel S,
Zander S.
Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Security and Communication Networks (SCN).
2018;
20181—7.
77.
Mazurczyk W,
Wendzel S.
Information Hiding — Challenges for Forensic Experts.
Communications of the ACM.
2018;
61(1):86—94.
76.
Wendzel S,
Olschewski D.
Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. In:
Springer;
2018.
75.
Wendzel S.
IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung.
1 ed.
Springer;
2018.
74.
Wendzel S,
Eller D,
Mazurczyk W.
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In:
Proc. Central European Security Conference (CECC 2018).
ACM;
2018.
p. 1:1—1:6.
73.
Cabaj K,
Caviglione L,
Mazurczyk W,
Wendzel S,
Woodward A,
Zander S.
The New Threats of Information Hiding: the Road Ahead.
IEEE IT Professional.
2018;
20(3):31—39.
2017
72.
Spenger G,
Keler J,
Wendzel S.
Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs.
Journal of Cyber Security and Mobility (JCSM).
2017 Nov. 02;
6(2):147—170.
71.
Seybold D,
Hauser CB,
,
Domaschka J.
Gibbon: An availability evaluation framework for distributed databases. In:
On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II.
2017 Sep..
p. 31—49.
70.
Wendzel S,
Tonejc J,
Kaur J,
Kobekova A.
Cyber Security of Smart Buildings. In:
H. Song and G. Fink and S. Jeschke, editors.
Security and Privacy in Cyber-Physical Systems: Foundations and Applications.
Wiley-IEEE Press;
2017 Jul. 17.
p. 327—352.
69.
Lehner F,
Mazurczyk W,
Keller J,
Wendzel S.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In:
Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017).
IEEE;
2017 Jul. 17.
p. 78—85.