Key facts on my publications

  • Number of Publications: ~160
  • Citations: 1,070+ (as counted by Google Scholar).
  • DBLP entries: 70+ (my publications in DBLP).
  • Best Paper Awards: 2 (ICMP’12 and IWCC’15)
  • Published textbooks: 6, covering 18 editions.
  • Publications in ranked media according to CORE’2020 ranking:
    • Ranked journals:
      • ACM Computing Surveys (CSUR), Elsevier Future Generation Computer Systems (FGCS, 2x), IEEE Trans. Industrial Informatics (TII), IEEE ACCESS, Communications of the ACM (2x), IEEE Security & Privacy (S&P, 3x), Elsevier Computers & Security (COAS), Springer Scientometrics, Wiley Security & Communication Networks (SCN, 4x), MDPI Applied Sciences, Journal of Universal Computer Science (J.UCS, 5x).
    • Ranked conferences (excluding workshop papers at ranked conferences):
      • IFIP SEC (2x), IEEE LCN (2x), IFIP CMS (2x), HCII (2x), ACM CCS, ICIMP, NordSec (CORE 2010).

Some of my key publications are focusing on information hiding taxonomy/patterns [1a], [1b], information hiding methodology [2], traffic normalization/wardens [3a], [3b], covert channel optimization [4a], [4b], scientometric citation analysis [5] and the security of networked IoT devices and smart buildings [6a],[6b],[6c],[6d].

Books

Wendzel S (2021) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 2nd edn. Springer, https://www.springer.com/gp/book/9783658334222

Wendzel S, Plötner J (2019) Einstieg in Linux, 8th edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/einstieg-in-linux-linux-verstehen-und-einsetzen/

Wendzel S (2018) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. Springer, DOI: 10.1007/978-3-658-22603-9

Mazurczyk W, Wendzel S, Zander S et al (2016a) Information hiding in communication networks. Fundamentals, mechanisms, and applications. Wiley-IEEE, DOI: 10.1002/9781119081715

Wendzel S, Ploetner J (2016b) Einstieg in Linux, 7th edn. Rheinwerk Verlag

Wendzel S, Ploetner J (2014) Einstieg in Linux, 6th edn. Galileo Press

Ploetner J, Wendzel S (2012a) Linux. Das umfassende Handbuch, 5th edn. Galileo Press, http://linuxbuch.blogspot.com/p/linux-das-umfassende-handbuch.html

Wendzel S (2012b) Tunnel und verdeckte Kanäle im Netz, 1st edn. Vieweg+Teubner, DOI: 10.1007/978-3-8348-2143-0

Wendzel S, Ploetner J (2012c) Einstieg in Linux, 5th edn. Galileo Press

Ploetner J, Wendzel S (2011) Linux. Das umfassende Handbuch, 4th edn. Galileo Press

Wendzel S, Ploetner J (2010) Einstieg in Linux. Eine distributionsunabhängige Einführung, 4th edn. Galileo Press

Ploetner J, Wendzel S (2009) Linux. Das umfassende Handbuch, 3rd edn. Galileo Press

Wendzel S, Ploetner J (2008a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 3rd edn. Galileo Press

Ploetner J, Wendzel S (2008b) Linux. Das umfassende Handbuch, 2nd edn. Galileo Press

Ploetner J, Wendzel S (2007) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 2nd edn. Galileo Press, http://www.researchgate.net/publication/233765886_Praxisbuch_Netzwerksicherheit

Wendzel S, Ploetner J (2006a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 2nd edn. Galileo Press

Ploetner J, Wendzel S (2006b) Linux. Ein distributionsunabhängiges Handbuch, 1st edn. Galileo Press

Ploetner J, Wendzel S (2005) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 1st edn. Galileo Press

Wendzel S, Ploetner J (2004) Einstieg in Linux. Eine distributionsunabhängige Einführung, 1st edn. Galileo Press

Edited Journal Special Issues

Caviglione L, Wendzel S, Vrhovec S, Mileva A (eds) Security and privacy issues of home globalization. Security and Privacy (S&P) (in progress): IEEE

Caviglione L, Wendzel S, Mileva A, Vrhovec S (eds) Multidisciplinary solutions to modern cybersecurity challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (in progress):

Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A (eds) (2021) Emerging topics in defending networked systems. Future Generation Computer Systems (FGCS) (in progress): Elsevier, https://www.sciencedirect.com/journal/future-generation-computer-systems/special-issue/10D22HMRPP2

Wendzel S, Caviglione L, Checco A (eds) et al (2020) Information security methodology, replication studies and information security education. Journal of Universal Computer Science (JUCS) 26:762–763, http://www.jucs.org/jucs_26_7/information_security_ethodology_replication/jucs_26_07_0762_0763_editorial.pdf

Caviglione L, Wendzel S, Mazurczyk W (eds) (2019a) Information hiding, network steganography, and covert channels. Computers (in progress): MDPI

Lv Z, Mazurczyk W, Wendzel S, Song H (eds) (2019b) Recent advances in cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics (TII) 15:6468–6471. IEEE, DOI: 10.1109/TII.2019.2945971

Mazurczyk W, Caviglione L, Wendzel S (eds) (2019c) Recent advancements in digital forensics, part 2. IEEE Security and Privacy (S&P) 17:7–8. IEEE, DOI: 10.1109/MSEC.2019.2896857

Caviglione L, Mazurczyk W, Wendzel S, Zander S (eds) (2018) Emerging and unconventional: New attacks and innovative detection techniques. Security and Communication Networks (SCN) 2018:1–7. Wiley-Hindawi, DOI: 10.1155/2018/9672523

Mazurczyk W, Caviglione L, Wendzel S (eds) (2017) Recent advancements in digital forensics – part 1. IEEE Security and Privacy (S&P) 15:10–11. IEEE, DOI: 10.1109/MSP.2017.4251106

Wendzel S, Keller J (eds) (2016) Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (JUCS) 22:1201–1202, DOI: 10.3217/jucs-022-09

Edited Conference and Workshop Proceedings

Caviglione L, Mileva A, Wendzel S (eds) (2020a) Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC’20). ACM

Wendzel S, Caviglione L, Checco A (eds) et al (2020b) Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR’20). ACM

Wendzel S, Caviglione L, Checco A (eds) et al (2019) Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR’19). ACM, Rennes, France

Meier M, Reinhardt D, Wendzel S (eds) (2016) Tagungsband der Sicherheit 2016 – Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/20073

Pohl C, Schinzel S, Wendzel S (eds) (2013) Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Gesellschaft für Informatik e.V. (GI), https://fg-sidar.gi.de/fileadmin/FG/SIDAR/Reports/SIDAR-Report-SR-2013-01.pdf

Book Chapters

Caviglione L, Mazurczyk W, Wendzel S (2019) Advanced information hiding techniques for modern botnets. In: Kambourakis G, others (eds) Botnets: Architectures, countermeasures, and challenges. Taylor; Francis, pp 165–188, DOI: 10.1201/9780429329913-4

Wendzel S, Olschewski D (2018) Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. Springer, DOI: 10.1007/978-3-658-22773-9_16

Wendzel S, Tonejc J, Kaur J, Kobekova A (2017) Cyber security of smart buildings. In: Song H, Fink G, Jeschke S (eds) Security and privacy in cyber-physical systems: Foundations and applications. Wiley-IEEE Press, pp 327–352, DOI: 10.1002/9781119226079.ch16

Wendzel S, Keller J (2012) Einführung in die Forschungsthematik der verdeckten Kanäle. In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen? BoD

Journal Articles

Mileva A, Velinov A, Hartmann L et al (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207

Keller J, Wendzel S (2021b) Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences 11: DOI: 10.3390/app11020731

Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122:267–286. Springer, DOI: 10.1007/s11192-019-03279-6

Velinov A, Mileva A, Wendzel S, Mazurczyk W (2019a) Covert Channels in the MQTT-based Internet of Things. ACCESS 7:161899–161915. IEEE, DOI: 10.1109/ACCESS.2019.2951425

Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25:1396–1416, DOI: 10.3217/jucs-025-11-1396

Mazurczyk W, Wendzel S, Chourib M, Keller J (2019c) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047

Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM 61:86–94. ACM, DOI: 10.1145/3158416

Cabaj K, Caviglione L, Mazurczyk W et al (2018b) The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional 20:31–39. IEEE, DOI: 10.1109/MITP.2018.032501746

