ºÚÁÏ´«ËÍÃÅ

Publikationen

2020

105.
Schmidbauer T, . Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.             
104.
Szary P, Mazurczyk W, , Caviglione L. Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.             
103.
, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Information Security Methodology, Replication Studies and Information Security Education. Journal of Universal Computer Science (J.UCS). 2020; 26(7):762—763.             
102.
, Lévy-Bencheton C, Caviglione L. Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics. 2020; 122(1):267—286.             
101.
Seybold D, Hauser CB, Eisenhart G, , Domaschka J. Performance Results of a Containerized MongoDB DBMS. 2020;
100.
Caviglione L, Mileva A, . Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC 2020). ACM; 2020.             
99.
, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020). ACM; 2020.

2019

98.
Seybold D, , Bauer A, Herbst N, Domaschka J. Kaa: Evaluating elasticity of cloud-hosted dbms. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 11 ed. IEEE; 2019 Dez.. p. 54—61.
97.
Seybold D, Hauser CB, Eisenhart G, , Domaschka J. The impact of the storage tier: A baseline performance analysis of containerized dbms. In: Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers 24. 2019 Okt.. p. 93—105.
96.
Schanzel B, Leznik M, , Domaschka J. Unified Container Environments for Scientific Cluster Scenarios. 2019 Apr.;       
95.
Caviglione L, Mazurczyk W, . Advanced Information Hiding Techniques for Modern Botnets. In: G. Kambourakis and others, editors. Botnets: Architectures, Countermeasures, and Challenges. Taylor & Francis; 2019. p. 165—188.             
94.
Mazurczyk W, , Chourib M, Keller J. Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS). 2019; 94712—725.             
93.
Velinov A, Mileva A, , Mazurczyk W. Covert Channels in the MQTT-based Internet of Things. ACCESS. 2019; 7161899—161915.             
92.
, Link F, Eller D, Mazurczyk W. Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (J.UCS). 2019; 25(11):1396—1416.             
91.
, Plötner J. Einstieg in Linux . 8 ed. Rheinwerk Verlag; 2019.      
90.
Schmidbauer T, , Mileva A, Mazurczyk W. Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 64:1—64:10.             
89.
, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). ACM; 2019.
88.
. Protocol-independent Detection of "Message Ordering" Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 63:1—63:8.             
87.
Mazurczyk W, Caviglione L, . Recent Advancements in Digital Forensics, Part 2. IEEE Security and Privacy (S&P). 2019; 17(1):7—8.             
86.
Lv Z, Mazurczyk W, , Song H. Recent Advances in Cyber-Physical Security in Industrial Environments. IEEE Transactions on Industrial Informatics (TII). 2019; 15(12):6468—6471.             
85.
Mazurczyk W, Szary P, , Caviglione L. Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 69:1—69:8.             

2018

84.
. Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 13:1—13:8.             
83.
Mazurczyk W, , Cabaj K. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 10:1—10:10.             
82.
Keidel R, , , Conner ES, Haas G. WoDiCoF — A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (J.UCS). 2018 Jul. 17; 24(5):556—576.             
81.
Leznik M, , Griesinger F, Seybold D, Domaschka J. Done yet? A critical introspective of the cloud management toolbox. In: 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC). 2018 Jun.. p. 1—8.