default search action
Steffen Wendzel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Fabian Strachanski, Denis Petrov, Tobias Schmidbauer, Steffen Wendzel:
A Comprehensive Pattern-based Overview of Stegomalware. ARES 2024: 77:1-77:10 - [c50]Jörg Keller, Carina Heßeling, Steffen Wendzel:
Robust and Homomorphic Covert Channels in Streams of Numeric Data. ARES 2024: 79:1-79:4 - [c49]Jeff Schymiczek, Tobias Schmidbauer, Steffen Wendzel:
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. ARES 2024: 80:1-80:10 - [c48]Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel:
Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. AsiaCCS 2024 - [c47]Jana Dittmann, Christian Krätzer, Stefan Kiltz, Robert Altschaffel, Claus Vielhauer, Steffen Wendzel, Sandro Wefel, Holger Nitsch:
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). Sicherheit 2024: 265-269 - [e4]Steffen Wendzel, Christian Wressnegger, Laura Hartmann, Felix C. Freiling, Frederik Armknecht, Lena Reinfelder:
Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024. LNI P-345, Gesellschaft für Informatik e.V. 2024, ISBN 978-3-88579-739-5 [contents] - 2023
- [j37]Julia Lenz, Zdravko Bozakov, Steffen Wendzel, Simon Vrhovec:
Why people replace their aging smart devices: A push-pull-mooring perspective. Comput. Secur. 130: 103258 (2023) - [j36]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk:
Avoiding Research Tribal Wars Using Taxonomies. Computer 56(1): 93-96 (2023) - [j35]Sebastian Zillien, Steffen Wendzel:
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy. IEEE Trans. Dependable Secur. Comput. 20(6): 5156-5167 (2023) - [c46]Victoria Schorr, Nikolai Kamenev, Thomas Bleistein, Dirk Werth, Steffen Wendzel, Thomas Weigold:
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices. EI.A (2) 2023: 224-239 - [e3]Aleksandra Mileva, Steffen Wendzel, Virginia N. L. Franqueira:
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023. ACM 2023, ISBN 978-1-4503-9829-9 [contents] - 2022
- [j34]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Analysis of Reversible Network Covert Channels. IEEE Access 10: 41226-41238 (2022) - [j33]Aleksandra Mileva, Aleksandar Velinov, Vesna Dimitrova, Luca Caviglione, Steffen Wendzel:
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy 24(2): 176 (2022) - [j32]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr:
Emerging topics in defending networked systems. Future Gener. Comput. Syst. 128: 317-319 (2022) - [j31]Luca Caviglione, Steffen Wendzel, Simon Vrhovec, Aleksandra Mileva:
Security and Privacy Issues of Home Globalization. IEEE Secur. Priv. 20(1): 10-11 (2022) - [j30]Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Guest editorial: Information security methodology and replication studies. it Inf. Technol. 64(1-2): 1-3 (2022) - [j29]Tobias Schmidbauer, Steffen Wendzel:
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 137-166 (2022) - [j28]Laura Hartmann, Steffen Wendzel:
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 4-24 (2022) - [c45]Tobias Schmidbauer, Jörg Keller, Steffen Wendzel:
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. ARES 2022: 50:1-50:10 - [c44]Tobias Schmidbauer, Steffen Wendzel:
SoK: A Survey Of Indirect Network-level Covert Channels. AsiaCCS 2022: 546-560 - [c43]Daniel Bub, Laura Hartmann, Zdravko Bozakov, Steffen Wendzel:
Towards Passive Identification of Aged Android Devices in the Home Network. EICC 2022: 17-20 - [c42]Steffen Wendzel, Luca Caviglione, Bernhard Fechner:
Steganography Hiding Patterns: A Brief Review. EICC 2022: 107-108 - [c41]Nico Mayer, Steffen Wendzel, Jörg Keller:
Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. Sicherheit 2022: 173-182 - [i18]Max Aehle, Johan Alme, Gergely Gábor Barnaföldi, Johannes Blühdorn, Tea Bodova, Vyacheslav Borshchov, Anthony van den Brink, Mamdouh Chaar, Viljar Eikeland, Gregory Feofilov, Christoph Garth, Nicolas R. Gauger, Georgi Genov, Ola Grøttvik, Håvard Helstrup, Sergey Igolkin, Ralf Keidel, Chinorat Kobdaj, Tobias Kortus, Viktor Leonhardt, Shruti Mehendale, Raju Ningappa Mulawade, Odd Harald Odland, George O'Neill, Gábor Papp, Thomas Peitzmann, Helge Egil Seime Pettersen, Pierluigi Piersimoni, Rohit Pochampalli, Maksym Protsenko, Max Rauch, Attiq Ur Rehman, Matthias Richter, Dieter Röhrich, Max Sagebaum, Joshua Santana, Alexander Schilling, Joao Seco, Arnon Songmoolnak, Jarle Rambo Sølie, Ganesh Tambave, Ihor Tymchuk, Kjetil Ullaland, Monika Varga-Kofarago, Lennart Volz, Boris Wagner, Steffen Wendzel, Alexander Wiebel, RenZheng Xiao, Shiming Yang, Hiroki Yokoyama, Sebastian Zillien:
