Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Steffen
    Last name: Wendzel
    DBLP: 53/3957
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 37 of 37  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Steffen Wendzel.
    How to increase the security of smart buildings?
    Commun. ACM 2016, Volume 59 (0) 2016
    Conference paper
    Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski.
    On importance of steganographic cost for network steganography.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Steffen Wendzel.
    Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller 0001.
    Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc, Michael Meier 0001.
    Covert channel-internal control protocols: attacks and defense.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Steffen Wendzel, Wojciech Mazurczyk.
    POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Steffen Wendzel, Jörg Keller 0001.
    Security, Privacy and Reliability of Smart Buildings.
    J. UCS 2016, Volume 22 (0) 2016
    Conference paper
    Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander.
    Unified Description for Network Information Hiding Methods.
    J. UCS 2016, Volume 22 (0) 2016
    Journal article
    Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel.
    Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel.
    Visualizing BACnet data to facilitate humans in building-security decision-making.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier 0001.
    Securing BACnet's Pitfalls.
    ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller 0001.
    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin.
    Pattern-Based Survey and Categorization of Network Covert Channel Techniques.
    ACM Comput. Surv. 2014, Volume 47 (0) 2015
    Conference paper
    Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel.
    Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
    Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings 2015 (0) 2015
    Conference paper
    Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel.
    Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making.
    Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings 2015 (0) 2015
    Journal article
    Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel.
    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Steffen Wendzel, Carolin Palmer.
    Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander.
    Unified Description for Network Information Hiding Methods.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Steffen Wendzel, Carolin Palmer.
    Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.
    J. UCS 2015, Volume 21 (0) 2015
    Conference paper
    Jaspreet Kaur, Steffen Wendzel, Michael Meier 0001.
    Countermeasures for Covert Channel-Internal Control Protocols.
    10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015 2015 (0) 2015
    Conference paper
    Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel.
    "The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography.
    JCM 2015, Volume 10 (0) 2015
    Conference paper
    Sebastian Szlósarczyk, Steffen Wendzel, Jaspreet Kaur, Michael Meier, Frank Schubert.
    Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.
    Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich 2014 (0) 2014
    Conference paper
    Steffen Wendzel, Viviane Zwanger, Michael Meier 0001, Sebastian Szlósarczyk.
    Envisioning Smart Building Botnets.
    Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich 2014 (0) 2014
    Journal article
    Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski.
    On Importance of Steganographic Cost For Network Steganography.
    CoRR 2014, Volume 0 (0) 2014
    Journal article
    Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin.
    A Pattern-based Survey and Categorization of Network Covert Channel Techniques.
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    Steffen Wendzel, Jörg Keller 0001.
    Hidden and under control - A survey and outlook on covert channel-internal control protocols.
    Annales des Télécommunications 2014, Volume 69 (0) 2014
    Conference paper
    Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier 0001.
    Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier 0001.
    Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
    ISSE 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014 2014 (0) 2014
    Conference paper
    Jean-François Lalande, Steffen Wendzel.
    Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.
    2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013 2013 (0) 2013
    Conference paper
    Steffen Wendzel.
    The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase.
    Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt 2012 (0) 2012
    Conference paper
    Steffen Wendzel, Jörg Keller.
    Systematic Engineering of Control Protocols for Covert Channels.
    Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Steffen Wendzel.
    Covert and side channels in buildings and the prototype of a building-aware active warden.
    Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012 2012 (0) 2012
    Conference paper
    Peter Backs, Steffen Wendzel, Jörg Keller 0001.
    Dynamic routing in covert channel overlays based on control protocols.
    7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012 2012 (0) 2012
    Conference paper
    Steffen Wendzel, Sebastian Zander.
    Detecting protocol switching covert channels.
    37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012 2012 (0) 2012
    Conference paper
    Steffen Wendzel, Benjamin Kahler, Thomas Rist.
    Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet.
    2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France, November 20-23, 2012 2012 (0) 2012
    Conference paper
    Steffen Wendzel, Jörg Keller.
    Low-Attention Forwarding for Mobile Network Covert Channels.
    Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings 2011 (0) 2011
    Conference paper
    Steffen Wendzel.
    Protocol channels as a new design alternative of covert channels
    CoRR 2008, Volume 0 (0) 2008
    Show item 1 to 37 of 37  

    Your query returned 37 matches in the database.