Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen
Steffen Wendzel

Prof. Dr. habil. Steffen Wendzel

Zentrum für Technologie und Transfer | ZTT, Hochschule Worms

Erenburgerstraße 19, 67549 Worms, Raum: N 334

  • 06241/509-213
  • 0000-0002-1913-5912
Publikationen
Ergebnisse pro Seite:  100

Dittmann, Jana; Krätzer, Christian; Kiltz, Stefan et al.

Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)

Steffen Wendzel et al. (Hrsg). GI Sicherheit 2024. Bonn. 2024 S. 265 - 268 (LNI P-345)


Zillien, Sebastian; Schmidbauer, Tobias; Kubek, Mario et al.

Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION

Proc. 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). New York: ACM 2024 S. 1 - 16


Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.

Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)

Bonn. 2024 306 S. (LNI P-345)


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech

Avoiding Research Tribal Wars Using Taxonomies

Computer. Bd. 56. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 93 - 96 10008941


Schorr, Victoria; Kamenev, Nikolai; Bleistein, Thomas et al.

Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices

Energy Informatics. Bern: Springer 2023 S. 224 - 239


Mileva, Aleksandra; Wendzel, Steffen; Franqueira, Virginia

Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference: Stavanger, Norway

EICC. New York: ACM 2023


Schilling, Alexander; Aehle, Max; Alme, Johan et al.

Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter

Physics in Medicine & Biology. Bd. 68. H. 19. IOP Publishing 2023 194001


Zillien, Sebastian; Wendzel, Steffen

Weaknesses of popular and recent covert channel detection methods and a remedy

IEEE Transactions on Dependable and Secure Computing. Bd. 20. H. 6. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 5156 - 5157


Lenz, Julia; Bozakov, Zdravko; Wendzel, Steffen et al.

Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective

Computers & Security. Bd. 130. Elsevier B.V. 2023 103258


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

A Generic Taxonomy for Steganography Methods

New York: Institute of Electrical and Electronics Engineers (IEEE) 2022 (TechRxiv)


Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Analysis of Reversible Network Covert Channels

IEEE Access. Bd. 10. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 41226 - 41238


Hartmann, Laura; Wendzel, Steffen

Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 3. Innovative Information Science & Technology Research Group (ISYOU) 2022 S. 4 - 24


Schmidbauer, Tobias; Keller, Jörg; Wendzel, Steffen

Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication

Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM 2022 S. 1 - 10 50:1-10


Schmidbauer, Tobias; Wendzel, Steffen

Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 1. 2022 S. 137 - 166


Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.

Did You See That? A Covert Channel Exploiting Recent Legitimate Traffic

Cornell University: arXiv 2022 2212.11850


Wendzel, Steffen; Mazurczyk, Wojciech; Caviglione, Luca et al.

Emerging topics in defending networked systems

Future Generation Computer Systems. Bd. 128. Elsevier B.V. 2022 S. 317 - 319


Wendzel, Steffen; Caviglione, Luca; Mileva, Aleksandra et al.

Guest editorial: Information security methodology and replication studies

it - Information Technology. Bd. 64. H. 1-2. Walter de Gruyter GmbH 2022 S. 1 - 3


Mileva, Aleksandra; Velinov, Aleksandar; Dimitrova, Vesna et al.

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection

Entropy. Bd. 24. H. 2. MDPI 2022 S. 1 - 23 176


Caviglione, Luca; Wendzel, Steffen; Vrhovec, Simon et al.

Security and Privacy Issues of Home Globalization

IEEE Security & Privacy. Bd. 20. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 10 - 11


Mayer, Nico; Wendzel, Steffen; Keller, Jörg

Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen

Wressnegger, Christian u. a. (Hrsg). Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) : 5.-8. April 2022 in Karlsruhe. Bonn: Gesellschaft für Informatik e. V. 2022 S. 173 - 182 (GI-Edition. Proceedings ; 323)


Schmidbauer, Tobias; Wendzel, Steffen

SoK: A Survey Of Indirect Network-level Covert Channels

Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (AsiaCCS). New York: ACM 2022 S. 546 - 560


Wendzel, Steffen; Caviglione, Luca; Fechner, Bernhard

Steganography Hiding Patterns: A Brief Review

EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. New York: ACM 2022 S. 107 - 108


Bub, Daniel; Hartmann, Laura; Bozakov, Zdravko et al.

Towards Passive Identification of Aged Android Devices in the Home Network

EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. Barcelona, Spain: ACM 2022 S. 17 - 20


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

A Revised Taxonomy of Steganography Embedding Patterns

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12


Chourib, Mehdi; Wendzel, Steffen; Mazurczyk, Wojciech

Adaptive Warden Strategy for Countering Network Covert Storage Channels

2021 IEEE 46th Conference on Local Computer Networks (LCN). NY: IEEE 2021 S. 148 - 153


Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

Computers & Security. Bd. 104. Elsevier BV 2021 S. 102207


Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen

Crème de la Crème: Lessons from Papers in Security Publications

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9


Hartmann, Laura; Wendzel, Steffen

Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems

Proceedings of the European Interdisciplinary Cybersecurity Conference - Doctoral Symposium. New York: ACM 2021 S. 1 - 6


Hartmann, Laura; Wendzel, Steffen

How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data

Kulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 83 - 84


Schmidbauer, Tobias; Wendzel, Steffen

Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15


Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.

Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks

Acta Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418


Wendzel, Steffen

IT-Sicherheit für TCP/IP- und IoT-Netzwerke

2. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden 2021


Caviglione, Luca; Wendzel, Steffen; Mileva, Aleksandra et al.

Multidisciplinary solutions to modern cybersecurity challenges

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 12. H. 4. 2021 S. 1 - 3


Zillien, Sebastian; Wendzel, Steffen

Reconnection-based Covert Channels in Wireless Networks

Jøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)


Hartmann, Laura; Zillien, Sebastian; Wendzel, Steffen

Reset- and Reconnection-based Covert Channels in CoAP

Kulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 66 - 71


Keller, Jörg; Wendzel, Steffen

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

Applied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742


Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.

Risks and Opportunities for Information Hiding in DICOM Standard

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8


Hartmann, Laura; Wendzel, Steffen

Anomaly Detection in ICS based on Data-history Analysis

Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2


Keller, Jörg; Wendzel, Steffen

Covert Channels in One-Time Passwords Based on Hash Chains

EICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2


Schmidbauer, Tobias; Wendzel, Steffen

Covert storage caches using the NTP protocol.

ARES. 2020 S. 67:1 - 67:10


Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Design and performance evaluation of reversible network covert channels.

ARES. 2020 S. 68:1 - 68:8


Wendzel, Steffen

Network Information Hiding: Terminology, Taxonomy, Methodology and Countermeasures

Hagen (FernUniversität in Hagen). 2020 244 S.


Wendzel, Steffen

Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)

ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026


Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.

Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security Education

Journal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763


Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen

Advanced Information Hiding Techniques for Modern Botnets

Kambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)


Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.

Countering adaptive network covert communication with dynamic wardens

Future Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725


Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.

Covert Channels in the MQTT-Based Internet of Things

IEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915


Wendzel, Steffen; Link, Florian; Eller, Daniela et al.

Detection of Size Modulation Covert Channels Using Countermeasure Variation

Journal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416


Wendzel, Steffen; Plötner, Johannes

Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger

8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.


Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks

Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10


Wendzel, Steffen; Lévy-Bencheton, Cédric; Caviglione, Luca

Not all areas are equal: analysis of citations in information security research

Scientometrics. Bd. 122. H. 1. Springer Science and Business Media LLC 2019 S. 267 - 286


Wendzel, Steffen

Protocol-independent Detection of "Messaging Ordering" Network Covert Channels

Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8


Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen

Recent Advancements in Digital Forensics, Part 2

IEEE Security & Privacy. Bd. 17. H. 1. 2019 S. 7 - 8


Lv, Zhihan; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Recent Advances in Cyber-Physical Security in Industrial Environments

IEEE Transactions on Industrial Informatics. Bd. 2019. Institute of Electrical and Electronics Engineers (IEEE) 2019 S. 1


Mazurczyk, Wojciech; Szary, Przemysław; Wendzel, Steffen et al.

Towards Reversible Storage Network Covert Channels

Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8


Zillien, Sebastian; Wendzel, Steffen

Detection of Covert Channels in TCP Retransmissions

Gruschka, Nils (Hrsg). Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Cham: Springer International Publishing 2018 S. 203 - 218 (LNCS 11252)


Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Emerging and Unconventional: New Attacks and Innovative Detection Techniques

Security and Communication Networks. Bd. 2018. Hindawi Limited 2018 S. 1



Mazurczyk, Wojciech; Wendzel, Steffen

Information hiding: Challenges for forensic experts.

Commun. ACM. Bd. 61. H. 1. 2018 S. 86 - 94


Wendzel, Steffen; Olschewski, Detlef

Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen

Barton, Thomas; Müller, Christian; Seel, Christian (Hrsg). Digitalisierung in Unternehmen. Wiesbaden: Springer-Vieweg 2018 S. 291 - 302 (Angewandte Wirtschaftsinformatik)


Wendzel, Steffen

IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung

1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.


Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech

One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels

Proceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. New York, NY, USA: ACM Press 2018 S. 1 - 6


Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.

The New Threats of Information Hiding: The Road Ahead

IT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39


Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.

ARES. 2018 S. 10:1 - 10:10


Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.

WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.

J. UCS. Bd. 24. H. 5. 2018 S. 556 - 576


Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen

Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.

IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22


Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.

Cyber Security of Smart Buildings

H. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16


Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg

Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.

IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34


Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen

Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGs

Journal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170


Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.

Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach

Proc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

Network Information Hiding and Science 2.0: Can it be a Match?

Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222


Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen

Recent Advancements in Digital Forensics.

IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11


Wendzel, Steffen

Review of `Out-of-band Covert Channels--A Survey'

ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49


Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg

Steganography for Cyber-physical Systems

Journal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126


Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech

The Future of Digital Forensics: Challenges and the Road Ahead.

IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17


Kobekova, Alexandra; Bültermann, Lennart; Tonejc, Jernej et al.

Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT

Tagungsband zum 15. Deutscher IT-Sicherheitskonress des BSI. Bonn: SecuMedia Verlags-GmbH 2017 S. 515 - 526


Kaur, Jaspreet; Wendzel, Steffen; Eissa, Omar et al.

Covert channel-internal control protocols: attacks and defense

Security and Communication Networks. Bd. 9. H. 15. Wiley-Blackwell 2016 S. 2986 - 2997


Wendzel, Steffen; Plötner, Johannes

Einstieg in Linux:Linux verstehen und einsetzen

7., aktualisierte Auflage. Aufl. Bonn: Rheinwerk 2016 409 S.


Wendzel, Steffen

How to increase the security of smart buildings?

Commun. ACM. Bd. 59. H. 5. 2016 S. 47 - 49


Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian et al.

Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications

1. Aufl. New York, NY: John Wiley & Sons 2016 288 S. (IEEE Press Series on Information and Communication Networks Security)


Wendzel, Steffen; Kasem-Madani, Saffija

IoT Security: The Improvement-Decelerating 'Cycle of Blame'

Journal of Cyber Security and Mobility (JCSM), 'Opinion'-Beitrag. Gistrup/Delft: River Publishers 2016


Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.

Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

Security and Communication Networks. Bd. 9. H. 15. 2016 S. 2972 - 2985


Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.

On importance of steganographic cost for network steganography.

Security and Communication Networks. Bd. 9. H. 8. 2016 S. 781 - 790


Wendzel, Steffen; Mazurczyk, Wojciech

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.

ACM Conference on Computer and Communications Security. 2016 S. 1739 - 1741


Wendzel, Steffen; Keller, Jörg

Security, Privacy and Reliability of Smart Buildings.

J. UCS. Bd. 22. H. 9. 2016 S. 1201 - 1202



Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian

Unified Description for Network Information Hiding Methods.

J. UCS. Bd. 22. H. 11. 2016 S. 1456 - 1486



Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen

"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.

CoRR. Bd. abs/1508.04978. 2015


Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen

“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography

JCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752


Caviglione, Luca; Lalande, Jean-François; Mazurczyk, Wojciech et al.

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.

HCI (22). 2015 S. 165 - 177


Anhaus, Eva Maria; Wendzel, Steffen

BACtag: Data Leakage Protection für Gebäude

Tagungsband der D-A-CH Security 2015. St. Augustin. 2015 S. 1 - 12


Kaur, Jaspreet; Wendzel, Steffen; Meier, Michael

Countermeasures for Covert Channel-Internal Control Protocols.

ARES. 2015 S. 422 - 428


Wendzel, Steffen; Palmer, Carolin

Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.

J. UCS. Bd. 21. H. 12. 2015 S. 1684 - 1705


Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.

CoRR. Bd. abs/1505.07757. 2015


Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej et al.

Novel Approaches for Security in Building Automation Systems

Tagungsband des 14. Sicherheitskongress des BSI. Bonn. 2015 S. 145 - 158


Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard et al.

Pattern-Based Survey and Categorization of Network Covert Channel Techniques.

ACM Comput. Surv. Bd. 47. H. 3. 2015 S. 50


Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen et al.

Securing BACnet's Pitfalls.

SEC. 2015 S. 616 - 629


Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian

Unified Description for Network Information Hiding Methods.

CoRR. Bd. abs/1512.07438. 2015


Tonejc, Jernej; Kaur, Jaspreet; Karsten, Adrian et al.

Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making.

HCI (22). 2015 S. 693 - 704