Prof. Dr. habil. Steffen Wendzel
Zentrum für Technologie und Transfer | ZTT, Hochschule Worms
- 06241/509-213
- 0000-0002-1913-5912
Schymiczek, Jeff; Schmidbauer, Tobias; Wendzel, Steffen
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine LearningProceedings of the 19th International Conference on Availability, Reliability and Security. New York: ACM 2024 S. 1 - 10
Strachanski, Fabian; Petrov, Denis; Schmidbauer, Tobias et al.
A Comprehensive Pattern-based Overview of StegomalwareProceedings of the 19th International Conference on Availability, Reliability and Security. New York: ACM 2024 S. 1 - 10
Dittmann, Jana; Krätzer, Christian; Kiltz, Stefan et al.
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)Steffen Wendzel et al. (Hrsg). GI Sicherheit 2024. Bonn. 2024 S. 265 - 268 (LNI P-345)
Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen DataTransactions on Dependable and Secure Computing. Bd. 0. IEEE 2024 S. 1 - 18
Wendzel, Steffen; Mileva, Aleksandra; Franqueira, Virginia N. L. et al.
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary PerspectiveJournal of Universal Computer Science (JUCS). Bd. 30. H. 9. Klagenfurt: Pensoft Publishers 2024 S. 1137 - 1139
Zillien, Sebastian; Schmidbauer, Tobias; Kubek, Mario et al.
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProc. 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). New York: ACM 2024 S. 1 - 16
Keller, Jörg; Heßeling, Carina; Wendzel, Steffen
Robust and Homomorphic Covert Channels in Streams of Numeric DataProceedings of the 19th International Conference on Availability, Reliability and Security. New York: ACM 2024 S. 1 - 10
Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.
Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)Bonn. 2024 306 S. (LNI P-345)
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech
Avoiding Research Tribal Wars Using TaxonomiesComputer. Bd. 56. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 93 - 96 10008941
Schorr, Victoria; Kamenev, Nikolai; Bleistein, Thomas et al.
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home DevicesEnergy Informatics. Bern: Springer 2023 S. 224 - 239