Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen
Steffen Wendzel

Prof. Dr. habil. Steffen Wendzel

ZFT | Zentrum für Forschung und Technologie, Hochschule Worms

  • 0000-0002-1913-5912
Publikationen
Ergebnisse pro Seite:  10

Wendzel, Steffen; Caviglione, Luca; Fechner, Bernhard

Steganography Hiding Patterns: A Brief Review

EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. New York: ACM 2022 S. 107 - 108


Bub, Daniel; Hartmann, Laura; Bozakov, Zdravko et al.

Towards Passive Identification of Aged Android Devices in the Home Network

EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. Barcelona, Spain: ACM 2022 S. 17 - 20


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

A Revised Taxonomy of Steganography Embedding Patterns

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12


Chourib, Mehdi; Wendzel, Steffen; Mazurczyk, Wojciech

Adaptive Warden Strategy for Countering Network Covert Storage Channels

2021 IEEE 46th Conference on Local Computer Networks (LCN). NY: IEEE 2021 S. 148 - 153


Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

Computers & Security. Bd. 104. Elsevier BV 2021 S. 102207


Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen

Crème de la Crème: Lessons from Papers in Security Publications

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9


Hartmann, Laura; Wendzel, Steffen

Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems

Proceedings of the European Interdisciplinary Cybersecurity Conference - Doctoral Symposium. New York: ACM 2021 S. 1 - 6


Hartmann, Laura; Wendzel, Steffen

How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data

Kulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 83 - 84


Schmidbauer, Tobias; Wendzel, Steffen

Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15


Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.

Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks

Acta Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418