Publications
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2014
41.
Kaur J,
Meier M,
Szlósarczyk S,
Wendzel S.
A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In:
Proc. SECURWARE 2014.
Iaria;
2014.
[File]
40.
Wendzel S,
Ploetner J.
Einstieg in Linux .
6 ed.
Galileo Press;
2014.
39.
Wendzel S,
Zwanger V,
Meier M,
Szlósarczyk S.
Envisioning smart building botnets. In:
Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2014.
[File]
35.
Wendzel S,
Herdin C,
Wirth R,
Masoodian M,
Luz S,
Kaur J.
Mosaic-chart based visualization in building automation systems. In:
Proceedings of the 9th Future Security Research Conference.
Fraunhofer Verlag/MEV Verlag, Berlin;
2014.
p. 687—690.
[File]
34.
Kaur J,
Wendzel S.
Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In:
Proceedings Computer Science Conference for University of Bonn Students (CSCUBS).
2014.
[File]
33.
Szlósarczyk S,
Wendzel S,
Kaur J,
Meier M,
Schubert F.
Towards suppressing attacks on and improving resilience of building automation systems — an approach exemplified using BACnet. In:
Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2014.
[File]
2013
32.
Lalande J,
Wendzel S.
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In:
Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013).
IEEE;
2013.
p. 701—710.
[DOI]
31.
Kahler B,
Wendzel S.
How to own a building? Wardriving gegen die Gebäude-Automation. In:
Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen.
BoD;
2013.
p. H1—H13.
[File]
30.
Pohl C,
Schinzel S,
Wendzel S.
Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013).
Gesellschaft für Informatik e.V. (GI);
2013.
[File]
2012
29.
Wendzel S.
Control Protocols for Network Covert Channels. In:
Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01.
Gesellschaft für Informatik, FB Sicherheit, SIG SIDAR;
2012.
p. 24.
27.
Wendzel S,
Kahler B,
Rist T.
Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In:
2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom 2012).
2012.
p. 731—736.
[DOI]
[File]
26.
Wendzel S,
Keller J.
Design and implementation of an active warden addressing protocol switching covert channels. In:
Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012).
2012.
p. 1—6.
[File]
24.
Backs P,
Wendzel S,
Keller J.
Dynamic routing in covert channel overlays based on control protocols. In:
2012 International Conference for Internet Technology and Secured Transactions (ICITST 2012).
2012.
p. 32—39.
[File]
23.
Wendzel S,
Keller J.
Einführung in die Forschungsthematik der verdeckten Kanäle. In:
Informationstechnologie und Sicherheitspolitik — Wird der dritte Weltkrieg im Internet ausgetragen?.
BoD;
2012.
p. 115—124.
[File]
22.
Wendzel S,
Ploetner J.
Einstieg in Linux .
5 ed.
Galileo Press;
2012.
21.
Ploetner J,
Wendzel S.
Linux. Das umfassende Handbuch .
5 ed.
Galileo Press;
2012.
[File]
20.
Rist T,
Wendzel S,
Masoodian M,
Andre E.
Techniken für Menschen im nächsten Jahrzehnt – Beiträge zum Usability Day X.
Pabst Science Publishers;
2012.
p. 80—87.
[File]
19.
Wendzel S,
Keller J.
Preventing Protocol Switching Covert Channels.
International Journal on Advances in Security.
2012;
5(3 and 4):
[DOI]
17.
Wendzel S.
The problem of traffic normalization within a covert channel's network environment learning phase. In:
Sicherheit 2012 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2012.
p. 149—161.
[File]