Key facts on my publications

  • Number of Publications: 169
  • Citations: ca. 1,200 (as counted by Google Scholar).
  • DBLP entries: 70+ (my publications in DBLP).
  • Best Paper Awards: 2 (ICMP’12 and IWCC’15)
  • Published textbooks: 6, covering 18 editions.
  • Publications in ranked media:
    • Ranked journals:
      • ACM Computing Surveys (CSUR), Elsevier Future Generation Computer Systems (FGCS, 2x), IEEE Trans. Industrial Informatics (TII), IEEE ACCESS, Communications of the ACM (2x), IEEE Security & Privacy (S&P, 3x), Elsevier Computers & Security (COAS), Springer Scientometrics, Wiley Security & Communication Networks (SCN, 4x), MDPI Applied Sciences, Journal of Universal Computer Science (J.UCS, 5x), Acta Oncologica, IEEE IT Professional.
    • Ranked conferences (excluding workshop papers at ranked conferences):
      • IEEE LCN (3x), IFIP SEC (2x), IFIP CMS (2x), HCII (2x), ACM CCS, ICIMP, NordSec (CORE 2010).

Some of my key publications are focusing on information hiding taxonomy/patterns [1a], [1b], information hiding methodology [2], traffic normalization/wardens [3a], [3b], covert channel optimization [4a], [4b], scientometric citation analysis [5a] and the security of networked IoT devices and smart buildings [6a],[6b],[6c],[6d].

Books

Wendzel S (2021a) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 2nd edn. Springer, DOI: 10.1007/978-3-658-33423-9

Wendzel S, Plötner J (2021b) Linux. Der Grundkurs, 9th edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/linux-der-grundkurs/

Wendzel S, Plötner J (2019) Einstieg in Linux, 8th edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/einstieg-in-linux-linux-verstehen-und-einsetzen/

Wendzel S (2018) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. Springer, DOI: 10.1007/978-3-658-22603-9

Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K (2016a) Information hiding in communication networks. Fundamentals, mechanisms, and applications. Wiley-IEEE, DOI: 10.1002/9781119081715

Wendzel S, Ploetner J (2016b) Einstieg in Linux, 7th edn. Rheinwerk Verlag

Wendzel S, Ploetner J (2014) Einstieg in Linux, 6th edn. Galileo Press

Ploetner J, Wendzel S (2012a) Linux. Das umfassende Handbuch, 5th edn. Galileo Press, http://linuxbuch.blogspot.com/p/linux-das-umfassende-handbuch.html

Wendzel S (2012b) Tunnel und verdeckte Kanäle im Netz, 1st edn. Vieweg+Teubner, DOI: 10.1007/978-3-8348-2143-0

Wendzel S, Ploetner J (2012c) Einstieg in Linux, 5th edn. Galileo Press

Ploetner J, Wendzel S (2011) Linux. Das umfassende Handbuch, 4th edn. Galileo Press

Wendzel S, Ploetner J (2010) Einstieg in Linux. Eine distributionsunabhängige Einführung, 4th edn. Galileo Press

Ploetner J, Wendzel S (2009) Linux. Das umfassende Handbuch, 3rd edn. Galileo Press

Wendzel S, Ploetner J (2008a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 3rd edn. Galileo Press

Ploetner J, Wendzel S (2008b) Linux. Das umfassende Handbuch, 2nd edn. Galileo Press

Ploetner J, Wendzel S (2007) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 2nd edn. Galileo Press, http://www.researchgate.net/publication/233765886_Praxisbuch_Netzwerksicherheit

Wendzel S, Ploetner J (2006a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 2nd edn. Galileo Press

Ploetner J, Wendzel S (2006b) Linux. Ein distributionsunabhängiges Handbuch, 1st edn. Galileo Press

Ploetner J, Wendzel S (2005) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 1st edn. Galileo Press

Wendzel S, Ploetner J (2004) Einstieg in Linux. Eine distributionsunabhängige Einführung, 1st edn. Galileo Press

Edited Journal Special Issues

Caviglione L, Wendzel S, Vrhovec S, Mileva A Security and privacy issues of home globalization. Security and Privacy (S&P) (in progress): IEEE

