Prof. Dr. habil. Steffen Wendzel
Zentrum für Technologie und Transfer | ZTT, Hochschule Worms
- 06241/509-213
- 0000-0002-1913-5912
Dittmann, Jana; Krätzer, Christian; Kiltz, Stefan et al.
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)Steffen Wendzel et al. (Hrsg). GI Sicherheit 2024. Bonn. 2024 S. 265 - 268 (LNI P-345)
Zillien, Sebastian; Schmidbauer, Tobias; Kubek, Mario et al.
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProc. 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). New York: ACM 2024 S. 1 - 16
Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.
Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)Bonn. 2024 306 S. (LNI P-345)
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech
Avoiding Research Tribal Wars Using TaxonomiesComputer. Bd. 56. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 93 - 96 10008941
Schorr, Victoria; Kamenev, Nikolai; Bleistein, Thomas et al.
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home DevicesEnergy Informatics. Bern: Springer 2023 S. 224 - 239
Mileva, Aleksandra; Wendzel, Steffen; Franqueira, Virginia
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference: Stavanger, NorwayEICC. New York: ACM 2023
Schilling, Alexander; Aehle, Max; Alme, Johan et al.
Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeterPhysics in Medicine & Biology. Bd. 68. H. 19. IOP Publishing 2023 194001
Zillien, Sebastian; Wendzel, Steffen
Weaknesses of popular and recent covert channel detection methods and a remedyIEEE Transactions on Dependable and Secure Computing. Bd. 20. H. 6. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 5156 - 5157
Lenz, Julia; Bozakov, Zdravko; Wendzel, Steffen et al.
Why People Replace their Aging Smart Devices: A Push–Pull–Mooring PerspectiveComputers & Security. Bd. 130. Elsevier B.V. 2023 103258
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Generic Taxonomy for Steganography MethodsNew York: Institute of Electrical and Electronics Engineers (IEEE) 2022 (TechRxiv)
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Analysis of Reversible Network Covert ChannelsIEEE Access. Bd. 10. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 41226 - 41238
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project HistoryJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 3. Innovative Information Science & Technology Research Group (ISYOU) 2022 S. 4 - 24
Schmidbauer, Tobias; Keller, Jörg; Wendzel, Steffen
Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM 2022 S. 1 - 10 50:1-10
Schmidbauer, Tobias; Wendzel, Steffen
Detection Of Computational Intensive Reversible Covert Channels Based On Packet RuntimeJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 1. 2022 S. 137 - 166
Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.
Did You See That? A Covert Channel Exploiting Recent Legitimate TrafficCornell University: arXiv 2022 2212.11850
Wendzel, Steffen; Mazurczyk, Wojciech; Caviglione, Luca et al.
Emerging topics in defending networked systemsFuture Generation Computer Systems. Bd. 128. Elsevier B.V. 2022 S. 317 - 319
Wendzel, Steffen; Caviglione, Luca; Mileva, Aleksandra et al.
Guest editorial: Information security methodology and replication studiesit - Information Technology. Bd. 64. H. 1-2. Walter de Gruyter GmbH 2022 S. 1 - 3
Mileva, Aleksandra; Velinov, Aleksandar; Dimitrova, Vesna et al.
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based DetectionEntropy. Bd. 24. H. 2. MDPI 2022 S. 1 - 23 176
Caviglione, Luca; Wendzel, Steffen; Vrhovec, Simon et al.
Security and Privacy Issues of Home GlobalizationIEEE Security & Privacy. Bd. 20. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 10 - 11
Mayer, Nico; Wendzel, Steffen; Keller, Jörg
Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-PublikationenWressnegger, Christian u. a. (Hrsg). Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) : 5.-8. April 2022 in Karlsruhe. Bonn: Gesellschaft für Informatik e. V. 2022 S. 173 - 182 (GI-Edition. Proceedings ; 323)
Schmidbauer, Tobias; Wendzel, Steffen
SoK: A Survey Of Indirect Network-level Covert ChannelsProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (AsiaCCS). New York: ACM 2022 S. 546 - 560
Wendzel, Steffen; Caviglione, Luca; Fechner, Bernhard
Steganography Hiding Patterns: A Brief ReviewEICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. New York: ACM 2022 S. 107 - 108
Bub, Daniel; Hartmann, Laura; Bozakov, Zdravko et al.
