Publications

2023

145.
Domaschka J, Volpert S, Maier K, Eisenhart G, Seybold D. Using eBPF for Database Workload Tracing: An Explorative Study. In: Companion of the 2023 ACM/SPEC International Conference on Performance Engineering. 2023. p. 311—317.
144.
Zillien S, Wendzel S. Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC). 2023; 20(6):5156—5167.      [DOI]      [File] 
143.
Lenz J, Bozakov Z, Wendzel S, Vrhovec S. Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE). 2023; 130103258.      [DOI]      [File] 

2022

142.
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, Zillien S. A Generic Taxonomy for Steganography Methods. TechRxiv. 2022 Jul.;      [DOI]      [File] 
141.
Szary P, Mazurczyk W, Wendzel S, Caviglione L. Analysis of Reversible Network Covert Channels. ACCESS. 2022; 1041226—41238.      [DOI]      [File] 
140.
Hartmann L, Wendzel S. Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 2022; 13(3):4—24.      [DOI]      [File] 
139.
Volpert S, Eisenhart G, Domaschka J. Are Kubernetes CNI solutions ready for> 10 Gbit/s?. 2022;
138.
Schmidbauer T, Keller J, Wendzel S. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022). ACM; 2022.      [DOI]      [File] 
137.
Schmidbauer T, Wendzel S. Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 2022; 13(1):137—166.      [DOI]      [File] 
136.
Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A. Emerging Topics in Defending Networked Systems. Future Generation Computer Systems (FGCS). 2022; 128317—319.      [DOI]      [File] 
135.
Wendzel S, Caviglione L, Mileva A, Lalande J, Mazurczyk W. Guest Editorial: Information Security Methodology and Replication Studies. it — Information Technology (ITIT). 2022; 64(1-2):1—3.      [DOI]      [File] 
134.
Mileva A, Velinov A, Dimitrova V, Caviglione L, Wendzel S. Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy. 2022; 24(2):      [DOI]      [File] 
133.
Wendzel S, Caviglione L, Fechner B. Poster: Steganography Hiding Patterns: A Brief Review. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 107—108.      [DOI]      [File] 
132.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022). ACM; 2022.
131.
Eisenhart G, Volpert S, Braitinger J, Domaschka J. Recognition of Similar NetFlow Data in Decentralised Monitoring Environments. 2022;
130.
Caviglione L, Wendzel S, Vrhovec S, Mileva A. Security and Privacy Issues of Home Globalization. Security and Privacy (S&P). 2022; 20(1):10—11.      [DOI]      [File] 
129.
Mayer N, Wendzel S, Keller J. Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. In: GI Sicherheit 2022 — Sicherheit, Schutz und Zuverlässigkeit. 2022. p. 173—182.      [DOI]      [File] 
128.
Schmidbauer T, Wendzel S. SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM; 2022. p. 546—560.      [DOI]      [File] 
127.
Bub D, Hartmann L, Bozakov Z, Wendzel S. Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 17—20.      [DOI]      [File] 

2021

126.
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T. A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [File] 
125.
Chourib M, Wendzel S, Mazurczyk W. Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: 46th IEEE Conference on Local Computer Networks (LCN 2021). IEEE; 2021. p. 148—153.     [File] 
124.
Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security. 2021; 104102207.      [DOI]      [File] 
123.
Vrhovec S, Caviglione L, Wendzel S. Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [File] 
122.
Hartmann L, Wendzel S. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [File] 
121.
Hartmann L, Wendzel S. How Feasible are Steganographic and Stealth Attacks on TIA Project Meta-data of ICS: A Case Study with Real-world Data. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [File]