Publikationen
[2026]
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2020
105.
Schmidbauer T,
.
Covert Storage Caches Using the NTP Protocol. In:
Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020).
New York, NY, USA:
ACM;
2020.
104.
Szary P,
Mazurczyk W,
,
Caviglione L.
Design and Performance Evaluation of Reversible Network Covert Channels. In:
Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020).
New York, NY, USA:
ACM;
2020.
103.
,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Information Security Methodology, Replication Studies and Information Security Education.
Journal of Universal Computer Science (J.UCS).
2020;
26(7):762—763.
102.
,
Lévy-Bencheton C,
Caviglione L.
Not all Areas are Equal: Analysis of Citations in Information Security Research.
Scientometrics.
2020;
122(1):267—286.
101.
Seybold D,
Hauser CB,
Eisenhart G,
,
Domaschka J.
Performance Results of a Containerized MongoDB DBMS.
2020;
100.
Caviglione L,
Mileva A,
.
Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC 2020).
ACM;
2020.
99.
,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020).
ACM;
2020.
2019
98.
Seybold D,
,
Bauer A,
Herbst N,
Domaschka J.
Kaa: Evaluating elasticity of cloud-hosted dbms. In:
2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
11 ed.
IEEE;
2019 Dez..
p. 54—61.
97.
Seybold D,
Hauser CB,
Eisenhart G,
,
Domaschka J.
The impact of the storage tier: A baseline performance analysis of containerized dbms. In:
Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers 24.
2019 Okt..
p. 93—105.
96.
Schanzel B,
Leznik M,
,
Domaschka J.
Unified Container Environments for Scientific Cluster Scenarios.
2019 Apr.;
95.
Caviglione L,
Mazurczyk W,
.
Advanced Information Hiding Techniques for Modern Botnets. In:
G. Kambourakis and others, editors.
Botnets: Architectures, Countermeasures, and Challenges.
Taylor & Francis;
2019.
p. 165—188.
94.
Mazurczyk W,
,
Chourib M,
Keller J.
Countering adaptive network covert communication with dynamic wardens.
Future Generation Computer Systems (FGCS).
2019;
94712—725.
93.
Velinov A,
Mileva A,
,
Mazurczyk W.
Covert Channels in the MQTT-based Internet of Things.
ACCESS.
2019;
7161899—161915.
92.
,
Link F,
Eller D,
Mazurczyk W.
Detection of Size Modulation Covert Channels Using Countermeasure Variation.
Journal of Universal Computer Science (J.UCS).
2019;
25(11):1396—1416.
91.
,
Plötner J.
Einstieg in Linux .
8 ed.
Rheinwerk Verlag;
2019.
90.
Schmidbauer T,
,
Mileva A,
Mazurczyk W.
Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In:
Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).
New York, NY, USA:
ACM;
2019.
p. 64:1—64:10.
89.
,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019).
ACM;
2019.
88.
.
Protocol-independent Detection of "Message Ordering" Network Covert Channels. In:
Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).
New York, NY, USA:
ACM;
2019.
p. 63:1—63:8.
87.
Mazurczyk W,
Caviglione L,
.
Recent Advancements in Digital Forensics, Part 2.
IEEE Security and Privacy (S&P).
2019;
17(1):7—8.
86.
Lv Z,
Mazurczyk W,
,
Song H.
Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Transactions on Industrial Informatics (TII).
2019;
15(12):6468—6471.
85.
Mazurczyk W,
Szary P,
,
Caviglione L.
Towards Reversible Storage Network Covert Channels. In:
Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).
New York, NY, USA:
ACM;
2019.
p. 69:1—69:8.
2018
84.
.
Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In:
Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).
ACM;
2018 Aug. 20.
p. 13:1—13:8.
83.
Mazurczyk W,
,
Cabaj K.
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In:
Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).
ACM;
2018 Aug. 20.
p. 10:1—10:10.
82.
Keidel R,
,
,
Conner ES,
Haas G.
WoDiCoF — A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.
Journal of Universal Computer Science (J.UCS).
2018 Jul. 17;
24(5):556—576.
81.
Leznik M,
,
Griesinger F,
Seybold D,
Domaschka J.
Done yet? A critical introspective of the cloud management toolbox. In:
2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).
2018 Jun..
p. 1—8.