ºÚÁÏ´«ËÍÃÅ

Publikationen

2016

55.
Naumann M, , Mazurczyk W, Keller J. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN). 2016; 9(15):2972—2985.             
54.
Mazurczyk W, , Azagra Villares I, Szczypiorski K. On importance of steganographic cost for network steganography. Security and Communication Networks (SCN). 2016; 9(8):781—790.             
53.
, Mazurczyk W. Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). New York, NY, USA: ACM; 2016. p. 1739–1741.             
52.
Meier M, Reinhardt D, . Sicherheit 2016 — Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2016.      
51.
, Keller J. Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS). 2016; 22(9):1201—1202.             

2015

50.
Szczypiorski K, Janicki A, . "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT 2015). 2015. p. 747—752.             
49.
Caviglione L, Lalande J, Mazurczyk W, . Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 165—177.             
48.
Anhaus EM, . BACtag — Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec; 2015. p. 417—248.      
47.
Kaur J, , Meier M. Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop. 2015. p. 422—428.             
46.
, Palmer C. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.. Journal of Universal Computer Science (J.UCS). 2015; 21(12):1684—1705.             
45.
Kaur J, Herdin C, Tonejc J, , Meier M, Szlósarczyk S. Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2015. p. 148—155.
44.
, Zander S, Fechner B, Herdin C. Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR). 2015; 47(3):1—26.             
43.
Kaur J, Tonejc J, , Meier M. Securing BACnet's pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). 2015. p. 616—629.             
42.
Tonejc J, Kaur J, Karsten A, . Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 693—704.             

2014

41.
Kaur J, Meier M, ³§³ú±ôó²õ²¹°ù³¦³ú²â°ì&²Ô²ú²õ±è;³§, . A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria; 2014.      
40.
, Ploetner J. Einstieg in Linux . 6 ed. Galileo Press; 2014.
39.
, Zwanger V, Meier M, Szlósarczyk S. Envisioning smart building botnets. In: Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V.; 2014.      
38.
, Mazurczyk W, Caviglione L, Meier M. Hidden and uncontrolled—on the emergence of network steganographic threats. In: Securing Electronic Business Processes (ISSE 2014). Springer; 2014. p. 123—133.             
37.
, Keller J. Hidden and under control. Annals of Telecommunications—Annales des Télécommunications (ANTE). 2014; 69(7):417—430.             
36.
, Keller J. IT-gestütztes Management und Controlling: Verdeckte Kanäle — eine zunehmende Gefahr für Unternehmensdaten. Controlling. 2014; 26. Jahrgang(14/6):             
35.
, Herdin C, Wirth R, Masoodian M, Luz S, Kaur J. Mosaic-chart based visualization in building automation systems. In: Proceedings of the 9th Future Security Research Conference. Fraunhofer Verlag/MEV Verlag, Berlin; 2014. p. 687—690.      
34.
Kaur J, . Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS). 2014.      
33.
³§³ú±ôó²õ²¹°ù³¦³ú²â°ì&²Ô²ú²õ±è;³§, , Kaur J, Meier M, Schubert F. Towards suppressing attacks on and improving resilience of building automation systems — an approach exemplified using BACnet. In: Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V.; 2014.      

2013

32.
Lalande J, . Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013). IEEE; 2013. p. 701—710.       
31.
Kahler B, . How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD; 2013. p. H1—H13.