Publications

2016

53.
Wendzel S, Mazurczyk W. Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). New York, NY, USA: ACM; 2016. p. 1739–1741.      [DOI]      [File] 
52.
Meier M, Reinhardt D, Wendzel S. Sicherheit 2016 — Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2016.     [File] 
51.
Wendzel S, Keller J. Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS). 2016; 22(9):1201—1202.      [DOI]      [File] 

2015

50.
Szczypiorski K, Janicki A, Wendzel S. "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT 2015). 2015. p. 747—752.      [DOI]      [File] 
49.
Caviglione L, Lalande J, Mazurczyk W, Wendzel S. Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 165—177.      [DOI]      [File] 
48.
Anhaus EM, Wendzel S. BACtag — Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec; 2015. p. 417—248.     [File] 
47.
Kaur J, Wendzel S, Meier M. Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop. 2015. p. 422—428.      [DOI]      [File] 
46.
Wendzel S, Palmer C. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.. Journal of Universal Computer Science (J.UCS). 2015; 21(12):1684—1705.      [DOI]      [File] 
45.
Kaur J, Herdin C, Tonejc J, Wendzel S, Meier M, Szlósarczyk S. Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH; 2015. p. 148—155.
44.
Wendzel S, Zander S, Fechner B, Herdin C. Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR). 2015; 47(3):1—26.      [DOI]      [File] 
43.
Kaur J, Tonejc J, Wendzel S, Meier M. Securing BACnet's pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). 2015. p. 616—629.      [DOI]      [File] 
42.
Tonejc J, Kaur J, Karsten A, Wendzel S. Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). 2015. p. 693—704.      [DOI]      [File] 

2014

41.
Kaur J, Meier M, Szlósarczyk S, Wendzel S. A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria; 2014.     [File] 
40.
Wendzel S, Ploetner J. Einstieg in Linux . 6 ed. Galileo Press; 2014.
39.
Wendzel S, Zwanger V, Meier M, Szlósarczyk S. Envisioning smart building botnets. In: Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V.; 2014.     [File] 
38.
Wendzel S, Mazurczyk W, Caviglione L, Meier M. Hidden and uncontrolled—on the emergence of network steganographic threats. In: Securing Electronic Business Processes (ISSE 2014). Springer; 2014. p. 123—133.      [DOI]      [File] 
37.
Wendzel S, Keller J. Hidden and under control. Annals of Telecommunications—Annales des Télécommunications (ANTE). 2014; 69(7):417—430.      [DOI]      [File] 
36.
Wendzel S, Keller J. IT-gestütztes Management und Controlling: Verdeckte Kanäle — eine zunehmende Gefahr für Unternehmensdaten. Controlling. 2014; 26. Jahrgang(14/6):      [DOI]      [File] 
35.
Wendzel S, Herdin C, Wirth R, Masoodian M, Luz S, Kaur J. Mosaic-chart based visualization in building automation systems. In: Proceedings of the 9th Future Security Research Conference. Fraunhofer Verlag/MEV Verlag, Berlin; 2014. p. 687—690.     [File] 
34.
Kaur J, Wendzel S. Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS). 2014.     [File] 
33.
Szlósarczyk S, Wendzel S, Kaur J, Meier M, Schubert F. Towards suppressing attacks on and improving resilience of building automation systems — an approach exemplified using BACnet. In: Sicherheit 2014 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V.; 2014.     [File] 

2013

32.
Lalande J, Wendzel S. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013). IEEE; 2013. p. 701—710.      [DOI] 
31.
Kahler B, Wendzel S. How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD; 2013. p. H1—H13.     [File] 
30.
Pohl C, Schinzel S, Wendzel S. Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013). Gesellschaft für Informatik e.V. (GI); 2013.     [File] 

2012

29.
Wendzel S. Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft für Informatik, FB Sicherheit, SIG SIDAR; 2012. p. 24.