Publikationen

2024

166.
Keßler R, Volpert S, Wesner S. Towards Improving Resource Allocation for Multi-Tenant HPC Systems: An Exploratory HPC Cluster Utilization Case Study. In: 2024 IEEE International Conference on Cluster Computing Workshops (CLUSTER Workshops). 2024 09 14. p. 66-75.      [DOI] 
165.
Schymiczek J, Schmidbauer T, Wendzel S. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [Datei] 
164.
Strachanski F, Petrov D, Schmidbauer T, Wendzel S. A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [Datei] 
163.
Volpert S, Winkelhofer S, Wesner S, Domaschka J. An Empirical Analysis of Common OCI Runtimes' Performance Isolation Capabilities. In: Proceedings of the 15th ACM/SPEC International Conference on Performance Engineering. 2024. p. 60—70.
162.
Dittmann J, Krätzer C, Kiltz S, Altschaffel R, Vielhauer C, Wendzel S, Wefel S, Nitsch H. Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V. (GI); 2024. p. 265—268.      [DOI]      [Datei] 
161.
Wendzel S, Schmidbauer T, Zillien S, Keller J. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC). 2024; .(.):..      [DOI]      [Datei] 
160.
Wendzel S, Mileva A, Franqueira VNL, Jaatun MG. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. Journal of Universal Computer Science (J.UCS). 2024; 30(9):1137—1139.      [DOI]      [Datei] 
159.
Volpert S, Winkelhofer S, Wesner S, Seybold D, Domaschka J. Exemplary Determination of Cgroups-Based QoS Isolation for a Database Workload. In: Companion of the 15th ACM/SPEC International Conference on Performance Engineering. 2024. p. 235—241.
158.
Wendzel S, Plötner J. Linux. Der Grundkurs. 2 ed. Rheinwerk Verlag; 2024.     [Datei] 
157.
Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S. Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM; 2024. p. 80—95.      [DOI]      [Datei] 
156.
Keller J, Heßeling C, Wendzel S. Robust and Homomorphic Covert Channels in Streams of Numeric Data. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [Datei] 
155.
Wendzel S, Wressnegger C, Hartmann L, Freiling F, Armknecht F, Reinfelder L. Sicherheit 2024 — Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2024.     [Datei] 
154.
Lenz J. Warum Nutzer ihre alternden smarten Geräte ersetzen: Eine Push-Pull-Mooring Perspektive. In: Sicherheit 2024. Bonn: Gesellschaft für Informatik e.V.; 2024. p. 295—300.      [DOI] 

153.
Lenz J, Bozakov Z, Wendzel S, Vrhovec S. Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE). 130103258.      [DOI]      [Datei] 

2023

152.
Volpert S, Erb B, Eisenhart G, Seybold D, Wesner S, Domaschka J. A Methodology and Framework to Determine the Isolation Capabilities of Virtualisation Technologies. In: Proceedings of the 2023 ACM/SPEC International Conference on Performance Engineering. 2023. p. 149—160.
151.
Wendzel S, Caviglione L, Mazurczyk W. Avoiding research tribal wars using taxonomies. IEEE Computer. 2023; 56(1):93—96.      [DOI]      [Datei] 
150.
Aehle M, Alme J, Barnaföldi GG, Blühdorn J, Bodova T, Borshchov V, Brink A, Eikeland VN, Feofilov G, Garth C, Gauger NR, Grøttvik OS, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Kusch L, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, O'Neill G, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Pochampalli R, Protsenko M, Rauch M, Rehman AU, Richter M, Roehrich D, Sagebaum M, Santana J, Schilling A, Seco J, Songmoolnak A, Sudár Á, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Zillien S. Exploration of differentiability in a proton computed tomography simulation framework. Physics in Medicine and Biology. 2023; 68(24):      [DOI]      [Datei] 
149.
Volpert S, Eisenhart G, Domaschka J. Holistic Life-Cycle Management of Cloud-To-Thing Compute Entities. In: 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). 2023. p. 50—55.
148.
Schorr V, Kamenev N, Bleistein T, Werth D, Wendzel S, Weigold T. Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices. In: Proc. Energy Informatics.Academy Conference 2023, Part II. Springer; 2023. p. 224—239.      [DOI]      [Datei] 
147.
Mileva A, Franqueira V, Wendzel S. Proceedings of the European Interdisciplinary Cybersecurity Conference 2023 (EICC 2023). ACM; 2023.      [DOI]      [Datei] 
146.
Volpert S, Eichhammer P, Held F, Huffert T, Reiser HP, Domaschka J. The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures. Future Generation Computer Systems. 2023; 141243—257.
145.
Schilling A, Aehle M, Alme J, Barnaföldi GG, Bodova T, Borshchov V, Brink A, Eikeland VN, Feofilov G, Garth C, Gauger NR, Grøttvik OS, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, O'Neill G, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rauch M, Rehman AU, Richter M, Roehrich D, Santana J, Seco J, Songmoolnak A, Sudár Á, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Zillien S. Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter. Physics in Medicine and Biology. 2023; 68194001.      [DOI]      [Datei] 
144.
Domaschka J, Volpert S, Maier K, Eisenhart G, Seybold D. Using eBPF for Database Workload Tracing: An Explorative Study. In: Companion of the 2023 ACM/SPEC International Conference on Performance Engineering. 2023. p. 311—317.
143.
Zillien S, Wendzel S. Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC). 2023; 20(6):5156—5167.      [DOI]      [Datei] 

2022

142.
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, Zillien S. A Generic Taxonomy for Steganography Methods. TechRxiv. 2022 Jul.;      [DOI]      [Datei]