Steffen Wendzel
Orcid: 0000-0002-1913-5912
According to our database1,
Steffen Wendzel
authored at least 94 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on wendzel.de
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT).
Proceedings of the Sicherheit, 2024
Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Comput. Secur., 2023
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices.
Proceedings of the Energy Informatics - Third Energy Informatics Academy Conference, 2023
2022
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
it Inf. Technol., 2022
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.
Entropy, 2022
Proceedings of the Sicherheit, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Comput. Secur., 2021
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Scientometrics, 2020
Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Trans. Ind. Informatics, 2019
J. Univers. Comput. Sci., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
, 2019
2018
Secur. Commun. Networks, 2018
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.
J. Univers. Comput. Sci., 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the Central European Cybersecurity Conference 2018, 2018
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
J. Cyber Secur. Mobil., 2017
IEEE Secur. Priv., 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
2016
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
J. Univers. Comput. Sci., 2016
Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.
CoRR, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.
J. Univers. Comput. Sci., 2015
J. Commun., 2015
ACM Comput. Surv., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Hidden and under control - A survey and outlook on covert channel-internal control protocols.
Ann. des Télécommunications, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the ISSE 2014, 2014
2013
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase.
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Covert and side channels in buildings and the prototype of a building-aware active warden.
Proceedings of IEEE International Conference on Communications, 2012
Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011
Proceedings of the Communications and Multimedia Security, 2011
2008