Wojciech Mazurczyk
Orcid: 0000-0002-8509-4127Affiliations:
- Warsaw University of Technology, Institute of Telecommunications, Poland
- University of Hagen, Faculty of Mathematics and Computer Science, Germany
According to our database1,
Wojciech Mazurczyk
authored at least 200 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
You Can't Do That on Protocols Anymore: Analysis of Covert Channels in IETF Standards.
IEEE Netw., September, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Commun. ACM, March, 2024
SoftwareX, 2024
Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments.
Comput. Networks, 2024
IEEE Access, 2024
Proceedings of the Advances in Computational Collective Intelligence, 2024
Disinformation detection and source tracking using semi-fragile watermarking and blockchain.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Sensors, December, 2023
IEEE Commun. Mag., October, 2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023
Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures.
Comput. Networks, July, 2023
STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Comput. Secur., 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Int. J. Intell. Syst., December, 2022
IEEE Trans. Netw. Serv. Manag., 2022
IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration.
SoftwareX, 2022
Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
IT Prof., 2022
it Inf. Technol., 2022
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022
Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things.
IEEE Internet Things Mag., 2022
Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things: Part 2.
IEEE Internet Things Mag., 2022
IEEE Internet Things J., 2022
Computer, 2022
Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method.
Sensors, 2021
Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Comput. Secur., 2021
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments.
Comput. Networks, 2021
Ann. des Télécommunications, 2021
IEEE Access, 2021
IEEE Access, 2021
Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IEEE Wirel. Commun., 2020
IEEE Trans. Netw. Serv. Manag., 2020
Secur. Commun. Networks, 2020
Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020
Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
J. Cybersecur., 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Network and Application Layer Services for High Performance Communications in Buildings.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Distributed packet inspection for network security purposes in software-defined networking environments.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Broadcast., 2019
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.
Secur. Commun. Networks, 2019
J. Univers. Comput. Sci., 2019
J. Univers. Comput. Sci., 2019
Future Gener. Comput. Syst., 2019
Efficient quantum-based security protocols for information sharing and data protection in 5G networks.
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Telecommun. Syst., 2018
Secur. Commun. Networks, 2018
J. Univers. Comput. Sci., 2018
Comput. Secur., 2018
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics.
Comput. Electr. Eng., 2018
Proceedings of the Central European Cybersecurity Conference 2018, 2018
A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018
A review of network vulnerabilities scanning tools: types, capabilities and functioning.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
A 5G Radio-Light SDN Architecture for Wireless and Mobile Network Access in Buildings.
Proceedings of the IEEE 5G World Forum, 2018
2017
IEEE Trans. Ind. Informatics, 2017
IEEE Secur. Priv., 2017
Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
IEEE Netw., 2016
J. Univers. Comput. Sci., 2016
Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average.
EURASIP J. Wirel. Commun. Netw., 2016
IEEE Commun. Mag., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Telecommun. Syst., 2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Multim. Tools Appl., 2014
CoRR, 2014
Ann. des Télécommunications, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the ISSE 2014, 2014
2013
Secur. Commun. Networks, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013
2012
Telecommun. Syst., 2012
Towards Quality of Experience-based reputation models for future web service provisioning.
Telecommun. Syst., 2012
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
J. Univers. Comput. Sci., 2012
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012
2011
CoRR, 2011
2010
2009
2008
Ann. UMCS Informatica, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
2007
Proceedings of the Advances in Information Processing and Protection., 2007
2006
New security and control protocol for VoIP based on steganography and digital watermarking.
Ann. UMCS Informatica, 2006
Proceedings of the Computer Safety, 2006
2005
CoRR, 2005