Keidel R, Wendzel S, Zillien S et al (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24:556–576, DOI: 10.3217/jucs-024-05-0556

Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy 15:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117

Wendzel S, Caviglione L, Mazurczyk W, Lalande J-F (2017b) Network Information Hiding and Science 2.0: Can it be a Match? International Journal of Electronics and Telecommunications (IJET) 62:217–222. Polish Academy of Sciences, DOI: 10.1515/eletel-2017-0029

Spenger G, Keler J, Wendzel S (2017c) Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM) 6:147–170. River Publishers, DOI: 10.13052/jcsm2245-1439.623

Wendzel S, Mazurczyk W, Haas G (2017d) Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM) 6:105–126. River Publishers, DOI: 10.13052/jcsm2245-1439.621

Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59: ACM, DOI: 10.1145/2828636

Wendzel S, Mazurczyk W, Zander S (2016b) A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22:1456–1486, DOI: 10.3217/jucs-022-11-1456

Wendzel S, Kasem-Madani S (2016c) IoT Security: The Improvement-Decelerating ’Cycle of Blame’, DOI: 10.13052/popcas010

Kaur J, Wendzel S, Eissa O et al (2016d) Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN) 9:2986–2997. Wiley, DOI: 10.1002/sec.1471

Naumann M, Wendzel S, Mazurczyk W, Keller J (2016e) Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN) 9:2972–2985. Wiley, DOI: 10.1002/sec.1500

Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K (2016f) On importance of steganographic cost for network steganography. Security and Communication Networks (SCN) 9:781–790. Wiley Online Library, DOI: 10.1002/sec.1085

Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195

Wendzel S, Palmer C (2015b) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21:1684–1705, DOI: 10.3217/jucs-021-12-1684

Szczypiorski K, Janicki A, Wendzel S (2015c) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM) 10: DOI: 10.12720/jcm.10.10.747-752

Wendzel S, Keller J (2014a) Hidden and under control. annals of telecommunications-annales des télécommunications (ANTE) 69:417–430. Springer, DOI: 10.1007/s12243-014-0423-x

Wendzel S, Keller J (2014b) IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten. Controlling 26. Jahrgang: Beck, DOI: 10.15358/0935-0381_2014_6_304

Wendzel S, Keller J (2012) Preventing Protocol Switching Covert Channels. International Journal on Advances in Security 5: Iaria, DOI: 10.5281/zenodo.4618134

Wendzel S, Keller J (2011) Einführung in die Forschungsthematik der verdeckten Kanäle. Magdeburger Journal zur Sicherheitsforschung 2:115–124, http://www.researchgate.net/profile/Steffen_Wendzel/publication/216466431_Einfhrung_in_die_Forschungsthematik_der_verdeckten_Kanle/links/09e415005387fbf9a4000000.pdf

Conference and Workshop Papers

Wendzel S, Caviglione L, Mazurczyk W et al (2021a) A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery

Zillien S, Wendzel S (2021b) Reconnection-based Covert Channels in Wireless Networks. In: Proc. 36th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2021). Springer

Vrhovec S, Caviglione L, Wendzel S (2021c) Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery

Mileva A, Caviglione L, Velinov A et al (2021d) Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery

Schmidbauer T, Wendzel S (2021e) Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery

Keller J, Wendzel S (2020a) Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3424954.3424966

Hartmann L, Wendzel S (2020b) Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3424954.3424963

Schmidbauer T, Wendzel S (2020c) Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3407023.3409207

Szary P, Mazurczyk W, Wendzel S, Caviglione L (2020d) Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3407023.3409215

Wendzel S (2019a) Protocol-independent Detection of “Messaging Ordering” Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 63:1–63:8, DOI: 10.1145/3339252.3341477

Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W (2019b) Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 64:1–64:10, DOI: 10.1145/3339252.3341488

Mazurczyk W, Szary P, Wendzel S, Caviglione L (2019c) Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 69:1–69:8, DOI: 10.1145/3339252.3341493

Wendzel S, Eller D, Mazurczyk W (2018a) One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC’18). ACM, pp 1:1–1:6, DOI: 10.1145/3277570.3277571

Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13

Mazurczyk W, Wendzel S, Cabaj K (2018c) Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). ACM, pp 10:1–10:10, DOI: 10.1145/3230833.3233261

Wendzel S (2018d) Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). ACM, pp 13:1–13:8, DOI: 10.1145/3230833.3233265