Derivatives in Proton CT. CoRR abs/2202.05551 (2022) - [i17]Steffen Wendzel, Tobias Schmidbauer, Sebastian Zillien, Jörg Keller:
Did You See That? A Covert Channel Exploiting Recent Legitimate Traffic. CoRR abs/2212.11850 (2022) - 2021
- [j27]Aleksandra Mileva, Aleksandar Velinov, Laura Hartmann, Steffen Wendzel, Wojciech Mazurczyk:
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Comput. Secur. 104: 102207 (2021) - [j26]Luca Caviglione, Steffen Wendzel, Aleksandra Mileva, Simon Vrhovec:
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 1-3 (2021) - [c40]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. ARES 2021: 67:1-67:12 - [c39]Tobias Schmidbauer, Steffen Wendzel:
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. ARES 2021: 71:1-71:10 - [c38]Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova:
Risks and Opportunities for Information Hiding in DICOM Standard. ARES 2021: 74:1-74:8 - [c37]Simon Vrhovec, Luca Caviglione, Steffen Wendzel:
Crème de la Crème: Lessons from Papers in Security Publications. ARES 2021: 92:1-92:9 - [c36]Laura Hartmann, Sebastian Zillien, Steffen Wendzel:
Reset- and Reconnection-based Covert Channels in CoAP. EICC 2021: 66-71 - [c35]Laura Hartmann, Steffen Wendzel:
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data. EICC 2021: 83-84 - [c34]Laura Hartmann, Steffen Wendzel:
Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. EICC 2021: 91-97 - [c33]Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk:
Adaptive Warden Strategy for Countering Network Covert Storage Channels. LCN 2021: 148-153 - [c32]Sebastian Zillien, Steffen Wendzel:
Reconnection-Based Covert Channels in Wireless Networks. SEC 2021: 118-133 - [i16]Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller:
Countering Adaptive Network Covert Communication with Dynamic Wardens. CoRR abs/2103.00433 (2021) - [i15]Steffen Wendzel:
Protocol-independent Detection of "Messaging Ordering" Network Covert Channels. CoRR abs/2103.00499 (2021) - [i14]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. CoRR abs/2106.08654 (2021) - [i13]Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk:
Adaptive Warden Strategy for Countering Network Covert Storage Channels. CoRR abs/2111.03310 (2021) - 2020
- [j25]Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Information Security Methodology, Replication Studies and Information Security Education. J. Univers. Comput. Sci. 26(7): 762-763 (2020) - [j24]Steffen Wendzel, Cédric Lévy-Bencheton, Luca Caviglione:
Not all areas are equal: analysis of citations in information security research. Scientometrics 122(1): 267-286 (2020) - [c31]Tobias Schmidbauer, Steffen Wendzel:
Covert storage caches using the NTP protocol. ARES 2020: 67:1-67:10 - [c30]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Design and performance evaluation of reversible network covert channels. ARES 2020: 68:1-68:8 - [c29]Jörg Keller, Steffen Wendzel:
Covert Channels in One-Time Passwords Based on Hash Chains. EICC 2020: 13:1-13:2 - [c28]Laura Hartmann, Steffen Wendzel:
Anomaly Detection in ICS based on Data-history Analysis. EICC 2020: 14:1-14:2 - [e2]Luca Caviglione, Aleksandra Mileva, Steffen Wendzel:
EICC 2020: European Interdisciplinary Cybersecurity Conference, Rennes, France, November 18, 2020. ACM 2020, ISBN 978-1-4503-7599-3 [contents]
2010 – 2019
- 2019
- [b2]Steffen Wendzel:
Network information hiding: terminology, taxonomy, methodology and countermeasures. Fernuniversität Hagen, Germany, 2019, pp. 1-224 - [j23]Aleksandar Velinov, Aleksandra Mileva, Steffen Wendzel, Wojciech Mazurczyk:
Covert Channels in the MQTT-Based Internet of Things. IEEE Access 7: 161899-161915 (2019) - [j22]Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller:
Countering adaptive network covert communication with dynamic wardens. Future Gener. Comput. Syst. 94: 712-725 (2019) - [j21]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics, Part 2. IEEE Secur. Priv. 17(1): 7-8 (2019) - [j20]Steffen Wendzel, Florian Link, Daniela Eller, Wojciech Mazurczyk:
