Unsere letzten Publikationen
32.
Pohl C,
Schinzel S,
Wendzel S.
Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013).
Gesellschaft für Informatik e.V. (GI);
2013.
[Datei]
31.
Lalande J,
Wendzel S.
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In:
Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013).
IEEE;
2013.
p. 701—710.
[DOI]
30.
Kahler B,
Wendzel S.
How to own a building? Wardriving gegen die Gebäude-Automation. In:
Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen.
BoD;
2013.
p. H1—H13.
[Datei]
29.
Wendzel S,
Keller J.
Preventing Protocol Switching Covert Channels.
International Journal on Advances in Security.
2012;
5(3 and 4):
[DOI]
28.
Wendzel S,
Ploetner J.
Einstieg in Linux .
5 ed.
Galileo Press;
2012.