Publications
[2026]
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2026
180.
,
,
,
,
Rünz P,
Caviglione L.
A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges.
Computers & Security.
2026;
164
179.
.
AdullamoT: Using IoT Devices as Relays for Time-decoupled Secret Exchange and Censorship Circumvention. In:
Proc. 14th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec 2026), Florence, Italy, June 17-19.
ACM;
2026.
178.
,
,
Zander S.
AMPhitryon: Efficient small data compression for low-bandwidth covert channels. In:
Proc. 41st ICT Systems Security and Privacy Protection (IFIP SEC 2026).
Springer;
2026.
177.
,
,
,
Rünz P,
Caviglione L,
.
Digital Control: National Tactics of Internet Censorship. In:
European Interdisciplinary Cybersecurity Conference (EICC 2026).
Springer;
2026.
176.
von Suchodoletz D,
Neumair B,
Frank M,
Heuveline V,
Walter T,
,
Kohl-Frey O,
Farrenkopf S,
Pfister A,
Beutner J,
Resch M,
Dorn R,
Nau T.
Framework Concept of the Universities in the State of Baden-Württemberg: High-Performance Computing (HPC) and Data-Intensive Computing (DIC) in the Period 2025–2032. In:
Proceedings of the 10th bwHPC Symposium: HPC Activites in Baden-Württemberg.
Karlsruhe:
KIT Scientific Publishing;
2026.
175.
°Â±ð¾±ÃŸ±ð²Ô²ú´Ç°ù²Ô&²Ô²ú²õ±è;°ä,
.
History covert channels with relative timing pointers: Design, error resilience, and detectability.
Journal of Information Security and Applications.
2026;
99
174.
Skwarek V,
Wöhnert KH,
Kaven S,
.
Sicherheit 2026 — Beiträge der 13. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI).
Bonn:
Gesellschaft für Informatik e.V. (GI);
2026.
173.
Velinov A,
Mileva A,
,
,
.
Steganography in the QUIC Communication Protocol.
Journal of Universal Computer Science (J.UCS).
2026;
32(2):181-208.
2025
172.
,
Keller J,
.
Detection of Network Information Hiding Artifacts — A Case for HPC?. In:
Proceedings of the 11th bwHPC Symposium.
University of Tübingen, Germany:
2025 Sep. 23.
171.
,
Caviglione L,
Mazurczyk W,
Mileva A,
Dittmann J,
Krätzer C,
Lamshöft K,
Vielhauer C,
Hartmann L,
Keller J,
Neubert T,
.
A Generic Taxonomy for Steganography Methods.
ACM Comput. Surv..
2025;
170.
,
Krätzer C,
Dittmann J,
Caviglione L,
Mileva A,
Schmidbauer T,
Vielhauer C,
Zander S.
Combining Different Existing Methods for Describing Steganography Hiding Methods. In:
Coppens, Bart
and Volckaert, Bruno
and Naessens, Vincent
and De Sutter, Bjorn, editors.
Availability, Reliability and Security.
Cham:
Springer Nature Switzerland;
2025.
p. 271—289.
169.
Petrov D,
Ruffing P,
,
.
Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences. In:
Dalla Preda, Mila
and Schrittwieser, Sebastian
and Naessens, Vincent
and De Sutter, Bjorn, editors.
Availability, Reliability and Security.
Cham:
Springer Nature Switzerland;
2025.
p. 118—140.
168.
,
Schmidbauer T,
,
Keller J.
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data.
IEEE Transactions on Dependable and Secure Computing (TDSC).
2025;
22(1):614-631.
167.
Schoffit J,
Pietzschmann L,
,
Eisermann D,
,
Kargl F.
Enhancing client security in zero trust architectures: a device-agent policy enforcement point for compartmentalized network management. In:
Koldehofe, Boris
and Klingler, Florian
and Sommer, Christoph
and Hummel, Karin Anna
and Amthor, Peter, editors.
Proc. International Conference on Networked Systems 2025 (NetSys 2025).
Ilmenau:
ilmedia;
2025.
p. 29—32.
2024
166.
,
Seybold D,
Domaschka J,
Wesner S.
The Hidden Costs of Shared CPU Resources: A Closer Look at Cgroups and QoS. In:
2024 Nov. 1.
165.
°±ðß±ô±ð°ù&²Ô²ú²õ±è;¸é,
.
Towards Improving Resource Allocation for Multi-Tenant HPC Systems: An Exploratory HPC Cluster Utilization Case Study. In:
2024 IEEE International Conference on Cluster Computing Workshops (CLUSTER Workshops).
2024 Sep. 14.
p. 66-75.
164.
Schymiczek J,
Schmidbauer T,
.
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In:
Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024).
ACM;
2024.
163.
Strachanski F,
Petrov D,
Schmidbauer T,
.
A Comprehensive Pattern-based Overview of Stegomalware. In:
Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024).
ACM;
2024.
162.
,
Domaschka J.
An Empirical Analysis of Common OCI Runtimes' Performance Isolation Capabilities. In:
Proceedings of the 15th ACM/SPEC International Conference on Performance Engineering.
2024.
p. 60—70.
161.
Dittmann J,
Krätzer C,
Kiltz S,
Altschaffel R,
Vielhauer C,
,
Wefel S,
Nitsch H.
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In:
GI Sicherheit 2024 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V. (GI);
2024.
p. 265—268.
160.
,
Mileva A,
Franqueira VNL,
Jaatun MG.
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective.
Journal of Universal Computer Science (J.UCS).
2024;
30(9):1137—1139.
159.
,
Seybold D,
Domaschka J.
Exemplary Determination of Cgroups-Based QoS Isolation for a Database Workload. In:
Companion of the 15th ACM/SPEC International Conference on Performance Engineering.
2024.
p. 235—241.
158.
,
Plötner J.
Linux. Der Grundkurs.
2 ed.
Rheinwerk Verlag;
2024.
157.
,
Schmidbauer T,
Kubek M,
Keller J,
.
Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. In:
Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024).
ACM;
2024.
p. 80—95.
156.
Keller J,
Heßeling C,
.
Robust and Homomorphic Covert Channels in Streams of Numeric Data. In:
Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024).
ACM;
2024.