Publications

2022

141.
Szary P, Mazurczyk W, Wendzel S, Caviglione L. Analysis of Reversible Network Covert Channels. ACCESS. 2022; 1041226—41238.      [DOI]      [File] 
140.
Hartmann L, Wendzel S. Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 2022; 13(3):4—24.      [DOI]      [File] 
139.
Volpert S, Eisenhart G, Domaschka J. Are Kubernetes CNI solutions ready for> 10 Gbit/s?. 2022;
138.
Schmidbauer T, Keller J, Wendzel S. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022). ACM; 2022.      [DOI]      [File] 
137.
Schmidbauer T, Wendzel S. Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 2022; 13(1):137—166.      [DOI]      [File] 
136.
Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A. Emerging Topics in Defending Networked Systems. Future Generation Computer Systems (FGCS). 2022; 128317—319.      [DOI]      [File] 
135.
Wendzel S, Caviglione L, Mileva A, Lalande J, Mazurczyk W. Guest Editorial: Information Security Methodology and Replication Studies. it — Information Technology (ITIT). 2022; 64(1-2):1—3.      [DOI]      [File] 
134.
Mileva A, Velinov A, Dimitrova V, Caviglione L, Wendzel S. Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy. 2022; 24(2):      [DOI]      [File] 
133.
Wendzel S, Caviglione L, Fechner B. Poster: Steganography Hiding Patterns: A Brief Review. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 107—108.      [DOI]      [File] 
132.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022). ACM; 2022.
131.
Eisenhart G, Volpert S, Braitinger J, Domaschka J. Recognition of Similar NetFlow Data in Decentralised Monitoring Environments. 2022;
130.
Caviglione L, Wendzel S, Vrhovec S, Mileva A. Security and Privacy Issues of Home Globalization. Security and Privacy (S&P). 2022; 20(1):10—11.      [DOI]      [File] 
129.
Mayer N, Wendzel S, Keller J. Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. In: GI Sicherheit 2022 — Sicherheit, Schutz und Zuverlässigkeit. 2022. p. 173—182.      [DOI]      [File] 
128.
Schmidbauer T, Wendzel S. SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM; 2022. p. 546—560.      [DOI]      [File] 
127.
Bub D, Hartmann L, Bozakov Z, Wendzel S. Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 17—20.      [DOI]      [File] 

2021

126.
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T. A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [File] 
125.
Chourib M, Wendzel S, Mazurczyk W. Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: 46th IEEE Conference on Local Computer Networks (LCN 2021). IEEE; 2021. p. 148—153.     [File] 
124.
Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security. 2021; 104102207.      [DOI]      [File] 
123.
Vrhovec S, Caviglione L, Wendzel S. Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [File] 
122.
Hartmann L, Wendzel S. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [File] 
121.
Hartmann L, Wendzel S. How Feasible are Steganographic and Stealth Attacks on TIA Project Meta-data of ICS: A Case Study with Real-world Data. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [File] 
120.
Schmidbauer T, Wendzel S. Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [File] 
119.
Pettersen H, Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Piersimoni P, Protsenko M, Rehman A, Richter M, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S, Röhrich D. Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks. Acta Oncologica. 2021; 60(11):1413—1418.      [DOI]      [File] 
118.
Wendzel S. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung . 2 ed. Springer; 2021.      [DOI]      [File] 
117.
Wendzel S, Plötner J. Linux. Der Grundkurs . 1 ed. Rheinwerk Verlag; 2021.     [File]