Wendzel, Steffen
IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.
Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert ChannelsProceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. New York, NY, USA: ACM Press 2018 S. 1 - 6
Wang, Qi; M. Alcaraz Calero, Jose; Barros Weiss, Maria et al.
SliceNet: End-to-End Cognitive Network Slicing and Slice Management Framework in Virtualised Multi-Domain, Multi-Tenant 5G Networks.BMSB. 2018 S. 1 - 5
Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.
The New Threats of Information Hiding: The Road AheadIT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.ARES. 2018 S. 10:1 - 10:10
Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.J. UCS. Bd. 24. H. 5. 2018 S. 556 - 576
Santos, Ricardo; Bozakov, Zdravko; Mangiante, Simone et al.
A NEAT framework for application-awareness in SDN environments.Networking. 2017 S. 1 - 2
Bozakov, Zdravko; Mangiante, Simone; Hernandez Benet, Cristian et al.
A NEAT framework for enhanced end-host integration in SDN environments.NFV-SDN. 2017 S. 1 - 7
Weinrank, Felix; Grinnemo, Karl-Johan; Bozakov, Zdravko et al.
A NEAT Way to Browse the Web.ANRW. 2017 S. 33 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22
Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.
Cyber Security of Smart BuildingsH. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170
Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring ApproachProc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85
Khademi, Naeem; Ros, David; Welzl, Michael et al.
NEAT: A Platform- and Protocol-Independent Internet Transport API.IEEE Commun. Mag. Bd. 55. H. 6. 2017 S. 46 - 54
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
Network Information Hiding and Science 2.0: Can it be a Match?Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11
Wendzel, Steffen
Review of `Out-of-band Covert Channels--A Survey'ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Steganography for Cyber-physical SystemsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech
The Future of Digital Forensics: Challenges and the Road Ahead.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17
Kobekova, Alexandra; Bültermann, Lennart; Tonejc, Jernej et al.
Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-ITTagungsband zum 15. Deutscher IT-Sicherheitskonress des BSI. Bonn: SecuMedia Verlags-GmbH 2017 S. 515 - 526
Koch, Stefan; Kasten, Jens; Wiebel, Alexander et al.
2D Vector field approximation using linear neighborhoods.The Visual Computer. Bd. 32. H. 12. 2016 S. 1563 - 1578
Kaur, Jaspreet; Wendzel, Steffen; Eissa, Omar et al.
Covert channel-internal control protocols: attacks and defenseSecurity and Communication Networks. Bd. 9. H. 15. Wiley-Blackwell 2016 S. 2986 - 2997
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux:Linux verstehen und einsetzen7., aktualisierte Auflage. Aufl. Bonn: Rheinwerk 2016 409 S.
Wendzel, Steffen
How to increase the security of smart buildings?Commun. ACM. Bd. 59. H. 5. 2016 S. 47 - 49