Wojciech Mazurczyk

Orcid: 0000-0002-8509-4127

Affiliations:
  • Warsaw University of Technology, Institute of Telecommunications, Poland
  • University of Hagen, Faculty of Mathematics and Computer Science, Germany


According to our database1, Wojciech Mazurczyk authored at least 200 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
You Can't Do That on Protocols Anymore: Analysis of Covert Channels in IETF Standards.
IEEE Netw., September, 2024

A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods.
IEEE Trans. Comput. Soc. Syst., August, 2024

Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective.
Commun. ACM, March, 2024

Federated learning secure model: A framework for malicious clients detection.
SoftwareX, 2024

Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments.
Comput. Networks, 2024

Digital Watermarking - A Meta-Survey and Techniques for Fake News Detection.
IEEE Access, 2024

Strategies to Use Harvesters in Trustworthy Fake News Detection Systems.
Proceedings of the Advances in Computational Collective Intelligence, 2024

Disinformation detection and source tracking using semi-fragile watermarking and blockchain.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Investigating HTTP Covert Channels Through Fuzz Testing.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Deep Learning for Combating Misinformation in Multicategorical Text Contents.
Sensors, December, 2023

A Long-Term Perspective of the Internet Susceptibility to Covert Channels.
IEEE Commun. Mag., October, 2023

Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023

Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures.
Comput. Networks, July, 2023

STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Avoiding Research Tribal Wars Using Taxonomies.
Computer, 2023

AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Comput. Secur., 2023

Malware Classification Using Open Set Recognition and HTTP Protocol Requests.
Proceedings of the Computer Security - ESORICS 2023, 2023

Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Proof-of-work based new encoding scheme for information hiding purposes.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Security Architecture in the SILVANUS project.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022

Code Layering for the Detection of Network Covert Channels in Agentless Systems.
IEEE Trans. Netw. Serv. Manag., 2022

IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration.
SoftwareX, 2022

Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Adaptive Matrix Pattern Steganography on RGB Images.
J. Cyber Secur. Mobil., 2022

Misinformation Detection on Social Media: Challenges and the Road Ahead.
IT Prof., 2022

Guest editorial: Information security methodology and replication studies.
it Inf. Technol., 2022

Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022

Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things.
IEEE Internet Things Mag., 2022

Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things: Part 2.
IEEE Internet Things Mag., 2022

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022

Never Mind the Malware, Here's the Stegomalware.
IEEE Secur. Priv., 2022

Emerging topics in defending networked systems.
Future Gener. Comput. Syst., 2022

Information Hiding in Digital Textual Contents: Techniques and Current Challenges.
Computer, 2022

Analysis of Reversible Network Covert Channels.
IEEE Access, 2022

Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Limitations of Web Cryptojacking Detection: A Practical Evaluation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method.
Sensors, 2021

Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Hfinger: Malware HTTP Request Fingerprinting.
Entropy, 2021

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels.
Comput. Secur., 2021

Kernel-level tracing for detecting stegomalware and covert channels in Linux environments.
Comput. Networks, 2021

Cyber reconnaissance techniques.
Commun. ACM, 2021

Novel user authentication method based on body composition analysis.
Ann. des Télécommunications, 2021

Context-Aware Software Vulnerability Classification Using Machine Learning.
IEEE Access, 2021

Information Hiding Using Minification.
IEEE Access, 2021

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Adaptive Warden Strategy for Countering Network Covert Storage Channels.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Do Dark Web and Cryptocurrencies Empower Cybercriminals?
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

Retransmission steganography in real-world scenarios: a practical study.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Data Hiding Using Code Obfuscation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust.
IEEE Wirel. Commun., 2020

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario.
IEEE Trans. Netw. Serv. Manag., 2020

Characterizing Anomalies in Malware-Generated HTTP Traffic.
Secur. Commun. Networks, 2020

Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020

Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

VoIP network covert channels to enhance privacy and information sharing.
Future Gener. Comput. Syst., 2020

Special issue on Advancements in 5G Networks Security.
Future Gener. Comput. Syst., 2020

Efficient distributed network covert channels for Internet of things environments†.
J. Cybersecur., 2020

Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning.
IEEE Access, 2020

Sniffing Detection Based on Network Traffic Probing and Machine Learning.
IEEE Access, 2020

