Publications
[2026]
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2018
80.
,
Griesinger F,
Domaschka J.
Continuous Anything for Distributed Research Projects.
Dependability Engineering.
2018;
Dependability Engineering23.
79.
,
.
Detection of covert channels in TCP retransmissions. In:
Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018).
Springer;
2018.
p. 203—218.
78.
Caviglione L,
Mazurczyk W,
,
Zander S.
Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Security and Communication Networks (SCN).
2018;
20181—7.
77.
Mazurczyk W,
.
Information Hiding — Challenges for Forensic Experts.
Communications of the ACM.
2018;
61(1):86—94.
76.
,
Olschewski D.
Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. In:
Springer;
2018.
75.
.
IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung.
1 ed.
Springer;
2018.
74.
,
Eller D,
Mazurczyk W.
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In:
Proc. Central European Security Conference (CECC 2018).
ACM;
2018.
p. 1:1—1:6.
73.
Cabaj K,
Caviglione L,
Mazurczyk W,
,
Woodward A,
Zander S.
The New Threats of Information Hiding: the Road Ahead.
IEEE IT Professional.
2018;
20(3):31—39.
2017
72.
Spenger G,
Keler J,
.
Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs.
Journal of Cyber Security and Mobility (JCSM).
2017 Nov. 02;
6(2):147—170.
71.
Seybold D,
Hauser CB,
,
Domaschka J.
Gibbon: An availability evaluation framework for distributed databases. In:
On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II.
2017 Sep..
p. 31—49.
70.
,
Tonejc J,
Kaur J,
Kobekova A.
Cyber Security of Smart Buildings. In:
H. Song and G. Fink and S. Jeschke, editors.
Security and Privacy in Cyber-Physical Systems: Foundations and Applications.
Wiley-IEEE Press;
2017 Jul. 17.
p. 327—352.
69.
Lehner F,
Mazurczyk W,
Keller J,
.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In:
Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017).
IEEE;
2017 Jul. 17.
p. 78—85.
68.
Keller J,
Spenger G,
.
Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In:
2017 IEEE Security and Privacy Workshops (SPW 2017).
2017.
p. 17—22.
67.
,
Mazurczyk W,
Haas G.
Don’t you touch my nuts: Information hiding in cyber physical systems. In:
2017 IEEE Security and Privacy Workshops (SPW 2017).
2017.
p. 29—34.
66.
,
Caviglione L,
Mazurczyk W,
Lalande J.
Network Information Hiding and Science 2.0: Can it be a Match?.
International Journal of Electronics and Telecommunications (IJET).
2017;
62(2):217—222.
65.
Mazurczyk W,
Caviglione L,
.
Recent Advancements in Digital Forensics — Part 1.
IEEE Security and Privacy (S&P).
2017;
15(6):10—11.
64.
,
Mazurczyk W,
Haas G.
Steganography for Cyber-physical Systems.
Journal of Cyber Security and Mobility (JCSM).
2017;
6(2):105—126.
63.
Caviglione L,
,
Mazurczyk W.
The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Security and Privacy.
2017;
15(6):12—17.
62.
Kobekova A,
Bültermann L,
Tonejc J,
.
Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In:
Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI.
SecuMedia Verlags-GmbH;
2017.
p. 515—526.
2016
61.
,
Mazurczyk W,
Zander S.
A Unified Description Method for Network Information Hiding Methods.
Journal of Universal Computer Science (J.UCS).
2016;
22(11):1456—1486.
60.
Kaur J,
,
Eissa O,
Tonejc J,
Meier M.
Covert channel-internal control protocols: attacks and defense.
Security and Communication Networks (SCN).
2016;
9(15):2986—2997.
59.
,
Ploetner J.
Einstieg in Linux.
7 ed.
Rheinwerk Verlag;
2016.
58.
.
How to Increase the Security of Smart Buildings.
Communications of the ACM (CACM).
2016;
59(5):47–49.
57.
Mazurczyk W,
,
Zander S,
Houmansadr A,
Szczypiorski K.
Information Hiding in Communication Networks. Fundamentals, Mechanisms, and Applications.
Wiley-IEEE;
2016.
56.
,
Kasem-Madani S.
IoT Security: The Improvement-Decelerating 'Cycle of Blame'.
Journal of Cyber Security and Mobility (JCSM).
2016;