Diller, Florian; Püschel, Fabian; Stockemer, Julian et al.
Holistic Approach to Modular Open Educational Resources for Computer GraphicsEurographics Education Papers.
Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.
Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)Bonn. 2024 306 S. (LNI P-345)
Kohler, Jens
Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech). Bd. 11. IEEE 2023 S. 49 - 56
Lilligreen, Gergana; Wiebel, Alexander
Near and Far Interaction for Outdoor Augmented Reality Tree Visualization and Recommendations on Designing Augmented Reality for Use in NatureSN Computer Science. Bd. 4. H. 3. Springer LLC 2023 S. 24801 - 24813
Lilligreen, Gergana; Henkel, Nico; Wiebel, Alexander
Near and Far Interaction for Augmented Reality Tree Visualization OutdoorsProceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. Setúbal: Scitepress 2022 S. 27 - 35
Eschbach, Robin; Messerschmidt, Kai; Keidel, Ralf et al.
Semi-Automatic Particle Tracking for and Visualization of Particle Detector DataBender, Jan; Botsch, Mario; Keim, Daniel A. (Hrsg). Proceedings Vision, Modeling, and Visualization. Genf: The Eurographics Association 2022 8 S.
Diller, Florian; Scheuermann, Gerik; Wiebel, Alexander
Visual Cue Based Corrective Feedback for Motor Skill Training in Mixed Reality: A SurveyTransactions on Visualization and Computer Graphics. Bd. To Appear. IEEE 2022 S. 1
Samsami, Nima; Kurpjuweit, Stephan
A Reference Model for Dialog Management in Conversational Agents in High-Engagement Use CasesArtificial Intellgence -- Application in Life Sciences and Beyond. The Upper Rhine Artificial Intelligence Symposium. Bd. UR-AI 2021. 2021 S. 167 - 174
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Revised Taxonomy of Steganography Embedding PatternsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers & Security. Bd. 104. Elsevier BV 2021 S. 102207
Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen
Crème de la Crème: Lessons from Papers in Security PublicationsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9
Distante, Damiano; Faralli, Stefano; Rittinghaus, Steve et al.
DomainSenticNet: An Ontology and a Methodology Enabling Domain-Aware Sentic ComputingCognitive Computation. Bd. 14. H. 1. Springer LLC 2021 S. 62 - 77
Faralli, Stefano; Rittinghaus, Steve; Samsami, Nima et al.
Emotional Intensity-based Success Prediction Model for Crowdfunded CampaignsInformation Processing & Management. Bd. 58. H. 1. Elsevier B.V. 2021 102394
Schmidbauer, Tobias; Wendzel, Steffen
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15
Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.
Investigating particle track topology for range telescopes in particle radiography using convolutional neural networksActa Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418
Zillien, Sebastian; Wendzel, Steffen
Reconnection-based Covert Channels in Wireless NetworksJøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)
Lilligreen, Gergana; Marsenger, Philipp; Wiebel, Alexander
Rendering Tree Roots Outdoors: A Comparison Between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality VisualizationLecture Notes in Computer Science. Cham: Springer 2021 S. 364 - 380
Keller, Jörg; Wendzel, Steffen
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash ChainsApplied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742
Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.
Risks and Opportunities for Information Hiding in DICOM StandardARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8
Rambach, Jason; Lilligreen, Gergana; Schäfer, Alexander et al.
A survey on applications of augmented, mixed and virtual reality for nature and environmentarXiv: Cornell University 2020 2008.12024
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection in ICS based on Data-history AnalysisProceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Wiebel, Alexander; Keuchel, Sascha; Eckenfels, Magnus et al.
Challenges of and Recommendations for Combining 6-DOF Spatial VR-Interaction with Spherical VideosInstitute of Electrical and Electronics Engineers (IEEE) (Hrsg). TechRxiv. Piscataway: Institute of Electrical and Electronics Engineers (IEEE) 2020 10 S.
Keller, Jörg; Wendzel, Steffen
Covert Channels in One-Time Passwords Based on Hash ChainsEICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Schmidbauer, Tobias; Wendzel, Steffen
Covert storage caches using the NTP protocol.ARES. 2020 S. 67:1 - 67:10
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Design and performance evaluation of reversible network covert channels.ARES. 2020 S. 68:1 - 68:8
Wendzel, Steffen
Network Information Hiding: Terminology, Taxonomy, Methodology and CountermeasuresHagen (FernUniversität in Hagen). 2020 244 S.
Wendzel, Steffen
Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026
Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.
Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security EducationJournal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763
Drengner, Jan; Wiebel, Alexander
Virtuelle Realität im Veranstaltungsmanagement - Einsatz, Nutzen und HerausforderungenZanger, Cornelia (Hrsg). Events und Messen im digitalen Zeitalter. Wiesbaden: Springer Fachmedien 2020 S. 15 - 36
Bruckner, Stefan; Ropinski, Timo; Isenberg, Tobias et al.
