Unsere letzten Publikationen
102.
Hartmann L,
Wendzel S.
Anomaly Detection in ICS Based on Data-History Analysis. In:
Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020).
New York, NY, USA:
ACM;
2020.
[DOI]
[Datei]
101.
Keller J,
Wendzel S.
Covert Channels in One-Time Passwords Based on Hash Chains. In:
Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020).
New York, NY, USA:
ACM;
2020.
[DOI]
[Datei]
100.
Schmidbauer T,
Wendzel S.
Covert Storage Caches Using the NTP Protocol. In:
Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020).
New York, NY, USA:
ACM;
2020.
[DOI]
[Datei]
99.
Szary P,
Mazurczyk W,
Wendzel S,
Caviglione L.
Design and Performance Evaluation of Reversible Network Covert Channels. In:
Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020).
New York, NY, USA:
ACM;
2020.
[DOI]
[Datei]
98.
Seybold D,
Volpert S,
Wesner S,
Bauer A,
Herbst N,
Domaschka J.
Kaa: Evaluating elasticity of cloud-hosted dbms. In:
2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
11 ed.
IEEE;
2019 Dez..
p. 54—61.