Publications

2019

91.
Wendzel S, Plötner J. Einstieg in Linux . 8 ed. Rheinwerk Verlag; 2019.     [File] 
90.
Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W. Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 64:1—64:10.      [DOI]      [File] 
89.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). ACM; 2019.
88.
Wendzel S. Protocol-independent Detection of "Message Ordering" Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 63:1—63:8.      [DOI]      [File] 
87.
Mazurczyk W, Caviglione L, Wendzel S. Recent Advancements in Digital Forensics, Part 2. IEEE Security and Privacy (S&P). 2019; 17(1):7—8.      [DOI]      [File] 
86.
Lv Z, Mazurczyk W, Wendzel S, Song H. Recent Advances in Cyber-Physical Security in Industrial Environments. IEEE Transactions on Industrial Informatics (TII). 2019; 15(12):6468—6471.      [DOI]      [File] 
85.
Mazurczyk W, Szary P, Wendzel S, Caviglione L. Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 69:1—69:8.      [DOI]      [File] 

2018

84.
Wendzel S. Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 08 20. p. 13:1—13:8.      [DOI]      [File] 
83.
Mazurczyk W, Wendzel S, Cabaj K. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 10:1—10:10.      [DOI]      [File] 
82.
Keidel R, Wendzel S, Zillien S, Conner ES, Haas G. WoDiCoF — A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (J.UCS). 2018 07 17; 24(5):556—576.      [DOI]      [File] 
81.
Leznik M, Volpert S, Griesinger F, Seybold D, Domaschka J. Done yet? A critical introspective of the cloud management toolbox. In: 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC). 2018 Jun.. p. 1—8.
80.
Volpert S, Griesinger F, Domaschka J. Continuous Anything for Distributed Research Projects. Dependability Engineering. 2018; Dependability Engineering23.      [Weblink] 
79.
Zillien S, Wendzel S. Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer; 2018. p. 203—218.      [DOI]      [File] 
78.
Caviglione L, Mazurczyk W, Wendzel S, Zander S. Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Security and Communication Networks (SCN). 2018; 20181—7.      [DOI]      [File] 
77.
Mazurczyk W, Wendzel S. Information Hiding — Challenges for Forensic Experts. Communications of the ACM. 2018; 61(1):86—94.      [DOI]      [File] 
76.
Wendzel S, Olschewski D. Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. In: Springer; 2018.      [DOI] 
75.
Wendzel S. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. 1 ed. Springer; 2018.      [DOI]      [File] 
74.
Wendzel S, Eller D, Mazurczyk W. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC 2018). ACM; 2018. p. 1:1—1:6.      [DOI]      [File] 
73.
Cabaj K, Caviglione L, Mazurczyk W, Wendzel S, Woodward A, Zander S. The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional. 2018; 20(3):31—39.      [DOI]      [File] 

2017

72.
Spenger G, Keler J, Wendzel S. Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM). 2017 Nov. 02; 6(2):147—170.      [DOI]      [File] 
71.
Seybold D, Hauser CB, Volpert S, Domaschka J. Gibbon: An availability evaluation framework for distributed databases. In: On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II. 2017 Sep.. p. 31—49.      [DOI] 
70.
Wendzel S, Tonejc J, Kaur J, Kobekova A. Cyber Security of Smart Buildings. In: H. Song and G. Fink and S. Jeschke, editors. Security and Privacy in Cyber-Physical Systems: Foundations and Applications. Wiley-IEEE Press; 2017 07 17. p. 327—352.      [DOI]      [File] 
69.
Lehner F, Mazurczyk W, Keller J, Wendzel S. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017). IEEE; 2017 07 17. p. 78—85.      [DOI]      [File] 
68.
Keller J, Spenger G, Wendzel S. Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). 2017. p. 17—22.      [DOI]      [File] 
67.
Wendzel S, Mazurczyk W, Haas G. Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). 2017. p. 29—34.      [DOI]      [File]