Wendzel S, Caviglione L, Mileva A, Lalande J-F, Mazurczyk W Information security methodology and replication studies. it – Information Technology (in progress):

Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A (2021) Emerging topics in defending networked systems. Future Generation Computer Systems (FGCS) (in progress): Elsevier, DOI: 10.1016/j.future.2021.10.010

Caviglione L, Wendzel S, Mileva A, Vrhovec S Multidisciplinary solutions to modern cybersecurity challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (in progress):

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (2020) Information security methodology, replication studies and information security education. Journal of Universal Computer Science (JUCS) 26:762–763, http://www.jucs.org/jucs_26_7/information_security_ethodology_replication/jucs_26_07_0762_0763_editorial.pdf

Caviglione L, Wendzel S, Mazurczyk W (2019a) Information hiding, network steganography, and covert channels. Computers (in progress): MDPI

Lv Z, Mazurczyk W, Wendzel S, Song H (2019b) Recent advances in cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics (TII) 15:6468–6471. IEEE, DOI: 10.1109/TII.2019.2945971

Mazurczyk W, Caviglione L, Wendzel S (2019c) Recent advancements in digital forensics, part 2. IEEE Security and Privacy (S&P) 17:7–8. IEEE, DOI: 10.1109/MSEC.2019.2896857

Caviglione L, Mazurczyk W, Wendzel S, Zander S (2018) Emerging and unconventional: New attacks and innovative detection techniques. Security and Communication Networks (SCN) 2018:1–7. Wiley-Hindawi, DOI: 10.1155/2018/9672523

Mazurczyk W, Caviglione L, Wendzel S (2017) Recent advancements in digital forensics – part 1. IEEE Security and Privacy (S&P) 15:10–11. IEEE, DOI: 10.1109/MSP.2017.4251106

Wendzel S, Keller J (2016) Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (JUCS) 22:1201–1202, DOI: 10.3217/jucs-022-09

Edited Conference and Workshop Proceedings

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2021) Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR’21). ACM

Caviglione L, Mileva A, Wendzel S (eds) (2020a) Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC’20). ACM

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2020b) Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR’20). ACM

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2019) Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR’19). ACM, Rennes, France

Meier M, Reinhardt D, Wendzel S (eds) (2016) Tagungsband der Sicherheit 2016 – Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/20073

Pohl C, Schinzel S, Wendzel S (eds) (2013) Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Gesellschaft für Informatik e.V. (GI), https://fg-sidar.gi.de/fileadmin/FG/SIDAR/Reports/SIDAR-Report-SR-2013-01.pdf

Book Chapters

Caviglione L, Mazurczyk W, Wendzel S (2019) Advanced information hiding techniques for modern botnets. In: Kambourakis G, others (eds) Botnets: Architectures, countermeasures, and challenges. Taylor & Francis, pp 165–188, DOI: 10.1201/9780429329913-4

Wendzel S, Olschewski D (2018) Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. Springer, DOI: 10.1007/978-3-658-22773-9_16

Wendzel S, Tonejc J, Kaur J, Kobekova A (2017) Cyber security of smart buildings. In: Song H, Fink G, Jeschke S (eds) Security and privacy in cyber-physical systems: Foundations and applications. Wiley-IEEE Press, pp 327–352, DOI: 10.1002/9781119226079.ch16

Wendzel S, Keller J (2012) Einführung in die Forschungsthematik der verdeckten Kanäle. In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen? BoD

Journal Articles

Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207

Keller J, Wendzel S (2021b) Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences 11: DOI: 10.3390/app11020731

Pettersen H, Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A van den, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Piersimoni P, Protsenko M, Rehman A, Richter M, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kofarago M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S, Röhrich D (2021c) Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks. Acta Oncologica 60:1413–1418. Taylor & Francis, DOI: 10.1080/0284186X.2021.1949037

Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122:267–286. Springer, DOI: 10.1007/s11192-019-03279-6

Velinov A, Mileva A, Wendzel S, Mazurczyk W (2019a) Covert Channels in the MQTT-based Internet of Things. ACCESS 7:161899–161915. IEEE, DOI: 10.1109/ACCESS.2019.2951425

Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25:1396–1416, DOI: 10.3217/jucs-025-11-1396

Mazurczyk W, Wendzel S, Chourib M, Keller J (2019c) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047

Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM 61:86–94. ACM, DOI: 10.1145/3158416

Cabaj K, Caviglione L, Mazurczyk W, Wendzel S, Woodward A, Zander S (2018b) The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional 20:31–39. IEEE, DOI: 10.1109/MITP.2018.032501746

Keidel R, Wendzel S, Zillien S, Conner ES, Haas G (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24:556–576, DOI: 10.3217/jucs-024-05-0556

Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy 15:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117

Wendzel S, Caviglione L, Mazurczyk W, Lalande J-F (2017b) Network Information Hiding and Science 2.0: Can it be a Match? International Journal of Electronics and Telecommunications (IJET) 62:217–222. Polish Academy of Sciences, DOI: 10.1515/eletel-2017-0029

Spenger G, Keler J, Wendzel S (2017c) Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM) 6:147–170. River Publishers, DOI: 10.13052/jcsm2245-1439.623

Wendzel S, Mazurczyk W, Haas G (2017d) Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM) 6:105–126. River Publishers, DOI: 10.13052/jcsm2245-1439.621

Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59: ACM, DOI: 10.1145/2828636

Wendzel S, Mazurczyk W, Zander S (2016b) A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22:1456–1486, DOI: 10.3217/jucs-022-11-1456

Wendzel S, Kasem-Madani S (2016c) IoT Security: The Improvement-Decelerating ’Cycle of Blame’, DOI: 10.13052/popcas010

Kaur J, Wendzel S, Eissa O, Tonejc J, Meier M (2016d) Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN) 9:2986–2997. Wiley, DOI: 10.1002/sec.1471

Naumann M, Wendzel S, Mazurczyk W, Keller J (2016e) Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN) 9:2972–2985. Wiley, DOI: 10.1002/sec.1500

Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K (2016f) On importance of steganographic cost for network steganography. Security and Communication Networks (SCN) 9:781–790. Wiley Online Library, DOI: 10.1002/sec.1085

Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195

Wendzel S, Palmer C (2015b) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21:1684–1705, DOI: 10.3217/jucs-021-12-1684

Szczypiorski K, Janicki A, Wendzel S (2015c) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM) 10: DOI: 10.12720/jcm.10.10.747-752

Wendzel S, Keller J (2014a) Hidden and under control. annals of telecommunications-annales des télécommunications (ANTE) 69:417–430. Springer, DOI: 10.1007/s12243-014-0423-x

Wendzel S, Keller J (2014b) IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten. Controlling 26. Jahrgang: Beck, DOI: 10.15358/0935-0381_2014_6_304

Wendzel S, Keller J (2012) Preventing Protocol Switching Covert Channels. International Journal on Advances in Security 5: Iaria, DOI: 10.5281/zenodo.4618134

Wendzel S, Keller J (2011) Einführung in die Forschungsthematik der verdeckten Kanäle. Magdeburger Journal zur Sicherheitsforschung 2:115–124, http://www.researchgate.net/profile/Steffen_Wendzel/publication/216466431_Einfhrung_in_die_Forschungsthematik_der_verdeckten_Kanle/links/09e415005387fbf9a4000000.pdf

Conference and Workshop Papers

Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T (2021a) A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, DOI: 10.1145/3465481.3470069

Zillien S, Wendzel S (2021b) Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang A, Futcher L, Hagen J (eds) ICT Systems Security and Privacy Protection (Proc. IFIP SEC 2021). Springer International Publishing, Cham, pp 118–133, DOI: 10.1007/978-3-030-78120-0_8

Vrhovec S, Caviglione L, Wendzel S (2021c) Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, DOI: 10.1145/3465481.3470027

Chourib M, Wendzel S, Mazurczyk W (2021d) Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: Proc. 46th Conference on Local Computer Networks (LCN). IEEE, pp 148–153, DOI: 10.1109/LCN52139.2021.9524939

Schmidbauer T, Wendzel S (2021e) Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, DOI: 10.1145/3465481.3470085