Wendzel S, Mazurczyk W, Haas G (2017a) Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW). IEEE, pp 29–34, DOI: 10.1109/SPW.2017.40

Keller J, Spenger G, Wendzel S (2017b) Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW). IEEE, pp 17–22, DOI: 10.1109/SPW.2017.31

Kobekova A, Bültermann L, Tonejc J, Wendzel S (2017c) Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 515–526, https://www.researchgate.net/publication/318015456_Was_bedeutet_das_IT-Sicherheitsgesetz_fur_Smart_Buildings_Konzepte_des_sicheren_Alterns_der_Gebaude-IT

Lehner F, Mazurczyk W, Keller J, Wendzel S (2017d) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32

Wendzel S, Mazurczyk W (2016) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). Association for Computing Machinery, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037

Kaur J, Tonejc J, Wendzel S, Meier M (2015a) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41

Anhaus EM, Wendzel S (2015b) BACtag – Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec, pp 417–248, https://www.researchgate.net/publication/276762604_BACtag_Data_Leakage_Protection_fur_Gebaude?ev=prf_pub

Tonejc J, Kaur J, Karsten A, Wendzel S (2015c) Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, pp 693–704, DOI: 10.1007/978-3-319-20376-8_62

Caviglione L, Lalande J-F, Mazurczyk W, Wendzel S (2015d) Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, pp 165–177, DOI: 10.1007/978-3-319-20376-8_15

Kaur J, Wendzel S, Meier M (2015e) Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES); IWCC Workshop. IEEE, pp 422–428, DOI: 10.1109/ARES.2015.88

Kaur J, Herdin C, Tonejc J et al (2015f) Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 148–155

Szczypiorski K, Janicki A, Wendzel S (2015g) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT’15). Tokyo, Japan

Wendzel S, Mazurczyk W, Caviglione L, Meier M (2014a) Hidden and uncontrolled–on the emergence of network steganographic threats. In: ISSE 2014 Securing Electronic Business Processes. Springer, pp 123–133, DOI: 10.1007/978-3-658-06708-3_9

Wendzel S, Herdin C, Wirth R et al (2014b) Mosaic-chart based visualization in building automation systems. In: Proceedings of 9th future security (security research conference). Fraunhofer Verlag/MEV Verlag, Berlin, pp 687–690, http://www.researchgate.net/profile/Steffen_Wendzel/publication/265785944_Mosaic-chart_based_Visualization_in_Building_Automation_Systems/links/542ad4710cf29bbc126a771f.pdf

Wendzel S, Zwanger V, Meier M, Szlósarczyk S (2014c) Envisioning smart building botnets. In: SICHERHEIT 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/20.500.12116/20053

Szlósarczyk S, Wendzel S, Kaur J et al (2014d) Towards suppressing attacks on and improving resilience of building automation systems – an approach exemplified using BACnet. In: SICHERHEIT 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/handle/20.500.12116/20060

Kaur J, Wendzel S (2014e) Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS), http://cscubs.cs.uni-bonn.de/2014/data/paper_8.pdf

Kaur J, Meier M, Szlósarczyk S, Wendzel S (2014f) A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria, Lisbon, https://www.wendzel.de/dr.org/files/Papers/SECURWARE14poster.pdf

Lalande J-F, Wendzel S (2013a) Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM). IEEE, pp 701–710, DOI: 10.1109/ARES.2013.92

Kahler B, Wendzel S (2013b) How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD, pp H1–H13, https://www.researchgate.net/publication/235702099_How_to_own_a_Building_Wardriving_gegen_die_Gebaude-Automation

Backs P, Wendzel S, Keller J (2012a) Dynamic routing in covert channel overlays based on control protocols. In: 2012 International Conference for Internet Technology and Secured Transactions (ICITST’12). IEEE, pp 32–39, https://ieeexplore.ieee.org/document/6470978

Wendzel S, Kahler B, Rist T (2012b) Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom). IEEE, pp 731–736, DOI: 10.1109/GreenCom.2012.120

Wendzel S, Keller J (2012c) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11

Wendzel S, Keller J (2012d) Design and implementation of an active warden addressing protocol switching covert channels. In: Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012). IARIA, pp 1–6, https://www.researchgate.net/publication/229092168_Design_and_Implementation_of_an_Active_Warden_Addressing_Protocol_Switching_Covert_Channels

