Diller, Florian; Püschel, Fabian; Stockemer, Julian et al.
Holistic Approach to Modular Open Educational Resources for Computer GraphicsEurographics Education Papers.
Kohler, Jens
Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech). Bd. 11. IEEE 2023 S. 49 - 56
Lilligreen, Gergana; Wiebel, Alexander
Near and Far Interaction for Outdoor Augmented Reality Tree Visualization and Recommendations on Designing Augmented Reality for Use in NatureSN Computer Science. Bd. 4. H. 3. Springer LLC 2023 S. 24801 - 24813
Lilligreen, Gergana; Henkel, Nico; Wiebel, Alexander
Near and Far Interaction for Augmented Reality Tree Visualization OutdoorsProceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. Setúbal: Scitepress 2022 S. 27 - 35
Eschbach, Robin; Messerschmidt, Kai; Keidel, Ralf et al.
Semi-Automatic Particle Tracking for and Visualization of Particle Detector DataBender, Jan; Botsch, Mario; Keim, Daniel A. (Hrsg). Proceedings Vision, Modeling, and Visualization. Genf: The Eurographics Association 2022 8 S.
Diller, Florian; Scheuermann, Gerik; Wiebel, Alexander
Visual Cue Based Corrective Feedback for Motor Skill Training in Mixed Reality: A SurveyTransactions on Visualization and Computer Graphics. Bd. To Appear. IEEE 2022 S. 1
Samsami, Nima; Kurpjuweit, Stephan
A Reference Model for Dialog Management in Conversational Agents in High-Engagement Use CasesArtificial Intellgence -- Application in Life Sciences and Beyond. The Upper Rhine Artificial Intelligence Symposium. Bd. UR-AI 2021. 2021 S. 167 - 174
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Revised Taxonomy of Steganography Embedding PatternsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers & Security. Bd. 104. Elsevier BV 2021 S. 102207
Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen
Crème de la Crème: Lessons from Papers in Security PublicationsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9
Distante, Damiano; Faralli, Stefano; Rittinghaus, Steve et al.
DomainSenticNet: An Ontology and a Methodology Enabling Domain-Aware Sentic ComputingCognitive Computation. Bd. 14. H. 1. Springer LLC 2021 S. 62 - 77
Faralli, Stefano; Rittinghaus, Steve; Samsami, Nima et al.
Emotional Intensity-based Success Prediction Model for Crowdfunded CampaignsInformation Processing & Management. Bd. 58. H. 1. Elsevier B.V. 2021 102394
Schmidbauer, Tobias; Wendzel, Steffen
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15
Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.
Investigating particle track topology for range telescopes in particle radiography using convolutional neural networksActa Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418
Zillien, Sebastian; Wendzel, Steffen
Reconnection-based Covert Channels in Wireless NetworksJøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)
Lilligreen, Gergana; Marsenger, Philipp; Wiebel, Alexander
Rendering Tree Roots Outdoors: A Comparison Between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality VisualizationLecture Notes in Computer Science. Cham: Springer 2021 S. 364 - 380
Keller, Jörg; Wendzel, Steffen
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash ChainsApplied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742
Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.
Risks and Opportunities for Information Hiding in DICOM StandardARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8
Rambach, Jason; Lilligreen, Gergana; Schäfer, Alexander et al.
A survey on applications of augmented, mixed and virtual reality for nature and environmentarXiv: Cornell University 2020 2008.12024
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection in ICS based on Data-history AnalysisProceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Wiebel, Alexander; Keuchel, Sascha; Eckenfels, Magnus et al.
Challenges of and Recommendations for Combining 6-DOF Spatial VR-Interaction with Spherical VideosInstitute of Electrical and Electronics Engineers (IEEE) (Hrsg). TechRxiv. Piscataway: Institute of Electrical and Electronics Engineers (IEEE) 2020 10 S.
Keller, Jörg; Wendzel, Steffen
Covert Channels in One-Time Passwords Based on Hash ChainsEICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Schmidbauer, Tobias; Wendzel, Steffen
Covert storage caches using the NTP protocol.ARES. 2020 S. 67:1 - 67:10
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Design and performance evaluation of reversible network covert channels.ARES. 2020 S. 68:1 - 68:8
Wendzel, Steffen
Network Information Hiding: Terminology, Taxonomy, Methodology and CountermeasuresHagen (FernUniversität in Hagen). 2020 244 S.
Wendzel, Steffen
Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026
Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.
Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security EducationJournal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763
Drengner, Jan; Wiebel, Alexander
Virtuelle Realität im Veranstaltungsmanagement - Einsatz, Nutzen und HerausforderungenZanger, Cornelia (Hrsg). Events und Messen im digitalen Zeitalter. Wiesbaden: Springer Fachmedien 2020 S. 15 - 36
Bruckner, Stefan; Ropinski, Timo; Isenberg, Tobias et al.
A Model of Spatial Directness in Interactive VisualizationIEEE Transactions on Visualization and Computer Graphics. Bd. 25. H. 8. IEEE 2019 S. 2541 - 2528 Online as early access since June 2018
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen
Advanced Information Hiding Techniques for Modern BotnetsKambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)
Lilligreen, Gergana; Keuchel, Sascha; Wiebel, Alexander
Augmented Reality in Higher Education: An Active Learning Approach for a Course in Audiovisual Production16th EuroVR International Conference - EuroVR 2019. Tallin. 2019 S. 1 To appear
Lilligreen, Gergana; Wiebel, Alexander
Augmented Reality in Vorlesung und Übung: Lehre und Interaktion neu gedachtBarton, Thomas ; Müller, Christian ; Seel, Christian (Hrsg). Hochschulen in Zeiten der Digitalisierung : Lehre, Forschung und Organisation. Wiesbaden: Springer Vieweg 2019 S. 221 - 238 (Angewandte Wirtschaftsinformatik)
Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.
Countering adaptive network covert communication with dynamic wardensFuture Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725
Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.
Covert Channels in the MQTT-Based Internet of ThingsIEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915
Wendzel, Steffen; Link, Florian; Eller, Daniela et al.
Detection of Size Modulation Covert Channels Using Countermeasure VariationJournal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.
Wang, Qi; M. Alcaraz Calero, Jose; Ricart-Sanchez, Ruben et al.
Enable Advanced QoS-Aware Network Slicing in 5G Networks for Slice-Based Media Use Cases.IEEE Trans. Broadcast. Bd. 65. H. 2. 2019 S. 444 - 453
Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-WalksProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10
Wendzel, Steffen; Lévy-Bencheton, Cédric; Caviglione, Luca
Not all areas are equal: analysis of citations in information security researchScientometrics. Bd. 122. H. 1. Springer Science and Business Media LLC 2019 S. 267 - 286
Drengner, Jan; König, Werner; Wiebel, Alexander
Pervasive mobile Spiele und Virtual Reality als Instrumente der digitalen Ansprache von Veranstaltungsbesuchern: Auf schaz-Suche beim Rheinland-Pfalz-Tag 2018Zanger, Cornelia (Hrsg). Eventforschung. Wiesbaden: Springer Fachmedien Wiesbaden 2019 S. 227 - 245
Wendzel, Steffen
Protocol-independent Detection of "Messaging Ordering" Network Covert ChannelsProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics, Part 2IEEE Security & Privacy. Bd. 17. H. 1. 2019 S. 7 - 8
Lv, Zhihan; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Recent Advances in Cyber-Physical Security in Industrial EnvironmentsIEEE Transactions on Industrial Informatics. Bd. 2019. Institute of Electrical and Electronics Engineers (IEEE) 2019 S. 1
Mazurczyk, Wojciech; Szary, Przemysław; Wendzel, Steffen et al.
Towards Reversible Storage Network Covert ChannelsProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8
Zillien, Sebastian; Wendzel, Steffen
Detection of Covert Channels in TCP RetransmissionsGruschka, Nils (Hrsg). Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Cham: Springer International Publishing 2018 S. 203 - 218 (LNCS 11252)
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Emerging and Unconventional: New Attacks and Innovative Detection TechniquesSecurity and Communication Networks. Bd. 2018. Hindawi Limited 2018 S. 1
Wendzel, Steffen
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research.ARES. 2018 S. 13:1 - 13:8
Mazurczyk, Wojciech; Wendzel, Steffen
Information hiding: Challenges for forensic experts.Commun. ACM. Bd. 61. H. 1. 2018 S. 86 - 94
Wendzel, Steffen; Olschewski, Detlef
Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von UnternehmenBarton, Thomas; Müller, Christian; Seel, Christian (Hrsg). Digitalisierung in Unternehmen. Wiesbaden: Springer-Vieweg 2018 S. 291 - 302 (Angewandte Wirtschaftsinformatik)
Wendzel, Steffen
IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.