Publikationen
[2026]
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2016
55.
Naumann M,
,
Mazurczyk W,
Keller J.
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
Security and Communication Networks (SCN).
2016;
9(15):2972—2985.
54.
Mazurczyk W,
,
Azagra Villares I,
Szczypiorski K.
On importance of steganographic cost for network steganography.
Security and Communication Networks (SCN).
2016;
9(8):781—790.
53.
,
Mazurczyk W.
Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016).
New York, NY, USA:
ACM;
2016.
p. 1739–1741.
52.
Meier M,
Reinhardt D,
.
Sicherheit 2016 — Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI).
Gesellschaft für Informatik e.V. (GI);
2016.
51.
,
Keller J.
Special Issue on Security, Privacy and Reliability of Smart Buildings.
Journal of Universal Computer Science (J.UCS).
2016;
22(9):1201—1202.
2015
50.
Szczypiorski K,
Janicki A,
.
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. In:
6th International Conference on Networking and Information Technology (ICNIT 2015).
2015.
p. 747—752.
49.
Caviglione L,
Lalande J,
Mazurczyk W,
.
Analysis of human awareness of security and privacy threats in smart environments. In:
International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015).
2015.
p. 165—177.
48.
Anhaus EM,
.
BACtag — Data Leakage Protection für Gebäude. In:
D-A-CH Security 2015.
syssec;
2015.
p. 417—248.
47.
Kaur J,
,
Meier M.
Countermeasures for covert channel-internal control protocols. In:
10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop.
2015.
p. 422—428.
46.
,
Palmer C.
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research..
Journal of Universal Computer Science (J.UCS).
2015;
21(12):1684—1705.
45.
Kaur J,
Herdin C,
Tonejc J,
,
Meier M,
Szlósarczyk S.
Novel Approaches for Security in Building Automation Systems. In:
Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI.
SecuMedia Verlags-GmbH;
2015.
p. 148—155.
44.
,
Zander S,
Fechner B,
Herdin C.
Pattern-based survey and categorization of network covert channel techniques.
ACM Computing Surveys (CSUR).
2015;
47(3):1—26.
43.
Kaur J,
Tonejc J,
,
Meier M.
Securing BACnet's pitfalls. In:
Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015).
2015.
p. 616—629.
42.
Tonejc J,
Kaur J,
Karsten A,
.
Visualizing BACnet data to facilitate humans in building-security decision-making. In:
International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015).
2015.
p. 693—704.
2014
41.
Kaur J,
Meier M,
³§³ú±ôó²õ²¹°ù³¦³ú²â°ì&²Ô²ú²õ±è;³§,
.
A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In:
Proc. SECURWARE 2014.
Iaria;
2014.
40.
,
Ploetner J.
Einstieg in Linux .
6 ed.
Galileo Press;
2014.
39.
,
Zwanger V,
Meier M,
Szlósarczyk S.
Envisioning smart building botnets. In:
Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2014.
38.
,
Mazurczyk W,
Caviglione L,
Meier M.
Hidden and uncontrolled—on the emergence of network steganographic threats. In:
Securing Electronic Business Processes (ISSE 2014).
Springer;
2014.
p. 123—133.
37.
,
Keller J.
Hidden and under control.
Annals of Telecommunications—Annales des Télécommunications (ANTE).
2014;
69(7):417—430.
36.
,
Keller J.
IT-gestütztes Management und Controlling: Verdeckte Kanäle — eine zunehmende Gefahr für Unternehmensdaten.
Controlling.
2014;
26. Jahrgang(14/6):
35.
,
Herdin C,
Wirth R,
Masoodian M,
Luz S,
Kaur J.
Mosaic-chart based visualization in building automation systems. In:
Proceedings of the 9th Future Security Research Conference.
Fraunhofer Verlag/MEV Verlag, Berlin;
2014.
p. 687—690.
34.
Kaur J,
.
Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In:
Proceedings Computer Science Conference for University of Bonn Students (CSCUBS).
2014.
33.
³§³ú±ôó²õ²¹°ù³¦³ú²â°ì&²Ô²ú²õ±è;³§,
,
Kaur J,
Meier M,
Schubert F.
Towards suppressing attacks on and improving resilience of building automation systems — an approach exemplified using BACnet. In:
Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit.
Gesellschaft für Informatik e.V.;
2014.
2013
32.
Lalande J,
.
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In:
Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013).
IEEE;
2013.
p. 701—710.
31.
Kahler B,
.
How to own a building? Wardriving gegen die Gebäude-Automation. In:
Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen.
BoD;
2013.
p. H1—H13.