Publikationen
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2015
43.
Kaur J,
Tonejc J,
Wendzel S,
Meier M.
Securing BACnet's pitfalls. In:
Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015).
2015.
p. 616—629.
42.
Tonejc J,
Kaur J,
Karsten A,
Wendzel S.
Visualizing BACnet data to facilitate humans in building-security decision-making. In:
International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015).
2015.
p. 693—704.
2014
41.
Kaur J,
Meier M,
³§³ú±ôó²õ²¹°ù³¦³ú²â°ì&²Ô²ú²õ±è;³§,
Wendzel S.
A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In:
Proc. SECURWARE 2014.
Iaria;
2014.
40.
Wendzel S,
Ploetner J.
Einstieg in Linux .
6 ed.
Galileo Press;
2014.
39.
Wendzel S,
Zwanger V,
Meier M,
Szlósarczyk S.
Envisioning smart building botnets. In:
Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2014.
38.
Wendzel S,
Mazurczyk W,
Caviglione L,
Meier M.
Hidden and uncontrolled—on the emergence of network steganographic threats. In:
Securing Electronic Business Processes (ISSE 2014).
Springer;
2014.
p. 123—133.
37.
Wendzel S,
Keller J.
Hidden and under control.
Annals of Telecommunications—Annales des Télécommunications (ANTE).
2014;
69(7):417—430.
36.
Wendzel S,
Keller J.
IT-gestütztes Management und Controlling: Verdeckte Kanäle — eine zunehmende Gefahr für Unternehmensdaten.
Controlling.
2014;
26. Jahrgang(14/6):
35.
Wendzel S,
Herdin C,
Wirth R,
Masoodian M,
Luz S,
Kaur J.
Mosaic-chart based visualization in building automation systems. In:
Proceedings of the 9th Future Security Research Conference.
Fraunhofer Verlag/MEV Verlag, Berlin;
2014.
p. 687—690.
34.
Kaur J,
Wendzel S.
Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In:
Proceedings Computer Science Conference for University of Bonn Students (CSCUBS).
2014.
33.
³§³ú±ôó²õ²¹°ù³¦³ú²â°ì&²Ô²ú²õ±è;³§,
Wendzel S,
Kaur J,
Meier M,
Schubert F.
Towards suppressing attacks on and improving resilience of building automation systems — an approach exemplified using BACnet. In:
Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2014.
2013
32.
Lalande J,
Wendzel S.
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In:
Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013).
IEEE;
2013.
p. 701—710.
31.
Kahler B,
Wendzel S.
How to own a building? Wardriving gegen die Gebäude-Automation. In:
Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen.
BoD;
2013.
p. H1—H13.
30.
Pohl C,
Schinzel S,
Wendzel S.
Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013).
Gesellschaft für Informatik e.V. (GI);
2013.
2012
29.
Wendzel S.
Control Protocols for Network Covert Channels. In:
Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01.
Gesellschaft für Informatik, FB Sicherheit, SIG SIDAR;
2012.
p. 24.
28.
Wendzel S.
Covert and side channels in buildings and the prototype of a building-aware active warden. In:
2012 IEEE International Conference on Communications (ICC 2012).
2012.
p. 6753—6758.
27.
Wendzel S,
Kahler B,
Rist T.
Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In:
2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom 2012).
2012.
p. 731—736.
26.
Wendzel S,
Keller J.
Design and implementation of an active warden addressing protocol switching covert channels. In:
Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012).
2012.
p. 1—6.
25.
Wendzel S,
Zander S.
Detecting protocol switching covert channels. In:
Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN 2012).
2012.
p. 280—283.
24.
Backs P,
Wendzel S,
Keller J.
Dynamic routing in covert channel overlays based on control protocols. In:
2012 International Conference for Internet Technology and Secured Transactions (ICITST 2012).
2012.
p. 32—39.
23.
Wendzel S,
Keller J.
Einführung in die Forschungsthematik der verdeckten Kanäle. In:
Informationstechnologie und Sicherheitspolitik — Wird der dritte Weltkrieg im Internet ausgetragen?.
BoD;
2012.
p. 115—124.
22.
Wendzel S,
Ploetner J.
Einstieg in Linux .
5 ed.
Galileo Press;
2012.
21.
Ploetner J,
Wendzel S.
Linux. Das umfassende Handbuch .
5 ed.
Galileo Press;
2012.
20.
Rist T,
Wendzel S,
Masoodian M,
Andre E.
Techniken für Menschen im ²Ô䳦³ó²õ³Ù±ðn Jahrzehnt – Beiträge zum Usability Day X.
Pabst Science Publishers;
2012.
p. 80—87.
19.
Wendzel S,
Keller J.
Preventing Protocol Switching Covert Channels.
International Journal on Advances in Security.
2012;
5(3 and 4):