Prof. Dr. habil. Steffen Wendzel
ZFT | Zentrum für Forschung und Technologie, Hochschule Worms
Wendzel, Steffen
Network Information Hiding: Terminology, Taxonomy, Methodology and CountermeasuresHagen (FernUniversität in Hagen). 2020 244 S.
Wendzel, Steffen
Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026
Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.
Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security EducationJournal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen
Advanced Information Hiding Techniques for Modern BotnetsKambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)
Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.
Countering adaptive network covert communication with dynamic wardensFuture Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725
Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.
Covert Channels in the MQTT-Based Internet of ThingsIEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915
Wendzel, Steffen; Link, Florian; Eller, Daniela et al.
Detection of Size Modulation Covert Channels Using Countermeasure VariationJournal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.
Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-WalksProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10
Wendzel, Steffen; Lévy-Bencheton, Cédric; Caviglione, Luca
Not all areas are equal: analysis of citations in information security researchScientometrics. Bd. 122. H. 1. Springer Science and Business Media LLC 2019 S. 267 - 286
