Unsere letzten Publikationen
142.
Wendzel S,
Caviglione L,
Mazurczyk W,
Mileva A,
Dittmann J,
Krätzer C,
Lamshöft K,
Vielhauer C,
Hartmann L,
Keller J,
Neubert T,
Zillien S.
A Generic Taxonomy for Steganography Methods.
TechRxiv.
2022 Jul.;
[DOI]
[Datei]
141.
Szary P,
Mazurczyk W,
Wendzel S,
Caviglione L.
Analysis of Reversible Network Covert Channels.
ACCESS.
2022;
1041226—41238.
[DOI]
[Datei]
140.
Hartmann L,
Wendzel S.
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA).
2022;
13(3):4—24.
[DOI]
[Datei]
139.
Volpert S,
Eisenhart G,
Domaschka J.
Are Kubernetes CNI solutions ready for> 10 Gbit/s?.
2022;
138.
Schmidbauer T,
Wendzel S.
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA).
2022;
13(1):137—166.
[DOI]
[Datei]