Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian et al.
Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications1. Aufl. New York, NY: John Wiley & Sons 2016 288 S. (IEEE Press Series on Information and Communication Networks Security)
Wendzel, Steffen; Kasem-Madani, Saffija
IoT Security: The Improvement-Decelerating 'Cycle of Blame'Journal of Cyber Security and Mobility (JCSM), 'Opinion'-Beitrag. Gistrup/Delft: River Publishers 2016
Bozakov, Zdravko; Rizk, Amr; Bhat, Divyashri et al.
Measurement-based flow characterization in centrally controlled networks.INFOCOM. 2016 S. 1 - 9
Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissionsSecurity and Communication Networks. Bd. 9. H. 15. 2016 S. 2972 - 2985
Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.
On importance of steganographic cost for network steganography.Security and Communication Networks. Bd. 9. H. 8. 2016 S. 781 - 790
Wendzel, Steffen; Mazurczyk, Wojciech
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.ACM Conference on Computer and Communications Security. 2016 S. 1739 - 1741
Wendzel, Steffen; Keller, Jörg
Security, Privacy and Reliability of Smart Buildings.J. UCS. Bd. 22. H. 9. 2016 S. 1201 - 1202
Eberle, Martin; König, Werner; Drengner, Jan
Storytelling App – jüdische Geschichte mobil erlebenHess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016
Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian
Unified Description for Network Information Hiding Methods.J. UCS. Bd. 22. H. 11. 2016 S. 1456 - 1486
Schneider, Florian; König, Werner; Keßler, Thomas
Vinocheck App – UX Konzept und RealisierungHess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016
Wendzel, Steffen
Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.CoRR. Bd. abs/1609.06664. 2016
Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.CoRR. Bd. abs/1508.04978. 2015
Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen
“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi SteganographyJCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752
Caviglione, Luca; Lalande, Jean-François; Mazurczyk, Wojciech et al.
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.HCI (22). 2015 S. 165 - 177
Anhaus, Eva Maria; Wendzel, Steffen
BACtag: Data Leakage Protection für GebäudeTagungsband der D-A-CH Security 2015. St. Augustin. 2015 S. 1 - 12
Kaur, Jaspreet; Wendzel, Steffen; Meier, Michael
Countermeasures for Covert Channel-Internal Control Protocols.ARES. 2015 S. 422 - 428
Wendzel, Steffen; Palmer, Carolin
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.J. UCS. Bd. 21. H. 12. 2015 S. 1684 - 1705
Wiebel, Alexander; Bruckner, Stefan; Ropinski, Timo
Direct Volume Interaction for Visual Data AnalysisIEEE VIS 2015 Conference (Tutorials). Chicago. 2015
Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.CoRR. Bd. abs/1505.07757. 2015
Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej et al.
Novel Approaches for Security in Building Automation SystemsTagungsband des 14. Sicherheitskongress des BSI. Bonn. 2015 S. 145 - 158
Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard et al.
Pattern-Based Survey and Categorization of Network Covert Channel Techniques.ACM Comput. Surv. Bd. 47. H. 3. 2015 S. 50
Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen et al.
Securing BACnet's Pitfalls.SEC. 2015 S. 616 - 629
Wiebel, Alexander; Isenberg, Tobias; Bruckner, Stefan et al.
Tools and Techniques for Direct Volume Interaction.Eurographics (Tutorials). 2015
Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian
Unified Description for Network Information Hiding Methods.CoRR. Bd. abs/1512.07438. 2015