Towards Passive Identification of Aged Android Devices in the Home NetworkEICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. Barcelona, Spain: ACM 2022 S. 17 - 20
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Revised Taxonomy of Steganography Embedding PatternsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12
Chourib, Mehdi; Wendzel, Steffen; Mazurczyk, Wojciech
Adaptive Warden Strategy for Countering Network Covert Storage Channels2021 IEEE 46th Conference on Local Computer Networks (LCN). NY: IEEE 2021 S. 148 - 153
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers & Security. Bd. 104. Elsevier BV 2021 S. 102207
Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen
Crème de la Crème: Lessons from Papers in Security PublicationsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9
Hartmann, Laura; Wendzel, Steffen
Detection of Anomalous Values within TIA Project Data History for Industrial Control SystemsProceedings of the European Interdisciplinary Cybersecurity Conference - Doctoral Symposium. New York: ACM 2021 S. 1 - 6
Hartmann, Laura; Wendzel, Steffen
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world DataKulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 83 - 84
Schmidbauer, Tobias; Wendzel, Steffen
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15
Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.
Investigating particle track topology for range telescopes in particle radiography using convolutional neural networksActa Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418
Wendzel, Steffen
IT-Sicherheit für TCP/IP- und IoT-Netzwerke2. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden 2021
Caviglione, Luca; Wendzel, Steffen; Mileva, Aleksandra et al.
Multidisciplinary solutions to modern cybersecurity challengesJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 12. H. 4. 2021 S. 1 - 3
Zillien, Sebastian; Wendzel, Steffen
Reconnection-based Covert Channels in Wireless NetworksJøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)
Hartmann, Laura; Zillien, Sebastian; Wendzel, Steffen
Reset- and Reconnection-based Covert Channels in CoAPKulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 66 - 71
Keller, Jörg; Wendzel, Steffen
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash ChainsApplied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742
Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.
Risks and Opportunities for Information Hiding in DICOM StandardARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection in ICS based on Data-history AnalysisProceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Keller, Jörg; Wendzel, Steffen
Covert Channels in One-Time Passwords Based on Hash ChainsEICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Schmidbauer, Tobias; Wendzel, Steffen
Covert storage caches using the NTP protocol.ARES. 2020 S. 67:1 - 67:10
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Design and performance evaluation of reversible network covert channels.ARES. 2020 S. 68:1 - 68:8
Wendzel, Steffen
Network Information Hiding: Terminology, Taxonomy, Methodology and CountermeasuresHagen (FernUniversität in Hagen). 2020 244 S.
Wendzel, Steffen
Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026
Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.
Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security EducationJournal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen
Advanced Information Hiding Techniques for Modern BotnetsKambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)
Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.
Countering adaptive network covert communication with dynamic wardensFuture Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725
Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.
Covert Channels in the MQTT-Based Internet of ThingsIEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915
Wendzel, Steffen; Link, Florian; Eller, Daniela et al.
Detection of Size Modulation Covert Channels Using Countermeasure VariationJournal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.
Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-WalksProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10
Wendzel, Steffen; Lévy-Bencheton, Cédric; Caviglione, Luca
Not all areas are equal: analysis of citations in information security researchScientometrics. Bd. 122. H. 1. Springer Science and Business Media LLC 2019 S. 267 - 286
Wendzel, Steffen
Protocol-independent Detection of "Messaging Ordering" Network Covert ChannelsProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics, Part 2IEEE Security & Privacy. Bd. 17. H. 1. 2019 S. 7 - 8
Lv, Zhihan; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Recent Advances in Cyber-Physical Security in Industrial EnvironmentsIEEE Transactions on Industrial Informatics. Bd. 2019. Institute of Electrical and Electronics Engineers (IEEE) 2019 S. 1
Mazurczyk, Wojciech; Szary, Przemysław; Wendzel, Steffen et al.
Towards Reversible Storage Network Covert ChannelsProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8
Zillien, Sebastian; Wendzel, Steffen
Detection of Covert Channels in TCP RetransmissionsGruschka, Nils (Hrsg). Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Cham: Springer International Publishing 2018 S. 203 - 218 (LNCS 11252)
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Emerging and Unconventional: New Attacks and Innovative Detection TechniquesSecurity and Communication Networks. Bd. 2018. Hindawi Limited 2018 S. 1
Wendzel, Steffen
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research.ARES. 2018 S. 13:1 - 13:8
Mazurczyk, Wojciech; Wendzel, Steffen
Information hiding: Challenges for forensic experts.Commun. ACM. Bd. 61. H. 1. 2018 S. 86 - 94
Wendzel, Steffen; Olschewski, Detlef
Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von UnternehmenBarton, Thomas; Müller, Christian; Seel, Christian (Hrsg). Digitalisierung in Unternehmen. Wiesbaden: Springer-Vieweg 2018 S. 291 - 302 (Angewandte Wirtschaftsinformatik)
Wendzel, Steffen
IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.
Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert ChannelsProceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. New York, NY, USA: ACM Press 2018 S. 1 - 6
Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.
The New Threats of Information Hiding: The Road AheadIT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.ARES. 2018 S. 10:1 - 10:10
Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.J. UCS. Bd. 24. H. 5. 2018 S. 556 - 576
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22
Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.
Cyber Security of Smart BuildingsH. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170
Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring ApproachProc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
Network Information Hiding and Science 2.0: Can it be a Match?Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11
Wendzel, Steffen
Review of `Out-of-band Covert Channels--A Survey'ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Steganography for Cyber-physical SystemsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech
The Future of Digital Forensics: Challenges and the Road Ahead.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17
Kobekova, Alexandra; Bültermann, Lennart; Tonejc, Jernej et al.
Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-ITTagungsband zum 15. Deutscher IT-Sicherheitskonress des BSI. Bonn: SecuMedia Verlags-GmbH 2017 S. 515 - 526
Kaur, Jaspreet; Wendzel, Steffen; Eissa, Omar et al.
Covert channel-internal control protocols: attacks and defenseSecurity and Communication Networks. Bd. 9. H. 15. Wiley-Blackwell 2016 S. 2986 - 2997
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux:Linux verstehen und einsetzen7., aktualisierte Auflage. Aufl. Bonn: Rheinwerk 2016 409 S.
Wendzel, Steffen
How to increase the security of smart buildings?Commun. ACM. Bd. 59. H. 5. 2016 S. 47 - 49
Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian et al.
Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications1. Aufl. New York, NY: John Wiley & Sons 2016 288 S. (IEEE Press Series on Information and Communication Networks Security)
Wendzel, Steffen; Kasem-Madani, Saffija
IoT Security: The Improvement-Decelerating 'Cycle of Blame'Journal of Cyber Security and Mobility (JCSM), 'Opinion'-Beitrag. Gistrup/Delft: River Publishers 2016
Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissionsSecurity and Communication Networks. Bd. 9. H. 15. 2016 S. 2972 - 2985
Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.
On importance of steganographic cost for network steganography.Security and Communication Networks. Bd. 9. H. 8. 2016 S. 781 - 790
Wendzel, Steffen; Mazurczyk, Wojciech
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.ACM Conference on Computer and Communications Security. 2016 S. 1739 - 1741
Wendzel, Steffen; Keller, Jörg
Security, Privacy and Reliability of Smart Buildings.J. UCS. Bd. 22. H. 9. 2016 S. 1201 - 1202
Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian
Unified Description for Network Information Hiding Methods.J. UCS. Bd. 22. H. 11. 2016 S. 1456 - 1486
Wendzel, Steffen
Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.CoRR. Bd. abs/1609.06664. 2016
Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.CoRR. Bd. abs/1508.04978. 2015
Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen
“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi SteganographyJCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752
Caviglione, Luca; Lalande, Jean-François; Mazurczyk, Wojciech et al.
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.HCI (22). 2015 S. 165 - 177
Anhaus, Eva Maria; Wendzel, Steffen
BACtag: Data Leakage Protection für GebäudeTagungsband der D-A-CH Security 2015. St. Augustin. 2015 S. 1 - 12
Kaur, Jaspreet; Wendzel, Steffen; Meier, Michael
Countermeasures for Covert Channel-Internal Control Protocols.ARES. 2015 S. 422 - 428
Wendzel, Steffen; Palmer, Carolin
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.J. UCS. Bd. 21. H. 12. 2015 S. 1684 - 1705
Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.CoRR. Bd. abs/1505.07757. 2015
Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej et al.
Novel Approaches for Security in Building Automation SystemsTagungsband des 14. Sicherheitskongress des BSI. Bonn. 2015 S. 145 - 158
Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard et al.
Pattern-Based Survey and Categorization of Network Covert Channel Techniques.ACM Comput. Surv. Bd. 47. H. 3. 2015 S. 50
Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen et al.
Securing BACnet's Pitfalls.SEC. 2015 S. 616 - 629
Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian
Unified Description for Network Information Hiding Methods.CoRR. Bd. abs/1512.07438. 2015
Tonejc, Jernej; Kaur, Jaspreet; Karsten, Adrian et al.
Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making.HCI (22). 2015 S. 693 - 704