Wendzel S, Zander S (2012e) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628

Wendzel S (2012f) The problem of traffic normalization within a covert channel’s network environment learning phase. In: SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., pp 149–161, https://dl.gi.de/handle/20.500.12116/18270

Wendzel S (2012g) Covert and side channels in buildings and the prototype of a building-aware active warden. In: 2012 IEEE International Conference on Communications (ICC). IEEE, pp 6753–6758, DOI: 10.1109/ICC.2012.6364876

Rist T, Wendzel S, Masoodian M, André E (2012h) Next-generation home automation systems. Pabst Science Publishers, https://www.researchgate.net/publication/229092368_Next-Generation_Home_Automation_Systems

Rist T, Wendzel S, Masoodian M et al (2011a) Creating Awareness for Efficient Energy Use in Smart Homes. In: Feuerstein G, Ritter W (eds) Zusammenfassung der Beiträge zum Usability Day IX, Dornbirn, Austria. Pabst, pp 162–168, https://www.researchgate.net/publication/215661204_Creating_Awareness_for_Efficient_Energy_Use_in_Smart_Homes

Wendzel S (2011b) Mikroprotokolle in verdeckten Kanälen. In: Beiträge zum Doktorandenkolleg Ruhr 2011. Meinerzhagen Valbert

Wendzel S, Keller J (2011c) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10

Wendzel S, Rist T, Masoodian M, André E (2011d) A Secure Interoperable Architecture for Building-Automation Applications. In: Proc. 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), DOI: 10.1145/2093698.2093706

Contributions to EU-related Documents

Mazurczyk W, Amann P, Caviglione L, Wendzel S (2016) CUIng: Criminal use of information hiding initiative. European CIIP Newsletter 10:31–32

Contributor (2015a) Security and resilience of smart home environments: Good practices and recommendations. ENISA, https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/smart-homes/security-resilience-good-practices/at_download/fullReport

Contributor (2015b) EU NIS Platform: State-of-the-art of secure ICT landscape. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/research-landscape-deliverable-v2/at_download/file

Contributor (2015c) EU NIS Platform: Cybersecurity strategic research agenda. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/strategic-research-agenda-final-v0.96/at_download/file

Theses

Wendzel S (2020) Network information hiding: Terminology, taxonomy, methodology and countermeasures. Habilitation Thesis, Department of Mathematics; Computer Science, Unversity of Hagen, http://www.wendzel.de/dr.org/files/Papers/thesis_with_cover.pdf

Wendzel S (2013) Novel approaches for network covert storage channels. Dissertation, Department of Mathematics; Computer Science, Unversity of Hagen, https://ub-deposit.fernuni-hagen.de/receive/mir_mods_00000190

Wendzel S (2011) Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle. Master’s Thesis, Augsburg University of Applied Sciences

Wendzel S (2009) Protokollwechsel zur Realisierung von Covert Channels und Headerstrukturveränderungen zur Vermeidung von Covert Channels. Diplomarbeit, Kempten University of Applied Sciences

Technical Reports

Wendzel S, Kobekova A, Tonejc J, Kaur J (2016a) IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt. Smart Home Summit

Wendzel S (2016b) Why Johnny can’t use stego: A human-oriented perspective on the application of steganography. CoRR abs/1609.06664: http://arxiv.org/abs/1609.06664

Wendzel S (2012a) Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft für Informatik, FB Sicherheit, Berlin, p 24, http://www.wendzel.de/dr.org/files/Papers/spring7_17_abstract_wendzel.pdf

Rist T, Wendzel S (2012b) Internationale Forschungskooperation IT4SE. Jahresbericht der Hochschule Augsburg 116

Wendzel S (2012c) Novel Developments in the Area of Network Covert Channels. Forschungsbericht der Hochschule Augsburg 108–112

Koch R, Wendzel S (2012d) Social Network Security Project. Forschungsbericht der Hochschule Augsburg 158–162

Wendzel S (2012e) Sichere Middleware für Gebäude-Automation. Forschungsbericht der Hochschule Augsburg 155

Rist T, Wendzel S, André E, Masoodian M (2011) IT4SE – IT for smart renewable energy generation and use. News from a German-New Zealand Research Cooperation within the BMBF-funded APRA Initiative. Jahresbericht der Hochschule Augsburg 59–66

