Publikationen

2020

104.
Szary P, Mazurczyk W, Wendzel S, Caviglione L. Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
103.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Information Security Methodology, Replication Studies and Information Security Education. Journal of Universal Computer Science (J.UCS). 2020; 26(7):762—763.      [DOI]      [Datei] 
102.
Wendzel S, Lévy-Bencheton C, Caviglione L. Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics. 2020; 122(1):267—286.      [DOI]      [Datei] 
101.
Seybold D, Hauser CB, Eisenhart G, Volpert S, Domaschka J. Performance Results of a Containerized MongoDB DBMS. 2020;
100.
Caviglione L, Mileva A, Wendzel S. Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC 2020). ACM; 2020.      [DOI]      [Datei] 
99.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020). ACM; 2020.

2019

98.
Seybold D, Volpert S, Bauer A, Herbst N, Domaschka J. Kaa: Evaluating elasticity of cloud-hosted dbms. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 11 ed. IEEE; 2019 Dez.. p. 54—61.
97.
Seybold D, Hauser CB, Eisenhart G, Volpert S, Domaschka J. The impact of the storage tier: A baseline performance analysis of containerized dbms. In: Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers 24. 2019 Okt.. p. 93—105.
96.
Schanzel B, Leznik M, Volpert S, Domaschka J. Unified Container Environments for Scientific Cluster Scenarios. 2019 Apr.;      [Weblink] 
95.
Caviglione L, Mazurczyk W, Wendzel S. Advanced Information Hiding Techniques for Modern Botnets. In: G. Kambourakis and others, editors. Botnets: Architectures, Countermeasures, and Challenges. Taylor & Francis; 2019. p. 165—188.      [DOI]      [Datei] 
94.
Mazurczyk W, Wendzel S, Chourib M, Keller J. Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS). 2019; 94712—725.      [DOI]      [Datei] 
93.
Velinov A, Mileva A, Wendzel S, Mazurczyk W. Covert Channels in the MQTT-based Internet of Things. ACCESS. 2019; 7161899—161915.      [DOI]      [Datei] 
92.
Wendzel S, Link F, Eller D, Mazurczyk W. Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (J.UCS). 2019; 25(11):1396—1416.      [DOI]      [Datei] 
91.
Wendzel S, Plötner J. Einstieg in Linux . 8 ed. Rheinwerk Verlag; 2019.     [Datei] 
90.
Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W. Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 64:1—64:10.      [DOI]      [Datei] 
89.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). ACM; 2019.
88.
Wendzel S. Protocol-independent Detection of "Message Ordering" Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 63:1—63:8.      [DOI]      [Datei] 
87.
Mazurczyk W, Caviglione L, Wendzel S. Recent Advancements in Digital Forensics, Part 2. IEEE Security and Privacy (S&P). 2019; 17(1):7—8.      [DOI]      [Datei] 
86.
Lv Z, Mazurczyk W, Wendzel S, Song H. Recent Advances in Cyber-Physical Security in Industrial Environments. IEEE Transactions on Industrial Informatics (TII). 2019; 15(12):6468—6471.      [DOI]      [Datei] 
85.
Mazurczyk W, Szary P, Wendzel S, Caviglione L. Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York, NY, USA: ACM; 2019. p. 69:1—69:8.      [DOI]      [Datei] 

2018

84.
Wendzel S. Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 13:1—13:8.      [DOI]      [Datei] 
83.
Mazurczyk W, Wendzel S, Cabaj K. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM; 2018 Aug. 20. p. 10:1—10:10.      [DOI]      [Datei] 
82.
Keidel R, Wendzel S, Zillien S, Conner ES, Haas G. WoDiCoF — A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (J.UCS). 2018 Jul. 17; 24(5):556—576.      [DOI]      [Datei] 
81.
Leznik M, Volpert S, Griesinger F, Seybold D, Domaschka J. Done yet? A critical introspective of the cloud management toolbox. In: 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC). 2018 Jun.. p. 1—8.
80.
Volpert S, Griesinger F, Domaschka J. Continuous Anything for Distributed Research Projects. Dependability Engineering. 2018; Dependability Engineering23.      [Weblink]