A Model of Spatial Directness in Interactive VisualizationIEEE Transactions on Visualization and Computer Graphics. Bd. 25. H. 8. IEEE 2019 S. 2541 - 2528 Online as early access since June 2018
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen
Advanced Information Hiding Techniques for Modern BotnetsKambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)
Lilligreen, Gergana; Keuchel, Sascha; Wiebel, Alexander
Augmented Reality in Higher Education: An Active Learning Approach for a Course in Audiovisual Production16th EuroVR International Conference - EuroVR 2019. Tallin. 2019 S. 1 To appear
Lilligreen, Gergana; Wiebel, Alexander
Augmented Reality in Vorlesung und Übung: Lehre und Interaktion neu gedachtBarton, Thomas ; Müller, Christian ; Seel, Christian (Hrsg). Hochschulen in Zeiten der Digitalisierung : Lehre, Forschung und Organisation. Wiesbaden: Springer Vieweg 2019 S. 221 - 238 (Angewandte Wirtschaftsinformatik)
Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.
Countering adaptive network covert communication with dynamic wardensFuture Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725
Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.
Covert Channels in the MQTT-Based Internet of ThingsIEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915
Wendzel, Steffen; Link, Florian; Eller, Daniela et al.
Detection of Size Modulation Covert Channels Using Countermeasure VariationJournal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.
Wang, Qi; M. Alcaraz Calero, Jose; Ricart-Sanchez, Ruben et al.
Enable Advanced QoS-Aware Network Slicing in 5G Networks for Slice-Based Media Use Cases.IEEE Trans. Broadcast. Bd. 65. H. 2. 2019 S. 444 - 453
Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-WalksProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10
Wendzel, Steffen; Lévy-Bencheton, Cédric; Caviglione, Luca
Not all areas are equal: analysis of citations in information security researchScientometrics. Bd. 122. H. 1. Springer Science and Business Media LLC 2019 S. 267 - 286
Drengner, Jan; König, Werner; Wiebel, Alexander
Pervasive mobile Spiele und Virtual Reality als Instrumente der digitalen Ansprache von Veranstaltungsbesuchern: Auf schaz-Suche beim Rheinland-Pfalz-Tag 2018Zanger, Cornelia (Hrsg). Eventforschung. Wiesbaden: Springer Fachmedien Wiesbaden 2019 S. 227 - 245
Wendzel, Steffen
Protocol-independent Detection of "Messaging Ordering" Network Covert ChannelsProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics, Part 2IEEE Security & Privacy. Bd. 17. H. 1. 2019 S. 7 - 8
Lv, Zhihan; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Recent Advances in Cyber-Physical Security in Industrial EnvironmentsIEEE Transactions on Industrial Informatics. Bd. 2019. Institute of Electrical and Electronics Engineers (IEEE) 2019 S. 1
Mazurczyk, Wojciech; Szary, Przemysław; Wendzel, Steffen et al.
Towards Reversible Storage Network Covert ChannelsProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8
Zillien, Sebastian; Wendzel, Steffen
Detection of Covert Channels in TCP RetransmissionsGruschka, Nils (Hrsg). Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Cham: Springer International Publishing 2018 S. 203 - 218 (LNCS 11252)
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Emerging and Unconventional: New Attacks and Innovative Detection TechniquesSecurity and Communication Networks. Bd. 2018. Hindawi Limited 2018 S. 1
Wendzel, Steffen
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research.ARES. 2018 S. 13:1 - 13:8
Mazurczyk, Wojciech; Wendzel, Steffen
Information hiding: Challenges for forensic experts.Commun. ACM. Bd. 61. H. 1. 2018 S. 86 - 94
Wendzel, Steffen; Olschewski, Detlef
Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von UnternehmenBarton, Thomas; Müller, Christian; Seel, Christian (Hrsg). Digitalisierung in Unternehmen. Wiesbaden: Springer-Vieweg 2018 S. 291 - 302 (Angewandte Wirtschaftsinformatik)
Wendzel, Steffen
IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.
Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert ChannelsProceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. New York, NY, USA: ACM Press 2018 S. 1 - 6
Wang, Qi; M. Alcaraz Calero, Jose; Barros Weiss, Maria et al.
SliceNet: End-to-End Cognitive Network Slicing and Slice Management Framework in Virtualised Multi-Domain, Multi-Tenant 5G Networks.BMSB. 2018 S. 1 - 5
Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.
The New Threats of Information Hiding: The Road AheadIT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.ARES. 2018 S. 10:1 - 10:10
Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.J. UCS. Bd. 24. H. 5. 2018 S. 556 - 576
Santos, Ricardo; Bozakov, Zdravko; Mangiante, Simone et al.
A NEAT framework for application-awareness in SDN environments.Networking. 2017 S. 1 - 2
Bozakov, Zdravko; Mangiante, Simone; Hernandez Benet, Cristian et al.
A NEAT framework for enhanced end-host integration in SDN environments.NFV-SDN. 2017 S. 1 - 7
Weinrank, Felix; Grinnemo, Karl-Johan; Bozakov, Zdravko et al.
A NEAT Way to Browse the Web.ANRW. 2017 S. 33 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22
Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.