Detection of Size Modulation Covert Channels Using Countermeasure Variation. J. Univers. Comput. Sci. 25(11): 1396-1416 (2019) - [j19]Zhihan Lv, Wojciech Mazurczyk, Steffen Wendzel, Houbing Song:
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments. IEEE Trans. Ind. Informatics 15(12): 6468-6471 (2019) - [c27]Steffen Wendzel:
Protocol-independent Detection of "Messaging Ordering" Network Covert Channels. ARES 2019: 63:1-63:8 - [c26]Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, Wojciech Mazurczyk:
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks. ARES 2019: 64:1-64:10 - [c25]Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione:
Towards Reversible Storage Network Covert Channels. ARES 2019: 69:1-69:8 - 2018
- [j18]Wojciech Mazurczyk, Steffen Wendzel:
Information hiding: Challenges for forensic experts. Commun. ACM 61(1): 86-94 (2018) - [j17]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: The Road Ahead. IT Prof. 20(3): 31-39 (2018) - [j16]Ralf Keidel, Steffen Wendzel, Sebastian Zillien, Eric S. Conner, Georg Haas:
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. J. Univers. Comput. Sci. 24(5): 556-576 (2018) - [j15]Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Secur. Commun. Networks 2018: 9672523:1 (2018) - [c24]Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj:
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. ARES 2018: 10:1-10:10 - [c23]Steffen Wendzel:
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research. ARES 2018: 13:1-13:8 - [c22]Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk:
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. CECC 2018: 1:1-1:6 - [c21]Sebastian Zillien, Steffen Wendzel:
Detection of Covert Channels in TCP Retransmissions. NordSec 2018: 203-218 - [i12]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: the Road Ahead. CoRR abs/1801.00694 (2018) - 2017
- [j14]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics. IEEE Secur. Priv. 15(6): 10-11 (2017) - [j13]Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk:
The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Secur. Priv. 15(6): 12-17 (2017) - [j12]Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
Steganography for Cyber-physicalSystems. J. Cyber Secur. Mobil. 6(2): 105-126 (2017) - [j11]Jörg Keller, Gabriele Spenger, Steffen Wendzel:
Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs. J. Cyber Secur. Mobil. 6(2): 147-170 (2017) - [c20]Florian Lehner, Wojciech Mazurczyk, Jörg Keller, Steffen Wendzel:
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach. LCN 2017: 78-85 - [c19]Jörg Keller, Gabriele Spenger, Steffen Wendzel:
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators. IEEE Symposium on Security and Privacy Workshops 2017: 17-22 - [c18]Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems. IEEE Symposium on Security and Privacy Workshops 2017: 29-34 - 2016
- [j10]Steffen Wendzel:
How to increase the security of smart buildings? Commun. ACM 59(5): 47-49 (2016) - [j9]Steffen Wendzel, Jörg Keller:
Security, Privacy and Reliability of Smart Buildings. J. Univers. Comput. Sci. 22(9): 1201-1202 (2016) - [j8]Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander:
Unified Description for Network Information Hiding Methods. J. Univers. Comput. Sci. 22(11): 1456-1486 (2016) - [j7]Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On importance of steganographic cost for network steganography. Secur. Commun. Networks 9(8): 781-790 (2016) - [j6]Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller:
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Secur. Commun. Networks 9(15): 2972-2985 (2016) - [j5]Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc, Michael Meier:
Covert channel-internal control protocols: attacks and defense. Secur. Commun. Networks 9(15): 2986-2997 (2016) - [c17]Steffen Wendzel, Wojciech Mazurczyk:
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. CCS 2016: 1739-1741 - [e1]Michael Meier, Delphine Reinhardt, Steffen Wendzel:
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. April 2016, Bonn. LNI P-256, GI 2016, ISBN 978-3-88579-650-3 [contents] - [i11]Steffen Wendzel:
Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography. CoRR abs/1609.06664 (2016) - 2015
