Folgen
Steffen Wendzel
Steffen Wendzel
Hochschule Worms/FernUniversität in Hagen, Germany
Bestätigte E-Mail-Adresse bei hs-worms.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Pattern-based survey and categorization of network covert channel techniques
S Wendzel, S Zander, B Fechner, C Herdin
ACM Computing Surveys (CSUR) 47 (3), 1-26, 2015
2072015
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
1882016
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
1612017
The new threats of information hiding: The road ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT professional 20 (3), 31-39, 2018
1182018
Hiding privacy leaks in android applications using low-attention raising covert channels
JF Lalande, S Wendzel
2013 international conference on availability, reliability and security, 701-710, 2013
682013
Information hiding: challenges for forensic experts
W Mazurczyk, S Wendzel
Communications of the ACM 61 (1), 86-94, 2017
672017
Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet
S Wendzel, B Kahler, T Rist
2012 IEEE International Conference on Green Computing and Communications …, 2012
552012
Hidden and uncontrolled–on the emergence of network steganographic threats
S Wendzel, W Mazurczyk, L Caviglione, M Meier
ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014
472014
Covert channels in the MQTT-based Internet of Things
A Velinov, A Mileva, S Wendzel, W Mazurczyk
IEEE Access 7, 161899-161915, 2019
432019
Cyber security of smart buildings
S Wendzel, J Tonejc, J Kaur, A Kobekova
Security and Privacy in Cyber-Physical Systems: Foundations and Applications, 2017
422017
Securing BACnet’s pitfalls
J Kaur, J Tonejc, S Wendzel, M Meier
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
422015
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
A Mileva, A Velinov, L Hartmann, S Wendzel, W Mazurczyk
Computers & security 104, 102207, 2021
382021
A Revised Taxonomy of Steganography Embedding Patterns
S Wendzel, L Caviglione, W Mazurczyk, A Mileva, J Dittmann, C Krätzer, ...
ARES 2021: The 16th International Conference on Availability, Reliability …, 2021
322021
Towards deriving insights into data hiding methods using pattern-based approach
W Mazurczyk, S Wendzel, K Cabaj
Proceedings of the 13th International Conference on Availability …, 2018
312018
Hidden and under control: A survey and outlook on covert channel-internal control protocols
S Wendzel, J Keller
annals of telecommunications-annales des télécommunications 69, 417-430, 2014
312014
Low-attention forwarding for mobile network covert channels
S Wendzel, J Keller
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011
312011
Envisioning smart building botnets
S Wendzel, V Zwanger, M Meier, S Szlósarczyk
Gesellschaft für Informatik eV, 2014
292014
Detecting protocol switching covert channels
S Wendzel, S Zander
37th Annual IEEE Conference on Local Computer Networks, 280-283, 2012
292012
Countering adaptive network covert communication with dynamic wardens
W Mazurczyk, S Wendzel, M Chourib, J Keller
Future Generation Computer Systems 94, 712-725, 2019
282019
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
K Szczypiorski, A Janicki, S Wendzel
Journal of Communications (JCM) 10 (10), 747-752, 2015
282015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20