Publikationen

2021

116.
Caviglione L, Wendzel S, Mileva A, Vrhovec S. Multidisciplinary Solutions to Modern Cybersecurity Challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 2021; 12(3):1—3.      [DOI]      [Datei] 
115.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2021). ACM; 2021.
114.
Zillien S, Wendzel S. Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang, Audun and Futcher, Lynn and Hagen, Janne, editors. ICT Systems Security and Privacy Protection (IFIP SEC 2021). Cham: Springer International Publishing; 2021. p. 118—133.      [DOI]      [Datei] 
113.
Hartmann L, Zillien S, Wendzel S. Reset- and Reconnection-based Covert Channels in CoAP. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [Datei] 
112.
Keller J, Wendzel S. Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences. 2021; 11(2):      [DOI]      [Datei] 
111.
Mileva A, Caviglione L, Velinov A, Wendzel S, Dimitrova V. Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [Datei] 
110.
Aehle M, Alme J, Barnaföldi GG, Borshchov V, Bodova T, Brink A, Eikeland V, Garth C, Gauger NR, Genov G, Grøttvik O, Feofilov G, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rehman AU, Richter M, Röhrich D, Samnøy AT, Schilling A, Seco J, Songmoolnak A, Sølie JR, Tambave G, Tymchuk I, Ullaland K, Varga-Köfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S. The Bergen proton CT system. In: 12th International Conference on Position Sensitive Detectors (PSD 2021). IOP Publishing; 2021. p. C02051.      [DOI]      [Datei] 

2020

109.
Domaschka J, Volpert S, Seybold D. Hathi: an MCDM-based approach to capacity planning for cloud-hosted DBMS. In: 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC). 13 ed. IEE/ACM; 2020 Dez.. p. 143—154.
108.
Seybold D, Volpert S, Domaschka J. Mowgli. SPEC Research Group. 2020 Nov.;      [Weblink] 
107.
Hartmann L, Wendzel S. Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
106.
Keller J, Wendzel S. Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
105.
Schmidbauer T, Wendzel S. Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
104.
Szary P, Mazurczyk W, Wendzel S, Caviglione L. Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
103.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Information Security Methodology, Replication Studies and Information Security Education. Journal of Universal Computer Science (J.UCS). 2020; 26(7):762—763.      [DOI]      [Datei] 
102.
Wendzel S, Lévy-Bencheton C, Caviglione L. Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics. 2020; 122(1):267—286.      [DOI]      [Datei] 
101.
Seybold D, Hauser CB, Eisenhart G, Volpert S, Domaschka J. Performance Results of a Containerized MongoDB DBMS. 2020;
100.
Caviglione L, Mileva A, Wendzel S. Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC 2020). ACM; 2020.      [DOI]      [Datei] 
99.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020). ACM; 2020.

2019

98.
Seybold D, Volpert S, Wesner S, Bauer A, Herbst N, Domaschka J. Kaa: Evaluating elasticity of cloud-hosted dbms. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 11 ed. IEEE; 2019 Dez.. p. 54—61.
97.
Seybold D, Hauser CB, Eisenhart G, Volpert S, Domaschka J. The impact of the storage tier: A baseline performance analysis of containerized dbms. In: Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers 24. 2019 Okt.. p. 93—105.
96.
Schanzel B, Leznik M, Volpert S, Domaschka J, Wesner S. Unified Container Environments for Scientific Cluster Scenarios. 2019 Apr.;      [Weblink] 
95.
Caviglione L, Mazurczyk W, Wendzel S. Advanced Information Hiding Techniques for Modern Botnets. In: G. Kambourakis and others, editors. Botnets: Architectures, Countermeasures, and Challenges. Taylor & Francis; 2019. p. 165—188.      [DOI]      [Datei] 
94.
Mazurczyk W, Wendzel S, Chourib M, Keller J. Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS). 2019; 94712—725.      [DOI]      [Datei] 
93.
Velinov A, Mileva A, Wendzel S, Mazurczyk W. Covert Channels in the MQTT-based Internet of Things. ACCESS. 2019; 7161899—161915.      [DOI]      [Datei] 
92.
Wendzel S, Link F, Eller D, Mazurczyk W. Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (J.UCS). 2019; 25(11):1396—1416.      [DOI]      [Datei]