Trends in Steganography E Zielińska, W Mazurczyk, K Szczypiorski Communications of the ACM 57 (3), 86-95, 2014 | 303 | 2014 |
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics K Cabaj, M Gregorczyk, W Mazurczyk Computers & Electrical Engineering 66, 353-368, 2018 | 203 | 2018 |
Secure data encryption based on quantum walks for 5G Internet of Things scenario AA Abd El-Latif, B Abd-El-Atty, W Mazurczyk, C Fung, ... IEEE Transactions on Network and Service Management 17 (1), 118-131, 2020 | 202 | 2020 |
Using software-defined networking for ransomware mitigation: the case of cryptowall K Cabaj, W Mazurczyk Ieee Network 30 (6), 14-20, 2016 | 198 | 2016 |
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski John Wiley & Sons, 2016 | 190 | 2016 |
Steganography of VoIP streams W Mazurczyk, K Szczypiorski On the Move to Meaningful Internet Systems: OTM 2008: OTM 2008 Confederated …, 2008 | 187 | 2008 |
The future of digital forensics: Challenges and the road ahead L Caviglione, S Wendzel, W Mazurczyk IEEE Security & Privacy 15 (6), 12-17, 2017 | 169 | 2017 |
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015 | 159 | 2015 |
Steganography in modern smartphones and mitigation techniques W Mazurczyk, L Caviglione IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014 | 138 | 2014 |
Information hiding as a challenge for malware detection W Mazurczyk, L Caviglione arXiv preprint arXiv:1504.04867, 2015 | 136 | 2015 |
Principles and overview of network steganography J Lubacz, W Mazurczyk, K Szczypiorski IEEE Communications Magazine 52 (5), 225-229, 2014 | 128 | 2014 |
The new threats of information hiding: The road ahead K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander IT professional 20 (3), 31-39, 2018 | 125 | 2018 |
Using transcoding for hidden communication in IP telephony W Mazurczyk, P Szaga, K Szczypiorski Multimedia Tools and Applications 70, 2139-2165, 2014 | 124 | 2014 |
Retransmission steganography and its detection W Mazurczyk, M Smolarczyk, K Szczypiorski Soft Computing 15, 505-515, 2011 | 123 | 2011 |
VoIP steganography and its detection—a survey W Mazurczyk ACM Computing Surveys (CSUR) 46 (2), 1-21, 2013 | 120 | 2013 |
Efficient quantum-based security protocols for information sharing and data protection in 5G networks AA Abd EL-Latif, B Abd-El-Atty, SE Venegas-Andraca, W Mazurczyk Future generation computer systems 100, 893-906, 2019 | 117 | 2019 |
LACK—a VoIP steganographic method W Mazurczyk, J Lubacz Telecommunication Systems 45, 153-163, 2010 | 104 | 2010 |
Tight arms race: Overview of current malware threats and trends in their detection L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ... IEEE Access 9, 5371-5396, 2020 | 91 | 2020 |
New security and control protocol for VoIP based on steganography and digital watermarking W Mazurczyk, Z Kotulski arXiv preprint cs/0602042, 2006 | 82 | 2006 |
PadSteg: Introducing inter-protocol steganography B Jankowski, W Mazurczyk, K Szczypiorski Telecommunication Systems 52, 1101-1111, 2013 | 77 | 2013 |