Pattern-based survey and categorization of network covert channel techniques S Wendzel, S Zander, B Fechner, C Herdin ACM Computing Surveys (CSUR) 47 (3), 1-26, 2015 | 213 | 2015 |
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski John Wiley & Sons, 2016 | 194 | 2016 |
The future of digital forensics: Challenges and the road ahead L Caviglione, S Wendzel, W Mazurczyk IEEE Security & Privacy 15 (6), 12-17, 2017 | 169 | 2017 |
The new threats of information hiding: The road ahead K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander IT professional 20 (3), 31-39, 2018 | 126 | 2018 |
Information hiding: challenges for forensic experts W Mazurczyk, S Wendzel Communications of the ACM 61 (1), 86-94, 2017 | 71 | 2017 |
Hiding privacy leaks in android applications using low-attention raising covert channels JF Lalande, S Wendzel 2013 international conference on availability, reliability and security, 701-710, 2013 | 68 | 2013 |
Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet S Wendzel, B Kahler, T Rist 2012 IEEE International Conference on Green Computing and Communications …, 2012 | 57 | 2012 |
Securing BACnet’s pitfalls J Kaur, J Tonejc, S Wendzel, M Meier ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 50 | 2015 |
Hidden and uncontrolled–on the emergence of network steganographic threats S Wendzel, W Mazurczyk, L Caviglione, M Meier ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014 | 48 | 2014 |
Covert channels in the MQTT-based Internet of Things A Velinov, A Mileva, S Wendzel, W Mazurczyk IEEE Access 7, 161899-161915, 2019 | 45 | 2019 |
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels A Mileva, A Velinov, L Hartmann, S Wendzel, W Mazurczyk Computers & security 104, 102207, 2021 | 44 | 2021 |
Cyber security of smart buildings S Wendzel, J Tonejc, J Kaur, A Kobekova Security and Privacy in Cyber-Physical Systems: Foundations and Applications, 2017 | 44 | 2017 |
A Revised Taxonomy of Steganography Embedding Patterns S Wendzel, L Caviglione, W Mazurczyk, A Mileva, J Dittmann, C Krätzer, ... ARES 2021: The 16th International Conference on Availability, Reliability …, 2021 | 37 | 2021 |
Towards deriving insights into data hiding methods using pattern-based approach W Mazurczyk, S Wendzel, K Cabaj Proceedings of the 13th International Conference on Availability …, 2018 | 32 | 2018 |
Hidden and under control: A survey and outlook on covert channel-internal control protocols S Wendzel, J Keller annals of telecommunications-annales des télécommunications 69, 417-430, 2014 | 31 | 2014 |
Envisioning smart building botnets S Wendzel, V Zwanger, M Meier, S Szlósarczyk Gesellschaft für Informatik eV, 2014 | 31 | 2014 |
Low-attention forwarding for mobile network covert channels S Wendzel, J Keller Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 31 | 2011 |
Countering adaptive network covert communication with dynamic wardens W Mazurczyk, S Wendzel, M Chourib, J Keller Future Generation Computer Systems 94, 712-725, 2019 | 30 | 2019 |
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography K Szczypiorski, A Janicki, S Wendzel Journal of Communications (JCM) 10 (10), 747-752, 2015 | 29 | 2015 |
Detecting protocol switching covert channels S Wendzel, S Zander 37th Annual IEEE Conference on Local Computer Networks, 280-283, 2012 | 29 | 2012 |