SW
Publications
- https://www.wendzel.de
- Cyber Security of Smart Buildings
- Recent Advancements in Digital Forensics
- Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
- IoT Security: The Improvement-Decelerating 'Cycle of Blame'
- Steganography for Cyber-physical Systems
- Enhanced ant colony-inspired parallel algorithm to improve cryptographic PRNGs
- Unified description for network information hiding methods
- Network Information Hiding and Science 2.0: Can it be a Match?
- Cyber Security of Smart Buildings
- How to Increase the Security of Smart Buildings?
- Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns
- Unified Description for Network Information Hiding Methods
- Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. April 2016, Bonn
- Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
- Security, Privacy and Reliability of Smart Buildings
- Information Security Methodology, Replication Studies and Information Security Education
- Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography
- Linux
- Einstieg in Linux
- Einstieg in Linux
- Einstieg in Linux
- Einstieg in Linux
- Information Hiding in Communication Networks
- Information Hiding in Communication Networks
- Information Hiding in Communication Networks
- Sicherheit 2016
- The Future of Digital Forensics: Challenges and the Road Ahead
- WoDiCoF - A testbed for the evaluation of (Parallel) covert channel detection algorithms
- The new threats of information hiding: The road ahead
- Information hiding: Challenges for forensic experts
- Emerging and Unconventional: New Attacks and Innovative Detection Techniques
- Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
- Don't you touch my nuts: Information hiding in cyber physical systems
- Detection of Covert Channels in TCP Retransmissions
- Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
- Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
- Countermeasures for Covert Channel-Internal Control Protocols
- Countering adaptive network covert communication with dynamic wardens
- Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection
- Security, privacy and reliability of smart buildings: J.UCS special issue
- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
- Analysis of Reversible Network Covert Channels
- Reconnection-Based Covert Channels in Wireless Networks
- Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks
- IT-Sicherheit für TCP/IP- und IoT-Netzwerke
- IT-Sicherheit für TCP/IP- und IoT-Netzwerke
- Network information hiding
- IT-Sicherheit für TCP/IP- und IoT-Netzwerke
- Covert channel-internal control protocols: attacks and defense
- Not all areas are equal: analysis of citations in information security research
- IT-gestütztes Management und Controlling
- Tunnel und verdeckte Kanäle im Netz
- Einstieg in Linux
- Einstieg in Linux
- Novel approaches for network covert storage channels
- Einstieg in Linux
- Linux
- Einführung in die Forschungsthematik der verdeckten Kanäle
- Einstieg in Linux
- Einstieg in Linux
- Linux
- Praxisbuch Netzwerk-Sicherheit
- Einstieg in Linux
- Praxisbuch Netzwerk-Sicherheit
- Towards suppressing attacks on and improving resilience of building automation systems - An approach exemplified using BACnet
- Fortgeschrittene Themen für verdeckte Kanäle
- Prävention und Detektion verdeckter Kanäle
- Systematic Engineering of Control Protocols for Covert Channels
- Einführung
- Low-Attention Forwarding for Mobile Network Covert Channels
- Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats
- Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
- Securing BACnet’s Pitfalls
- Pattern-Based Survey and Categorization of Network Covert Channel Techniques
- Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet
- Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
- On importance of steganographic cost for network steganography
- TCP/IP-Grundlagen für das Tunneling
- Detecting protocol switching covert channels
- Geheimes Tunneling
- Tunneling-Protokolle
- Grundlagen verdeckter Kanäle
- Creativity in mind: Evaluating and maintaining advances in network steganographic research
- Covert and side channels in buildings and the prototype of a building-aware active warden
- Dynamic routing in covert channel overlays based on control protocols
- Einstieg in Linux
- Linux
- Linux
- Einstieg in Linux
- Linux
- Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
- “The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
- Tunnel und verdeckte Kanäle im Netz
- Hidden and under control
- A secure interoperable architecture for building-automation applications
- “The good, the bad and the ugly”: Evaluation of Wi-Fi steganography
- The problem of traffic normalization within a covert channel's network environment learning phase
- Envisioning smart building botnets
- Avoiding Research Tribal Wars Using Taxonomies
- Weaknesses of popular and recent covert channel detection methods and a remedy
- Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective
- Why people replace their aging smart devices: A push–pull–mooring perspective
- Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy