Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Generic Taxonomy for Steganography MethodsNew York: Institute of Electrical and Electronics Engineers (IEEE) 2022 (TechRxiv)
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Analysis of Reversible Network Covert ChannelsIEEE Access. Bd. 10. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 41226 - 41238
Barton, Thomas; Peuker, Andreas
Analysis of Travel Blogs by Means of Bayesian Statistics: First Insights for Destinations in Australia and New ZealandBöhm, Stephan; Suntrayuth, Sid (Hrsg). Proceedings of the IWEMB 2020: Fourth International Workshop on Entrepreneurship in Electronic and Mobile Business. Norderstedt: PubliQation - Wissenschaft veröffentlichen 2022 S. 9 - 22
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project HistoryJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 3. Innovative Information Science & Technology Research Group (ISYOU) 2022 S. 4 - 24
Schmidbauer, Tobias; Keller, Jörg; Wendzel, Steffen
Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM 2022 S. 1 - 10 50:1-10
Simon, Carlo; Zakfeld, Lara; Haag, Stefan
Das Process-Simulation: Center Prototyp eines Integrierten Managementsystems für Lehre, Forschung und PraxisEggert, Sandy; Lemke, Claudia; Majuntke, Verena; Malzahn, Birte; Meister, Vera G.; Simbeck, Katharina; Czarnecki, Christian; Wolf, Martin (Hrsg). AKWI-Tagungsband zur 35. AKWI-Jahrestagung. Berlin: GITO 2022 S. 344 - 351
Aehle, Max; Alme, Johan; Keidel, Ralf et al.
Derivatives in Proton CTarXiv.org (Hrsg). E-Print Archiv. Genf, Schweiz. 2022 S. 1 - 25
Schmidbauer, Tobias; Wendzel, Steffen
Detection Of Computational Intensive Reversible Covert Channels Based On Packet RuntimeJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 1. 2022 S. 137 - 166
Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.
Did You See That? A Covert Channel Exploiting Recent Legitimate TrafficCornell University: arXiv 2022 2212.11850
Simon, Carlo
Digitalisierung und Industrie 4.0Arnold, Christian; Günther, Jens (Hrsg). Arbeitsrecht 4.0. 2. Aufl. München: Beck 2022 S. 1 - 26