Publikationen

2017

66.
Wendzel S, Caviglione L, Mazurczyk W, Lalande J. Network Information Hiding and Science 2.0: Can it be a Match?. International Journal of Electronics and Telecommunications (IJET). 2017; 62(2):217—222.      [DOI]      [Datei] 
65.
Mazurczyk W, Caviglione L, Wendzel S. Recent Advancements in Digital Forensics — Part 1. IEEE Security and Privacy (S&P). 2017; 15(6):10—11.      [DOI]      [Datei] 
64.
Wendzel S, Mazurczyk W, Haas G. Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM). 2017; 6(2):105—126.      [DOI]      [Datei] 
63.
Caviglione L, Wendzel S, Mazurczyk W. The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy. 2017; 15(6):12—17.      [DOI]      [Datei] 
62.
Kobekova A, Bültermann L, Tonejc J, Wendzel S. Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2017. p. 515—526.     [Datei] 

2016

61.
Wendzel S, Mazurczyk W, Zander S. A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (J.UCS). 2016; 22(11):1456—1486.      [DOI]      [Datei] 
60.
Kaur J, Wendzel S, Eissa O, Tonejc J, Meier M. Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN). 2016; 9(15):2986—2997.      [DOI]      [Datei] 
59.
Wendzel S, Ploetner J. Einstieg in Linux. 7 ed. Rheinwerk Verlag; 2016.
58.
Wendzel S. How to Increase the Security of Smart Buildings. Communications of the ACM (CACM). 2016; 59(5):47–49.      [DOI]      [Datei] 
57.
Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K. Information Hiding in Communication Networks. Fundamentals, Mechanisms, and Applications. Wiley-IEEE; 2016.      [DOI] 
56.
Wendzel S, Kasem-Madani S. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Journal of Cyber Security and Mobility (JCSM). 2016;      [DOI]      [Datei] 
55.
Naumann M, Wendzel S, Mazurczyk W, Keller J. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN). 2016; 9(15):2972—2985.      [DOI]      [Datei] 
54.
Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K. On importance of steganographic cost for network steganography. Security and Communication Networks (SCN). 2016; 9(8):781—790.      [DOI]      [Datei] 
53.
Wendzel S, Mazurczyk W. Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). New York, NY, USA: ACM; 2016. p. 1739–1741.      [DOI]      [Datei] 
52.
Meier M, Reinhardt D, Wendzel S. Sicherheit 2016 — Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2016.     [Datei] 
51.
Wendzel S, Keller J. Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS). 2016; 22(9):1201—1202.      [DOI]      [Datei] 

2015

50.
Szczypiorski K, Janicki A, Wendzel S. "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT 2015). 2015. p. 747—752.      [DOI]      [Datei] 
49.
Caviglione L, Lalande J, Mazurczyk W, Wendzel S. Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 165—177.      [DOI]      [Datei] 
48.
Anhaus EM, Wendzel S. BACtag — Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec; 2015. p. 417—248.     [Datei] 
47.
Kaur J, Wendzel S, Meier M. Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop. 2015. p. 422—428.      [DOI]      [Datei] 
46.
Wendzel S, Palmer C. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.. Journal of Universal Computer Science (J.UCS). 2015; 21(12):1684—1705.      [DOI]      [Datei] 
45.
Kaur J, Herdin C, Tonejc J, Wendzel S, Meier M, Szlósarczyk S. Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2015. p. 148—155.
44.
Wendzel S, Zander S, Fechner B, Herdin C. Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR). 2015; 47(3):1—26.      [DOI]      [Datei] 
43.
Kaur J, Tonejc J, Wendzel S, Meier M. Securing BACnet's pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). 2015. p. 616—629.      [DOI]      [Datei] 
42.
Tonejc J, Kaur J, Karsten A, Wendzel S. Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 693—704.      [DOI]      [Datei]