Providing End-to-End Security Using Quantum Walks in IoT Networks.
IEEE Access, 2020

Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Covert Channels in Transport Layer Security.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Network and Application Layer Services for High Performance Communications in Buildings.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2020

Design and performance evaluation of reversible network covert channels.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Exploiting minification for data hiding purposes.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Distributed packet inspection for network security purposes in software-defined networking environments.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Trans. Ind. Informatics, 2019

Smart Television Services Using NFV/SDN Network Management.
IEEE Trans. Broadcast., 2019

Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.
Secur. Commun. Networks, 2019

Detection of Size Modulation Covert Channels Using Countermeasure Variation.
J. Univers. Comput. Sci., 2019

Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes.
J. Univers. Comput. Sci., 2019

Cyberattack Detection and Response.
J. Univers. Comput. Sci., 2019

Recent Advancements in Digital Forensics, Part 2.
IEEE Secur. Priv., 2019

Countering adaptive network covert communication with dynamic wardens.
Future Gener. Comput. Syst., 2019

Efficient quantum-based security protocols for information sharing and data protection in 5G networks.
Future Gener. Comput. Syst., 2019

(In)Secure Android Debugging: Security analysis and lessons learned.
Comput. Secur., 2019

Mobile Communications and Networks.
IEEE Commun. Mag., 2019

Covert Channels in the MQTT-Based Internet of Things.
IEEE Access, 2019

Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Teaching Android Mobile Security.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

IPv6 Covert Channels in the Wild.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Towards Reversible Storage Network Covert Channels.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
User perspective and security of a new mobile authentication method.
Telecommun. Syst., 2018

Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Secur. Commun. Networks, 2018

Technical and Social Aspects of Critical Infrastructure Security.
J. Univers. Comput. Sci., 2018

The New Threats of Information Hiding: The Road Ahead.
IT Prof., 2018

Cybersecurity: trends, issues, and challenges.
EURASIP J. Inf. Secur., 2018

Exploiting IP telephony with silence suppression for hidden data transfers.
Comput. Secur., 2018

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics.
Comput. Electr. Eng., 2018

Information hiding: Challenges for forensic experts.
Commun. ACM, 2018

One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

A review of network vulnerabilities scanning tools: types, capabilities and functioning.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Utilization of Covert Channels as a Green Networking Technique.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018


2017
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox.
IEEE Trans. Ind. Informatics, 2017

Steganography for Cyber-physicalSystems.
J. Cyber Secur. Mobil., 2017

Recent Advancements in Digital Forensics.
IEEE Secur. Priv., 2017

The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Secur. Priv., 2017

Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017

Traffic Measurements for Cyber Security.
IEEE Commun. Mag., 2017

Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016

Guest Editors' Introduction: Special Issue on Cyber Crime.
IEEE Trans. Dependable Secur. Comput., 2016

Steganography in IEEE 802.11 OFDM symbols.
Secur. Commun. Networks, 2016

Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
Secur. Commun. Networks, 2016

On importance of steganographic cost for network steganography.
Secur. Commun. Networks, 2016

Trends in modern information hiding: techniques, applications, and detection.
Secur. Commun. Networks, 2016

Cyber Crime.
Secur. Commun. Networks, 2016

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall.
IEEE Netw., 2016

YouSkyde: information hiding for Skype video traffic.
Multim. Tools Appl., 2016

Unified Description for Network Information Hiding Methods.
J. Univers. Comput. Sci., 2016

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average.
EURASIP J. Wirel. Commun. Netw., 2016

Bio-inspired cyber security for communications and networking.
IEEE Commun. Mag., 2016

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Influence of speech codecs selection on transcoding steganography.
Telecommun. Syst., 2015

On the undetectability of transcoding steganography.
Secur. Commun. Networks, 2015

Security-A Perpetual War: Lessons from Nature.
IT Prof., 2015

Information Hiding as a Challenge for Malware Detection.
IEEE Secur. Priv., 2015

Towards a Systematic View on Cybersecurity Ecology.
CoRR, 2015

Steganography in Modern Smartphones and Mitigation Techniques.
IEEE Commun. Surv. Tutorials, 2015

Understanding Information Hiding in iOS.
Computer, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
On steganography in lost audio packets.
Secur. Commun. Networks, 2014

Using transcoding for hidden communication in IP telephony.
Multim. Tools Appl., 2014

Advances in digital media security and right management.
Multim. Syst., 2014

Insights from the Nature for Cybersecurity.
CoRR, 2014

Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment.
CoRR, 2014

How to covertly leak data from iOS?
CoRR, 2014

Principles and overview of network steganography.
IEEE Commun. Mag., 2014

Trends in steganography.
Commun. ACM, 2014

Network forensics and challenges for cybersecurity.
Ann. des Télécommunications, 2014

Steganalysis of transcoding steganography.
Ann. des Télécommunications, 2014

Improving Hard Disk Contention-Based Covert Channel in Cloud Computing.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

2013
On information hiding in retransmissions.
Telecommun. Syst., 2013

PadSteg: introducing inter-protocol steganography.
Telecommun. Syst., 2013

Trends in modern information hiding: techniques, applications and detection.
Secur. Commun. Networks, 2013

SkyDe: a Skype-based Steganographic Method.
Int. J. Comput. Commun. Control, 2013

VoIP steganography and its Detection - A survey.
ACM Comput. Surv., 2013

StegTorrent: A Steganographic Method for the P2P File Sharing Service.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Multi-segment Green Light Optimal Speed Advisory.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

Vehicular ad hoc networks for joint traffic and mobility management.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

2012
Toward network steganography detection.
Telecommun. Syst., 2012

Evaluation of steganographic methods for oversized IP packets.
Telecommun. Syst., 2012

Towards Quality of Experience-based reputation models for future web service provisioning.
Telecommun. Syst., 2012

Lost audio packets steganography: the first practical evaluation.
Secur. Commun. Networks, 2012

Security and privacy issues for the network of the future.
Secur. Commun. Networks, 2012

What are suspicious VoIP delays?
Multim. Tools Appl., 2012

Multilevel Steganography: Improving Hidden Communication in Networks.
J. Univers. Comput. Sci., 2012

The Advent of Steganography in Computing Environments
CoRR, 2012

Hiding information in a Stream Control Transmission Protocol.
Comput. Commun., 2012

Toward Effective and Reliable Digital Forensics.
Comput. J., 2012

Towards steganography detection through network traffic visualisation.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

2011
Retransmission steganography and its detection.
Soft Comput., 2011

What more can be learnt about BitTorrent from meta-data files and μTorrent logs?
CoRR, 2011

Is Cloud Computing Steganography-proof?
CoRR, 2011

How Hidden Can Be Even More Hidden?
CoRR, 2011

Sending Hidden Data via Google Suggest
CoRR, 2011

Multi-Level Steganography: Improving Hidden Communication in Networks
CoRR, 2011

2010
LACK - a VoIP steganographic method.
Telecommun. Syst., 2010

Retransmission Steganography Applied
CoRR, 2010

Hiding Data in OFDM Symbols of IEEE 802.11 Networks
CoRR, 2010

Stream Control Transmission Protocol Steganography
CoRR, 2010

Information Hiding Using Improper Frame Padding
CoRR, 2010

2009
Steganography in Handling Oversized IP Packets
CoRR, 2009

Hiding Information in Retransmissions
CoRR, 2009

2008
SecMon: end-to-end quality and security monitoring system.
Ann. UMCS Informatica, 2008

Analysis of a procedure for inserting steganographic data into VoIP calls
CoRR, 2008

Steganographic Routing in Multi Agent System Environment
CoRR, 2008

Covert Channels in SIP for VoIP signalling
CoRR, 2008

TrustMAS: Trusted Communication Platform for Multi-Agent Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Steganography of VoIP Streams.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Covert Channel for Improving VoIP Security.
Proceedings of the Advances in Information Processing and Protection., 2007

2006
New security and control protocol for VoIP based on steganography and digital watermarking.
Ann. UMCS Informatica, 2006

Lightweight security mechanism for PSTN-VoIP cooperation
CoRR, 2006

New VoIP Traffic Security Scheme with Digital Watermarking.
Proceedings of the Computer Safety, 2006

2005
Alternative security architecture for IP Telephony based on digital watermarking
CoRR, 2005


  Loading...