Mileva A, Caviglione L, Velinov A, Wendzel S, Dimitrova V (2021f) Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, DOI: 10.1145/3465481.3470072

Hartmann L, Zillien S, Wendzel S (2021g) Analysis of New Covert Channels in CoAP. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). Association for Computing Machinery

Hartmann L, Wendzel S (2021h) Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). Association for Computing Machinery

Wendzel S, Hartmann L (2021i) How Feasible are Steganographic and Stealth Attacks on TIA Project Meta-data of ICS: A Case Study with Real-world Data. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). Association for Computing Machinery, DOI: 10.1145/3487405.3487661

Eikeland VN, Schilling A, Aehle M, Alme J, Barnafoldi GG, Borshchov V, Feofilov G, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland O, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Sølie JR, Rehman AU, Richter M, Rohrich D, Seco J, Shafiee H, Songmoolnak A, Tambave GJ, Tymchuk I, Ullaland K, Brink TVD, Varga-Kofarago M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S (2021j) Bergen proton-CT project. In: Proc. 12th International Conference on Position Sensitive Detectors (PSD)

Keller J, Wendzel S (2020a) Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3424954.3424966

Hartmann L, Wendzel S (2020b) Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3424954.3424963

Schmidbauer T, Wendzel S (2020c) Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3407023.3409207

Szary P, Mazurczyk W, Wendzel S, Caviglione L (2020d) Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3407023.3409215

Wendzel S (2019a) Protocol-independent Detection of “Messaging Ordering” Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 63:1–63:8, DOI: 10.1145/3339252.3341477

Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W (2019b) Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 64:1–64:10, DOI: 10.1145/3339252.3341488

Mazurczyk W, Szary P, Wendzel S, Caviglione L (2019c) Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 69:1–69:8, DOI: 10.1145/3339252.3341493

Wendzel S, Eller D, Mazurczyk W (2018a) One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC’18). ACM, pp 1:1–1:6, DOI: 10.1145/3277570.3277571

Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13

Mazurczyk W, Wendzel S, Cabaj K (2018c) Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). ACM, pp 10:1–10:10, DOI: 10.1145/3230833.3233261

Wendzel S (2018d) Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). ACM, pp 13:1–13:8, DOI: 10.1145/3230833.3233265

Wendzel S, Mazurczyk W, Haas G (2017a) Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW). IEEE, pp 29–34, DOI: 10.1109/SPW.2017.40

Keller J, Spenger G, Wendzel S (2017b) Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW). IEEE, pp 17–22, DOI: 10.1109/SPW.2017.31

Kobekova A, Bültermann L, Tonejc J, Wendzel S (2017c) Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 515–526, https://www.researchgate.net/publication/318015456_Was_bedeutet_das_IT-Sicherheitsgesetz_fur_Smart_Buildings_Konzepte_des_sicheren_Alterns_der_Gebaude-IT

Lehner F, Mazurczyk W, Keller J, Wendzel S (2017d) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32

Wendzel S, Mazurczyk W (2016) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). Association for Computing Machinery, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037

Kaur J, Tonejc J, Wendzel S, Meier M (2015a) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41

Anhaus EM, Wendzel S (2015b) BACtag – Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec, pp 417–248, https://www.researchgate.net/publication/276762604_BACtag_Data_Leakage_Protection_fur_Gebaude?ev=prf_pub

Tonejc J, Kaur J, Karsten A, Wendzel S (2015c) Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, pp 693–704, DOI: 10.1007/978-3-319-20376-8_62

Caviglione L, Lalande J-F, Mazurczyk W, Wendzel S (2015d) Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, pp 165–177, DOI: 10.1007/978-3-319-20376-8_15

Kaur J, Wendzel S, Meier M (2015e) Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES); IWCC Workshop. IEEE, pp 422–428, DOI: 10.1109/ARES.2015.88

Kaur J, Herdin C, Tonejc J, Wendzel S, Meier M, Szlósarczyk S (2015f) Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 148–155

Szczypiorski K, Janicki A, Wendzel S (2015g) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT’15). Tokyo, Japan