- [j4]Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin:
Pattern-Based Survey and Categorization of Network Covert Channel Techniques. ACM Comput. Surv. 47(3): 50:1-50:26 (2015) - [j3]Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
"The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography. J. Commun. 10(10): 747-752 (2015) - [j2]Steffen Wendzel, Carolin Palmer:
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. J. Univers. Comput. Sci. 21(12): 1684-1705 (2015) - [c16]Jaspreet Kaur, Steffen Wendzel, Michael Meier:
Countermeasures for Covert Channel-Internal Control Protocols. ARES 2015: 422-428 - [c15]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. HCI (22) 2015: 165-177 - [c14]Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel:
Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making. HCI (22) 2015: 693-704 - [c13]Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier:
Securing BACnet's Pitfalls. SEC 2015: 616-629 - [i10]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. CoRR abs/1502.00868 (2015) - [i9]Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel:
Visualizing BACnet data to facilitate humans in building-security decision-making. CoRR abs/1502.06460 (2015) - [i8]Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller:
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. CoRR abs/1505.07757 (2015) - [i7]Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. CoRR abs/1508.04978 (2015) - [i6]Steffen Wendzel, Carolin Palmer:
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. CoRR abs/1511.08507 (2015) - [i5]Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander:
Unified Description for Network Information Hiding Methods. CoRR abs/1512.07438 (2015) - 2014
- [j1]Steffen Wendzel, Jörg Keller:
Hidden and under control - A survey and outlook on covert channel-internal control protocols. Ann. des Télécommunications 69(7-8): 417-430 (2014) - [c12]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. ISSE 2014: 123-133 - [c11]Steffen Wendzel, Viviane Zwanger, Michael Meier, Sebastian Szlósarczyk:
Envisioning Smart Building Botnets. Sicherheit 2014: 319-329 - [c10]Sebastian Szlósarczyk, Steffen Wendzel, Jaspreet Kaur, Michael Meier, Frank Schubert:
Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet. Sicherheit 2014: 407-418 - [i4]Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On Importance of Steganographic Cost For Network Steganography. CoRR abs/1406.2519 (2014) - [i3]Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin:
A Pattern-based Survey and Categorization of Network Covert Channel Techniques. CoRR abs/1406.2901 (2014) - [i2]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. CoRR abs/1407.2029 (2014) - 2013
- [b1]Steffen Wendzel:
Novel approaches for network covert storage channels. FernUniversität in Hagen, 2013 - [c9]Jean-François Lalande, Steffen Wendzel:
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. ARES 2013: 701-710 - 2012
- [c8]Steffen Wendzel, Jörg Keller:
Systematic Engineering of Control Protocols for Covert Channels. Communications and Multimedia Security 2012: 131-144 - [c7]Steffen Wendzel, Benjamin Kahler, Thomas Rist:
Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet. GreenCom 2012: 731-736 - [c6]Steffen Wendzel:
Covert and side channels in buildings and the prototype of a building-aware active warden. ICC 2012: 6753-6758 - [c5]Peter Backs, Steffen Wendzel, Jörg Keller:
Dynamic routing in covert channel overlays based on control protocols. ICITST 2012: 32-39 - [c4]Steffen Wendzel, Sebastian Zander:
Detecting protocol switching covert channels. LCN 2012: 280-283 - [c3]Steffen Wendzel:
The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase. Sicherheit 2012: 149-161 - 2011
- [c2]Steffen Wendzel, Jörg Keller:
Low-Attention Forwarding for Mobile Network Covert Channels. Communications and Multimedia Security 2011: 122-133 - [c1]Steffen Wendzel, Thomas Rist, Elisabeth André, Masood Masoodian:
A secure interoperable architecture for building-automation applications. ISABEL 2011: 8:1-8:5
2000 – 2009
- 2008
- [i1]Steffen Wendzel:
Protocol channels as a new design alternative of covert channels. CoRR abs/0809.1949 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint