şÚÁĎ´«ËÍĂĹ

Publications

2013

30.
Pohl C, Schinzel S, . Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013). Gesellschaft fĂĽr Informatik e.V. (GI); 2013.      

2012

29.
. Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop ĂĽber Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft fĂĽr Informatik, FB Sicherheit, SIG SIDAR; 2012. p. 24.
28.
. Covert and side channels in buildings and the prototype of a building-aware active warden. In: 2012 IEEE International Conference on Communications (ICC 2012). 2012. p. 6753—6758.             
27.
, Kahler B, Rist T. Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom 2012). 2012. p. 731—736.             
26.
, Keller J. Design and implementation of an active warden addressing protocol switching covert channels. In: Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012). 2012. p. 1—6.      
25.
, Zander S. Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). 2012. p. 280—283.             
24.
Backs P, , Keller J. Dynamic routing in covert channel overlays based on control protocols. In: 2012 International Conference for Internet Technology and Secured Transactions (ICITST 2012). 2012. p. 32—39.      
23.
, Keller J. EinfĂĽhrung in die Forschungsthematik der verdeckten Kanäle. In: Informationstechnologie und Sicherheitspolitik — Wird der dritte Weltkrieg im Internet ausgetragen?. BoD; 2012. p. 115—124.      
22.
, Ploetner J. Einstieg in Linux . 5 ed. Galileo Press; 2012.
21.
Ploetner J, . Linux. Das umfassende Handbuch . 5 ed. Galileo Press; 2012.      
20.
Rist T, , Masoodian M, Andre E. Techniken fĂĽr Menschen im nächsten Jahrzehnt – Beiträge zum Usability Day X. Pabst Science Publishers; 2012. p. 80—87.      
19.
, Keller J. Preventing Protocol Switching Covert Channels. International Journal on Advances in Security. 2012; 5(3 and 4):       
18.
, Keller J. Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). 2012. p. 131—144.             
17.
. The problem of traffic normalization within a covert channel's network environment learning phase. In: Sicherheit 2012 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft fĂĽr Informatik e.V.; 2012. p. 149—161.      
16.
. Tunnel und verdeckte Kanäle im Netz. 1 ed. Vieweg+Teubner; 2012.       

2011

15.
, Keller J. Low-attention forwarding for mobile network covert channels. In: B. de Decker et. al., editors. Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). Springer; 2011 Oct.. p. 122—133.             
14.
Rist T, , Masoodian M, Monigatti P, Andre E. Creating Awareness for Efficient Energy Use in Smart Homes. In: Gerhild Feuerstein and Walter Ritter, editors. Zusammenfassung der Beiträge zum Usability Day IX, Dornbirn, Austria. Pabst; 2011 May. p. 162—168.      
13.
, Rist T, Masoodian M, AndrĂ© E. A Secure Interoperable Architecture for Building-Automation Applications. In: Proc. 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL). 2011.             
12.
Ploetner J, . Linux. Das umfassende Handbuch . 4 ed. Galileo Press; 2011.
11.
. Mikroprotokolle in verdeckten Kanälen. In: Beiträge zum Doktorandenkolleg Ruhr 2011. 2011.

2010

10.
, Ploetner J. Einstieg in Linux. Eine distributionsunabhängige EinfĂĽhrung . 4 ed. Galileo Press; 2010.

2009

9.
Ploetner J, . Linux. Das umfassende Handbuch . 3 ed. Galileo Press; 2009.

2008

8.
, Ploetner J. Einstieg in Linux. Eine distributionsunabhängige EinfĂĽhrung . 3 ed. Galileo Press; 2008.
7.
Ploetner J, . Linux. Das umfassende Handbuch . 2 ed. Galileo Press; 2008.      
6.
. Protocol channels as a new design alternative of covert channels. CoRR. 2008; abs/0809.1949