ºÚÁÏ´«ËÍÃÅ

Publikationen

2018

80.
, Griesinger F, Domaschka J. Continuous Anything for Distributed Research Projects. Dependability Engineering. 2018; Dependability Engineering23.       
79.
, . Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer; 2018. p. 203—218.             
78.
Caviglione L, Mazurczyk W, , Zander S. Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Security and Communication Networks (SCN). 2018; 20181—7.             
77.
Mazurczyk W, . Information Hiding — Challenges for Forensic Experts. Communications of the ACM. 2018; 61(1):86—94.             
76.
, Olschewski D. Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. In: Springer; 2018.       
75.
. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. 1 ed. Springer; 2018.             
74.
, Eller D, Mazurczyk W. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC 2018). ACM; 2018. p. 1:1—1:6.             
73.
Cabaj K, Caviglione L, Mazurczyk W, , Woodward A, Zander S. The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional. 2018; 20(3):31—39.             

2017

72.
Spenger G, Keler J, . Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM). 2017 Nov. 02; 6(2):147—170.             
71.
Seybold D, Hauser CB, , Domaschka J. Gibbon: An availability evaluation framework for distributed databases. In: On the Move to Meaningful Internet Systems. OTM 2017 Conferences: Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II. 2017 Sep.. p. 31—49.       
70.
, Tonejc J, Kaur J, Kobekova A. Cyber Security of Smart Buildings. In: H. Song and G. Fink and S. Jeschke, editors. Security and Privacy in Cyber-Physical Systems: Foundations and Applications. Wiley-IEEE Press; 2017 Jul. 17. p. 327—352.             
69.
Lehner F, Mazurczyk W, Keller J, . Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017). IEEE; 2017 Jul. 17. p. 78—85.             
68.
Keller J, Spenger G, . Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). 2017. p. 17—22.             
67.
, Mazurczyk W, Haas G. Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). 2017. p. 29—34.             
66.
, Caviglione L, Mazurczyk W, Lalande J. Network Information Hiding and Science 2.0: Can it be a Match?. International Journal of Electronics and Telecommunications (IJET). 2017; 62(2):217—222.             
65.
Mazurczyk W, Caviglione L, . Recent Advancements in Digital Forensics — Part 1. IEEE Security and Privacy (S&P). 2017; 15(6):10—11.             
64.
, Mazurczyk W, Haas G. Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM). 2017; 6(2):105—126.             
63.
Caviglione L, , Mazurczyk W. The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy. 2017; 15(6):12—17.             
62.
Kobekova A, Bültermann L, Tonejc J, . Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2017. p. 515—526.      

2016

61.
, Mazurczyk W, Zander S. A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (J.UCS). 2016; 22(11):1456—1486.             
60.
Kaur J, , Eissa O, Tonejc J, Meier M. Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN). 2016; 9(15):2986—2997.             
59.
, Ploetner J. Einstieg in Linux. 7 ed. Rheinwerk Verlag; 2016.
58.
. How to Increase the Security of Smart Buildings. Communications of the ACM (CACM). 2016; 59(5):47–49.             
57.
Mazurczyk W, , Zander S, Houmansadr A, Szczypiorski K. Information Hiding in Communication Networks. Fundamentals, Mechanisms, and Applications. Wiley-IEEE; 2016.       
56.
, Kasem-Madani S. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Journal of Cyber Security and Mobility (JCSM). 2016;