Cyber Security of Smart BuildingsH. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170
Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring ApproachProc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85
Khademi, Naeem; Ros, David; Welzl, Michael et al.
NEAT: A Platform- and Protocol-Independent Internet Transport API.IEEE Commun. Mag. Bd. 55. H. 6. 2017 S. 46 - 54
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
Network Information Hiding and Science 2.0: Can it be a Match?Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11
Wendzel, Steffen
Review of `Out-of-band Covert Channels--A Survey'ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Steganography for Cyber-physical SystemsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech
The Future of Digital Forensics: Challenges and the Road Ahead.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17
Kobekova, Alexandra; Bültermann, Lennart; Tonejc, Jernej et al.
Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-ITTagungsband zum 15. Deutscher IT-Sicherheitskonress des BSI. Bonn: SecuMedia Verlags-GmbH 2017 S. 515 - 526
Koch, Stefan; Kasten, Jens; Wiebel, Alexander et al.
2D Vector field approximation using linear neighborhoods.The Visual Computer. Bd. 32. H. 12. 2016 S. 1563 - 1578
Kaur, Jaspreet; Wendzel, Steffen; Eissa, Omar et al.
Covert channel-internal control protocols: attacks and defenseSecurity and Communication Networks. Bd. 9. H. 15. Wiley-Blackwell 2016 S. 2986 - 2997
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux:Linux verstehen und einsetzen7., aktualisierte Auflage. Aufl. Bonn: Rheinwerk 2016 409 S.
Wendzel, Steffen
How to increase the security of smart buildings?Commun. ACM. Bd. 59. H. 5. 2016 S. 47 - 49
Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian et al.
Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications1. Aufl. New York, NY: John Wiley & Sons 2016 288 S. (IEEE Press Series on Information and Communication Networks Security)
Wendzel, Steffen; Kasem-Madani, Saffija
IoT Security: The Improvement-Decelerating 'Cycle of Blame'Journal of Cyber Security and Mobility (JCSM), 'Opinion'-Beitrag. Gistrup/Delft: River Publishers 2016
Bozakov, Zdravko; Rizk, Amr; Bhat, Divyashri et al.
Measurement-based flow characterization in centrally controlled networks.INFOCOM. 2016 S. 1 - 9
Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissionsSecurity and Communication Networks. Bd. 9. H. 15. 2016 S. 2972 - 2985
Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.
On importance of steganographic cost for network steganography.Security and Communication Networks. Bd. 9. H. 8. 2016 S. 781 - 790
Wendzel, Steffen; Mazurczyk, Wojciech
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.ACM Conference on Computer and Communications Security. 2016 S. 1739 - 1741
Wendzel, Steffen; Keller, Jörg
Security, Privacy and Reliability of Smart Buildings.J. UCS. Bd. 22. H. 9. 2016 S. 1201 - 1202
Eberle, Martin; König, Werner; Drengner, Jan
Storytelling App – jüdische Geschichte mobil erlebenHess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016
Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian
Unified Description for Network Information Hiding Methods.J. UCS. Bd. 22. H. 11. 2016 S. 1456 - 1486
Schneider, Florian; König, Werner; Keßler, Thomas
Vinocheck App – UX Konzept und RealisierungHess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016
Wendzel, Steffen
Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.CoRR. Bd. abs/1609.06664. 2016
Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.CoRR. Bd. abs/1508.04978. 2015
Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen
“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi SteganographyJCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752
Caviglione, Luca; Lalande, Jean-François; Mazurczyk, Wojciech et al.
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.HCI (22). 2015 S. 165 - 177
Anhaus, Eva Maria; Wendzel, Steffen
BACtag: Data Leakage Protection für GebäudeTagungsband der D-A-CH Security 2015. St. Augustin. 2015 S. 1 - 12
Kaur, Jaspreet; Wendzel, Steffen; Meier, Michael
Countermeasures for Covert Channel-Internal Control Protocols.ARES. 2015 S. 422 - 428
Wendzel, Steffen; Palmer, Carolin
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.J. UCS. Bd. 21. H. 12. 2015 S. 1684 - 1705
Wiebel, Alexander; Bruckner, Stefan; Ropinski, Timo
Direct Volume Interaction for Visual Data AnalysisIEEE VIS 2015 Conference (Tutorials). Chicago. 2015
Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.CoRR. Bd. abs/1505.07757. 2015
Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej et al.
Novel Approaches for Security in Building Automation SystemsTagungsband des 14. Sicherheitskongress des BSI. Bonn. 2015 S. 145 - 158
Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard et al.
Pattern-Based Survey and Categorization of Network Covert Channel Techniques.ACM Comput. Surv. Bd. 47. H. 3. 2015 S. 50
Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen et al.
Securing BACnet's Pitfalls.SEC. 2015 S. 616 - 629
Wiebel, Alexander; Isenberg, Tobias; Bruckner, Stefan et al.
Tools and Techniques for Direct Volume Interaction.Eurographics (Tutorials). 2015
Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian
Unified Description for Network Information Hiding Methods.CoRR. Bd. abs/1512.07438. 2015