Steffen Wendzel
Steffen Wendzel
Worms University of Applied Sciences / Fraunhofer FKIE
Потвърден имейл адрес: hs-worms.de - Начална страница
ЗаглавиеПозоваванияГодина
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
812016
Pattern-based survey and categorization of network covert channel techniques
S Wendzel, S Zander, B Fechner, C Herdin
ACM Computing Surveys (CSUR) 47 (3), 50, 2015
772015
Hiding privacy leaks in android applications using low-attention raising covert channels
JF Lalande, S Wendzel
2013 International Conference on Availability, Reliability and Security, 701-710, 2013
462013
Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet
S Wendzel, B Kahler, T Rist
2012 IEEE International Conference on Green Computing and Communications …, 2012
352012
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
312017
Hidden and uncontrolled–on the emergence of network steganographic threats
S Wendzel, W Mazurczyk, L Caviglione, M Meier
ISSE 2014 Securing Electronic Business Processes, 123-133, 2014
282014
Securing BACnet’s pitfalls
J Kaur, J Tonejc, S Wendzel, M Meier
IFIP International Information Security and Privacy Conference, 616-629, 2015
212015
Praxisbuch Netzwerksicherheit
S Wendzel, J Plötner
Galileo-Computing, 2007
20*2007
Low-attention forwarding for mobile network covert channels
S Wendzel, J Keller
IFIP International Conference on Communications and Multimedia Security, 122-133, 2011
192011
The new threats of information hiding: The road ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT Professional 20 (3), 31-39, 2018
182018
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
K Szczypiorski, A Janicki, S Wendzel
arXiv preprint arXiv:1508.04978, 2015
172015
Hidden and under control
S Wendzel, J Keller
annals of telecommunications-annales des télécommunications 69 (7-8), 417-430, 2014
172014
Information hiding: Challenges for forensic experts
W Mazurczyk, S Wendzel
Communications of the ACM 61 (1), 86-94, 2017
162017
Envisioning smart building botnets
S Wendzel, V Zwanger, M Meier, S Szlósarczyk
Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 2014
152014
Protocol Channels
S Wendzel
arXiv preprint arXiv:0809.1949, 2008
15*2008
Dynamic routing in covert channel overlays based on control protocols
P Backs, S Wendzel, J Keller
2012 International Conference for Internet Technology and Secured …, 2012
14*2012
Systematic engineering of control protocols for covert channels
S Wendzel, J Keller
IFIP International Conference on Communications and Multimedia Security, 131-144, 2012
142012
Detecting protocol switching covert channels
S Wendzel, S Zander
37th Annual IEEE Conference on Local Computer Networks, 280-283, 2012
132012
Design and implementation of an active warden addressing protocol switching covert channels
S Wendzel, J Keller
Proc. 7th International Conference on Internet Monitoring and Protection …, 2012
132012
On importance of steganographic cost for network steganography
W Mazurczyk, S Wendzel, I Azagra Villares, K Szczypiorski
Security and Communication Networks 9 (8), 781-790, 2016
122016
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20