Publications
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2022
139.
Volpert S,
Eisenhart G,
Domaschka J.
Are Kubernetes CNI solutions ready for> 10 Gbit/s?.
2022;
132.
Wendzel S,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022).
ACM;
2022.
131.
Eisenhart G,
Volpert S,
Braitinger J,
Domaschka J.
Recognition of Similar NetFlow Data in Decentralised Monitoring Environments.
2022;
2021
126.
Wendzel S,
Caviglione L,
Mazurczyk W,
Mileva A,
Dittmann J,
Krätzer C,
Lamshöft K,
Vielhauer C,
Hartmann L,
Keller J,
Neubert T.
A Revised Taxonomy of Steganography Embedding Patterns. In:
Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021).
ACM;
2021.
[DOI]
[File]
125.
Chourib M,
Wendzel S,
Mazurczyk W.
Adaptive Warden Strategy for Countering Network Covert Storage Channels. In:
46th IEEE Conference on Local Computer Networks (LCN 2021).
IEEE;
2021.
p. 148—153.
[File]
119.
Pettersen H,
Aehle M,
Alme J,
Barnaföldi G,
Borshchov V,
Brink A,
Chaar M,
Eikeland V,
Gregory F,
Garth C,
Gauger N,
Genov G,
Grøttvik O,
Helstrup H,
Igolkin S,
Keidel R,
Kobdaj C,
Kortus T,
Leonhardt V,
Mehendale S,
Mulawade R,
Odland O,
Papp G,
Peitzmann T,
Piersimoni P,
Protsenko M,
Rehman A,
Richter M,
Santana J,
Schilling A,
Seco J,
Songmoolnak A,
Sølie J,
Tambave G,
Tymchuk I,
Ullaland K,
Varga-Kőfaragó M,
Volz L,
Wagner B,
Wendzel S,
Wiebel A,
Xiao R,
Yang S,
Yokoyama H,
Zillien S,
Röhrich D.
Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks.
Acta Oncologica.
2021;
60(11):1413—1418.
[DOI]
[File]
117.
Wendzel S,
Plötner J.
Linux. Der Grundkurs .
1 ed.
Rheinwerk Verlag;
2021.
[File]