TechRxiv
see my website: https://www.wendzel.de

Publications

  • https://www.wendzel.de
  • Cyber Security of Smart Buildings
  • Recent Advancements in Digital Forensics
  • Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
  • IoT Security: The Improvement-Decelerating 'Cycle of Blame'
  • Steganography for Cyber-physical Systems
  • Enhanced ant colony-inspired parallel algorithm to improve cryptographic PRNGs
  • Unified description for network information hiding methods
  • Network Information Hiding and Science 2.0: Can it be a Match?
  • Cyber Security of Smart Buildings
  • How to Increase the Security of Smart Buildings?
  • Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns
  • Unified Description for Network Information Hiding Methods
  • Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. April 2016, Bonn
  • Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
  • Security, Privacy and Reliability of Smart Buildings
  • Information Security Methodology, Replication Studies and Information Security Education
  • Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography
  • Linux
  • Einstieg in Linux
  • Einstieg in Linux
  • Einstieg in Linux
  • Einstieg in Linux
  • Information Hiding in Communication Networks
  • Information Hiding in Communication Networks
  • Information Hiding in Communication Networks
  • Sicherheit 2016
  • The Future of Digital Forensics: Challenges and the Road Ahead
  • WoDiCoF - A testbed for the evaluation of (Parallel) covert channel detection algorithms
  • The new threats of information hiding: The road ahead
  • Information hiding: Challenges for forensic experts
  • Emerging and Unconventional: New Attacks and Innovative Detection Techniques
  • Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
  • Don't you touch my nuts: Information hiding in cyber physical systems
  • Detection of Covert Channels in TCP Retransmissions
  • Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
  • Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
  • Countermeasures for Covert Channel-Internal Control Protocols
  • Countering adaptive network covert communication with dynamic wardens
  • Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection
  • Security, privacy and reliability of smart buildings: J.UCS special issue
  • Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
  • Analysis of Reversible Network Covert Channels
  • Reconnection-Based Covert Channels in Wireless Networks
  • Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks
  • IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  • IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  • Network information hiding
  • IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  • Covert channel-internal control protocols: attacks and defense
  • Not all areas are equal: analysis of citations in information security research
  • IT-gestütztes Management und Controlling
  • Tunnel und verdeckte Kanäle im Netz
  • Einstieg in Linux
  • Einstieg in Linux
  • Novel approaches for network covert storage channels
  • Einstieg in Linux
  • Linux
  • Einführung in die Forschungsthematik der verdeckten Kanäle
  • Einstieg in Linux
  • Einstieg in Linux
  • Linux
  • Praxisbuch Netzwerk-Sicherheit
  • Einstieg in Linux
  • Praxisbuch Netzwerk-Sicherheit
  • Towards suppressing attacks on and improving resilience of building automation systems - An approach exemplified using BACnet
  • Fortgeschrittene Themen für verdeckte Kanäle
  • Prävention und Detektion verdeckter Kanäle
  • Systematic Engineering of Control Protocols for Covert Channels
  • Einführung
  • Low-Attention Forwarding for Mobile Network Covert Channels
  • Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats
  • Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
  • Securing BACnet’s Pitfalls
  • Pattern-Based Survey and Categorization of Network Covert Channel Techniques
  • Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet
  • Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
  • On importance of steganographic cost for network steganography
  • TCP/IP-Grundlagen für das Tunneling
  • Detecting protocol switching covert channels
  • Geheimes Tunneling
  • Tunneling-Protokolle
  • Grundlagen verdeckter Kanäle
  • Creativity in mind: Evaluating and maintaining advances in network steganographic research
  • Covert and side channels in buildings and the prototype of a building-aware active warden
  • Dynamic routing in covert channel overlays based on control protocols
  • Einstieg in Linux
  • Linux
  • Linux
  • Einstieg in Linux
  • Linux
  • Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
  • “The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
  • Tunnel und verdeckte Kanäle im Netz
  • Hidden and under control
  • A secure interoperable architecture for building-automation applications
  • “The good, the bad and the ugly”: Evaluation of Wi-Fi steganography
  • The problem of traffic normalization within a covert channel's network environment learning phase
  • Envisioning smart building botnets
  • Avoiding Research Tribal Wars Using Taxonomies
  • Weaknesses of popular and recent covert channel detection methods and a remedy
  • Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective
  • Why people replace their aging smart devices: A push–pull–mooring perspective
  • Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy

Usage metrics

Co-workers & collaborators

Steffen Wendzel's public data