Publications

2020

99.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020). ACM; 2020.

2019

98.
Seybold D, Volpert S, Wesner S, Bauer A, Herbst N, Domaschka J. Kaa: Evaluating elasticity of cloud-hosted dbms. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 11 ed. IEEE; 2019 Dec.. p. 54—61.
97.
Seybold D, Hauser CB, Eisenhart G, Volpert S, Domaschka J. The impact of the storage tier: A baseline performance analysis of containerized dbms. In: Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers 24. 2019 Oct.. p. 93—105.
96.
Schanzel B, Leznik M, Volpert S, Domaschka J, Wesner S. Unified Container Environments for Scientific Cluster Scenarios. 2019 Apr.;      [Weblink] 
95.
Caviglione L, Mazurczyk W, Wendzel S. Advanced Information Hiding Techniques for Modern Botnets. In: G. Kambourakis and others, editors. Botnets: Architectures, Countermeasures, and Challenges. Taylor & Francis; 2019. p. 165—188.      [DOI]      [File] 
94.
Mazurczyk W, Wendzel S, Chourib M, Keller J. Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS). 2019; 94712—725.      [DOI]      [File] 
93.
Velinov A, Mileva A, Wendzel S, Mazurczyk W. Covert Channels in the MQTT-based Internet of Things. ACCESS. 2019; 7161899—161915.      [DOI]      [File] 
92.
Wendzel S, Link F, Eller D, Mazurczyk W. Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (J.UCS). 2019; 25(11):1396—1416.      [DOI]      [File] 
91.
Wendzel S, Plötner J. Einstieg in Linux . 8 ed. Rheinwerk Verlag; 2019.     [File] 
90.
Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W. Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 64:1—64:10.      [DOI]      [File] 
89.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). ACM; 2019.
88.
Wendzel S. Protocol-independent Detection of "Message Ordering" Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 63:1—63:8.      [DOI]      [File] 
87.
Mazurczyk W, Caviglione L, Wendzel S. Recent Advancements in Digital Forensics, Part 2. IEEE Security and Privacy (S&P). 2019; 17(1):7—8.      [DOI]      [File] 
86.
Lv Z, Mazurczyk W, Wendzel S, Song H. Recent Advances in Cyber-Physical Security in Industrial Environments. IEEE Transactions on Industrial Informatics (TII). 2019; 15(12):6468—6471.      [DOI]      [File] 
85.
Mazurczyk W, Szary P, Wendzel S, Caviglione L. Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 69:1—69:8.      [DOI]      [File] 

2018

84.
Wendzel S. Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 13:1—13:8.      [DOI]      [File] 
83.
Mazurczyk W, Wendzel S, Cabaj K. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 10:1—10:10.      [DOI]      [File] 
82.
Keidel R, Wendzel S, Zillien S, Conner ES, Haas G. WoDiCoF — A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (J.UCS). 2018 Jul. 17; 24(5):556—576.      [DOI]      [File] 
81.
Leznik M, Volpert S, Griesinger F, Seybold D, Domaschka J. Done yet? A critical introspective of the cloud management toolbox. In: 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC). 2018 Jun.. p. 1—8.
80.
Volpert S, Griesinger F, Domaschka J. Continuous Anything for Distributed Research Projects. Dependability Engineering. 2018; Dependability Engineering23.      [Weblink] 
79.
Zillien S, Wendzel S. Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer; 2018. p. 203—218.      [DOI]      [File] 
78.
Caviglione L, Mazurczyk W, Wendzel S, Zander S. Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Security and Communication Networks (SCN). 2018; 20181—7.      [DOI]      [File] 
77.
Mazurczyk W, Wendzel S. Information Hiding — Challenges for Forensic Experts. Communications of the ACM. 2018; 61(1):86—94.      [DOI]      [File] 
76.
Wendzel S, Olschewski D. Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. In: Springer; 2018.      [DOI] 
75.
Wendzel S. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. 1 ed. Springer; 2018.      [DOI]      [File]