Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Angewandte Informatik

Informatik / Hochschule Worms

Erenburgerstr. 19, 67549 Worms
  • 06241/509-128
Publikationen
Ergebnisse pro Seite:  50

Wendzel, Steffen

IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung

1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.


Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech

One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels

Proceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. New York, NY, USA: ACM Press 2018 S. 1 - 6



Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.

The New Threats of Information Hiding: The Road Ahead

IT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39


Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.

ARES. 2018 S. 10:1 - 10:10


Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.

WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.

J. UCS. Bd. 24. H. 5. 2018 S. 556 - 576


Santos, Ricardo; Bozakov, Zdravko; Mangiante, Simone et al.

A NEAT framework for application-awareness in SDN environments.

Networking. 2017 S. 1 - 2


Bozakov, Zdravko; Mangiante, Simone; Hernandez Benet, Cristian et al.

A NEAT framework for enhanced end-host integration in SDN environments.

NFV-SDN. 2017 S. 1 - 7


Weinrank, Felix; Grinnemo, Karl-Johan; Bozakov, Zdravko et al.

A NEAT Way to Browse the Web.

ANRW. 2017 S. 33 - 34


Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen

Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.

IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22


Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.

Cyber Security of Smart Buildings

H. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16


Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg

Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.

IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34


Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen

Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGs

Journal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170


Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.

Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach

Proc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85


Khademi, Naeem; Ros, David; Welzl, Michael et al.

NEAT: A Platform- and Protocol-Independent Internet Transport API.

IEEE Commun. Mag. Bd. 55. H. 6. 2017 S. 46 - 54


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

Network Information Hiding and Science 2.0: Can it be a Match?

Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222


Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen

Recent Advancements in Digital Forensics.

IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11


Wendzel, Steffen

Review of `Out-of-band Covert Channels--A Survey'

ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49


Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg

Steganography for Cyber-physical Systems

Journal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126


Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech

The Future of Digital Forensics: Challenges and the Road Ahead.

IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17


Kobekova, Alexandra; Bültermann, Lennart; Tonejc, Jernej et al.

Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT

Tagungsband zum 15. Deutscher IT-Sicherheitskonress des BSI. Bonn: SecuMedia Verlags-GmbH 2017 S. 515 - 526


Koch, Stefan; Kasten, Jens; Wiebel, Alexander et al.

2D Vector field approximation using linear neighborhoods.

The Visual Computer. Bd. 32. H. 12. 2016 S. 1563 - 1578


Kaur, Jaspreet; Wendzel, Steffen; Eissa, Omar et al.

Covert channel-internal control protocols: attacks and defense

Security and Communication Networks. Bd. 9. H. 15. Wiley-Blackwell 2016 S. 2986 - 2997


Wendzel, Steffen; Plötner, Johannes

Einstieg in Linux:Linux verstehen und einsetzen

7., aktualisierte Auflage. Aufl. Bonn: Rheinwerk 2016 409 S.


Wendzel, Steffen

How to increase the security of smart buildings?

Commun. ACM. Bd. 59. H. 5. 2016 S. 47 - 49


Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian et al.

Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications

1. Aufl. New York, NY: John Wiley & Sons 2016 288 S. (IEEE Press Series on Information and Communication Networks Security)


Wendzel, Steffen; Kasem-Madani, Saffija

IoT Security: The Improvement-Decelerating 'Cycle of Blame'

Journal of Cyber Security and Mobility (JCSM), 'Opinion'-Beitrag. Gistrup/Delft: River Publishers 2016


Bozakov, Zdravko; Rizk, Amr; Bhat, Divyashri et al.

Measurement-based flow characterization in centrally controlled networks.

INFOCOM. 2016 S. 1 - 9


Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.

Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

Security and Communication Networks. Bd. 9. H. 15. 2016 S. 2972 - 2985


Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.

On importance of steganographic cost for network steganography.

Security and Communication Networks. Bd. 9. H. 8. 2016 S. 781 - 790


Wendzel, Steffen; Mazurczyk, Wojciech

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.

ACM Conference on Computer and Communications Security. 2016 S. 1739 - 1741


Wendzel, Steffen; Keller, Jörg

Security, Privacy and Reliability of Smart Buildings.

J. UCS. Bd. 22. H. 9. 2016 S. 1201 - 1202



Eberle, Martin; König, Werner; Drengner, Jan

Storytelling App – jüdische Geschichte mobil erleben

Hess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016


Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian

Unified Description for Network Information Hiding Methods.

J. UCS. Bd. 22. H. 11. 2016 S. 1456 - 1486


Schneider, Florian; König, Werner; Keßler, Thomas

Vinocheck App – UX Konzept und Realisierung

Hess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016



Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen

"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.

CoRR. Bd. abs/1508.04978. 2015


Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen

“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography

JCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752


Caviglione, Luca; Lalande, Jean-François; Mazurczyk, Wojciech et al.

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.

HCI (22). 2015 S. 165 - 177


Anhaus, Eva Maria; Wendzel, Steffen

BACtag: Data Leakage Protection für Gebäude

Tagungsband der D-A-CH Security 2015. St. Augustin. 2015 S. 1 - 12


Kaur, Jaspreet; Wendzel, Steffen; Meier, Michael

Countermeasures for Covert Channel-Internal Control Protocols.

ARES. 2015 S. 422 - 428


Wendzel, Steffen; Palmer, Carolin

Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.

J. UCS. Bd. 21. H. 12. 2015 S. 1684 - 1705


Wiebel, Alexander; Bruckner, Stefan; Ropinski, Timo

Direct Volume Interaction for Visual Data Analysis

IEEE VIS 2015 Conference (Tutorials). Chicago. 2015


Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.

CoRR. Bd. abs/1505.07757. 2015


Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej et al.

Novel Approaches for Security in Building Automation Systems

Tagungsband des 14. Sicherheitskongress des BSI. Bonn. 2015 S. 145 - 158


Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard et al.

Pattern-Based Survey and Categorization of Network Covert Channel Techniques.

ACM Comput. Surv. Bd. 47. H. 3. 2015 S. 50


Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen et al.

Securing BACnet's Pitfalls.

SEC. 2015 S. 616 - 629


Wiebel, Alexander; Isenberg, Tobias; Bruckner, Stefan et al.

Tools and Techniques for Direct Volume Interaction.

Eurographics (Tutorials). 2015


Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian

Unified Description for Network Information Hiding Methods.

CoRR. Bd. abs/1512.07438. 2015