Prof. Dr. habil. Steffen Wendzel
Zentrum für Technologie und Transfer | ZTT, Hochschule Worms
- 06241/509-213
- 0000-0002-1913-5912
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22
Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.
Cyber Security of Smart BuildingsH. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170
Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring ApproachProc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
Network Information Hiding and Science 2.0: Can it be a Match?Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Recent Advancements in Digital Forensics.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11
Wendzel, Steffen
Review of `Out-of-band Covert Channels--A Survey'ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg
Steganography for Cyber-physical SystemsJournal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech
The Future of Digital Forensics: Challenges and the Road Ahead.IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17