Wendzel S (2008) Protocol channels as a new design alternative of covert channels. CoRR abs/0809.1949: https://arxiv.org/abs/0809.1949

Miscellaneous Publications

Wendzel S (2017a) Zur IT-Sicherheit von Smart Homes

Wendzel S (2017b) Steganografie: eine zunehmende Bedrohung

Wendzel S (2017c) Made in Germany – Sicherheit als Vertrauensfaktor. CCI-Zeitung 2017:

Wendzel S (2016a) Tatort Smart Building: die Gebäudeautomation muss sicherer werden. CCI-Zeitung 2016:16

Kobekova A, Wendzel S, Tonejc J (2016b) Smart Building – Sicherheitslücken schließen. PROTECTOR 2016:42–43

Wendzel S, Meier M, Tonejc J (2015a) Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation. BusSysteme Magazin 22:257

Wübbeling M, Wendzel S (2015b) IT-Sicherheitsmonitoring. Cyber Security Report 2015 19–21. Mittler Report

Messer-Schmidt K, Rösler D, Ruppricht C et al (2014a) Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik). digitalbusiness CLOUD 40–41, https://fg-secmgt.gi.de/ak-kritis/arbeitsergebnisse

Wendzel S (2014b) Exfiltration vertrauenswürdiger Daten – Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher. digitalbusiness CLOUD 2014:37

Wendzel S (2013a) Gefahrenpotential der Netzwerksteganografie. IT-SICHERHEIT 2013:58–59

Wendzel S (2013b) Sicherheitsaspekte in der Gebäude-Automation – Perspektiven der Personenüberwachung. IT-SICHERHEIT 2013:70–72

Wendzel S (2012a) Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme. BusSysteme Magazin 2012:182–183

Wendzel S, Koch R (2012b) Social network security, pt. 1. Hakin9 (en) 1:

Wendzel S, Rist T, André E et al (2012c) Sicherheit beim Energiesparen durch Abstraktion. BusSysteme Magazin 12:

Koch R, Wendzel S (2012d) Social network security, pt. 2. Hakin9 (en) 1:

Contributor/Co-author (2012e) Soziale Netzwerke und ihre Auswirkungen auf die Unternehmenssicherheit

Wendzel S (2011) Bewusstsein für die Sicherheit im Bereich der Gebäudeautomatisierung. Hakin9 (de) 2011:11–12

Wendzel S (2009) Protocol Channels. Hakin9 2009:38–40

Wendzel S (2007a) Forensik nach Angriffen auf Linux-Systeme. Hakin9 2007:

Wendzel S (2007b) Abhärtung von Linux/BSD Systemen. Eine Einführung. Hakin9 2007:

Wendzel S (2007c) Hostbasierte Intrusion Detection. Ein Einblick. Hakin9 2007:

Wendzel S (2007d) Firewalls umgehen mit Protokoll-Tunneling. Hakin9 2007:

Plötner J, Wendzel S (2006) Versionsverwaltung – Mit CVS oder Subversion Quelltexte verwalten. Linux-User 2006:

Wendzel S (2005) Xyria:CDPNNTPd. FreeX 2005:

Wendzel S (2003a) Das Allround-Genie Z-Shell. FreeX 2003:

Wendzel S (2003b) sysctl in OpenBSD. FreeX 2003:

Published Reviews

Wendzel S (2020) Review of the World Scientific Publishing Co., Inc. book “future automation: Changes to lives and to businesses”, 2018). ACM Computing Reviews N.N.: ACM

Wendzel S (2018a) Review of the article “man-in-the-middle attacks on secure simple pairing in bluetooth standard v5.0 and its countermeasure”. ACM Computing Reviews 49: ACM

Wendzel S (2018b) Ich hab’ nichts zu verbergen! Rezension zum Buch “Komplizen des Erkennungsdienstes”. Schwarz-auf-Weiss SAW:

Wendzel S (2017a) Review of the acm csur article “out-of-band covert channels–a survey”. ACM Computing Reviews 48:49. ACM

Wendzel S (2017b) Review of the Cambridge Univ. Press book “darkweb cyber threat intelligence mining”. ACM Computing Reviews 48: ACM