Wendzel S, Mazurczyk W, Caviglione L, Meier M (2014a) Hidden and uncontrolled–on the emergence of network steganographic threats. In: ISSE 2014 Securing Electronic Business Processes. Springer, pp 123–133, DOI: 10.1007/978-3-658-06708-3_9

Wendzel S, Herdin C, Wirth R, Masoodian M, Luz S, Kaur J (2014b) Mosaic-chart based visualization in building automation systems. In: Proceedings of 9th future security (security research conference). Fraunhofer Verlag/MEV Verlag, Berlin, pp 687–690, http://www.researchgate.net/profile/Steffen_Wendzel/publication/265785944_Mosaic-chart_based_Visualization_in_Building_Automation_Systems/links/542ad4710cf29bbc126a771f.pdf

Wendzel S, Zwanger V, Meier M, Szlósarczyk S (2014c) Envisioning smart building botnets. In: SICHERHEIT 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/20.500.12116/20053

Szlósarczyk S, Wendzel S, Kaur J, Meier M, Schubert F (2014d) Towards suppressing attacks on and improving resilience of building automation systems – an approach exemplified using BACnet. In: SICHERHEIT 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/handle/20.500.12116/20060

Kaur J, Wendzel S (2014e) Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS), http://cscubs.cs.uni-bonn.de/2014/data/paper_8.pdf

Kaur J, Meier M, Szlósarczyk S, Wendzel S (2014f) A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria, Lisbon, https://www.wendzel.de/dr.org/files/Papers/SECURWARE14poster.pdf

Lalande J-F, Wendzel S (2013a) Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM). IEEE, pp 701–710, DOI: 10.1109/ARES.2013.92

Kahler B, Wendzel S (2013b) How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD, pp H1–H13, https://www.researchgate.net/publication/235702099_How_to_own_a_Building_Wardriving_gegen_die_Gebaude-Automation

Backs P, Wendzel S, Keller J (2012a) Dynamic routing in covert channel overlays based on control protocols. In: 2012 International Conference for Internet Technology and Secured Transactions (ICITST’12). IEEE, pp 32–39, https://ieeexplore.ieee.org/document/6470978

Wendzel S, Kahler B, Rist T (2012b) Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom). IEEE, pp 731–736, DOI: 10.1109/GreenCom.2012.120

Wendzel S, Keller J (2012c) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11

Wendzel S, Keller J (2012d) Design and implementation of an active warden addressing protocol switching covert channels. In: Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012). IARIA, pp 1–6, https://www.researchgate.net/publication/229092168_Design_and_Implementation_of_an_Active_Warden_Addressing_Protocol_Switching_Covert_Channels

Wendzel S, Zander S (2012e) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628

Wendzel S (2012f) The problem of traffic normalization within a covert channel’s network environment learning phase. In: SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., pp 149–161, https://dl.gi.de/handle/20.500.12116/18270

Wendzel S (2012g) Covert and side channels in buildings and the prototype of a building-aware active warden. In: 2012 IEEE International Conference on Communications (ICC). IEEE, pp 6753–6758, DOI: 10.1109/ICC.2012.6364876

Rist T, Wendzel S, Masoodian M, André E (2012h) Next-generation home automation systems. Pabst Science Publishers, https://www.researchgate.net/publication/229092368_Next-Generation_Home_Automation_Systems

Rist T, Wendzel S, Masoodian M, Monigatti P, André E (2011a) Creating Awareness for Efficient Energy Use in Smart Homes. In: Feuerstein G, Ritter W (eds) Zusammenfassung der Beiträge zum Usability Day IX, Dornbirn, Austria. Pabst, pp 162–168, https://www.researchgate.net/publication/215661204_Creating_Awareness_for_Efficient_Energy_Use_in_Smart_Homes

Wendzel S (2011b) Mikroprotokolle in verdeckten Kanälen. In: Beiträge zum Doktorandenkolleg Ruhr 2011. Meinerzhagen Valbert

Wendzel S, Keller J (2011c) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10

Wendzel S, Rist T, Masoodian M, André E (2011d) A Secure Interoperable Architecture for Building-Automation Applications. In: Proc. 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), DOI: 10.1145/2093698.2093706

Contributions to EU-related Documents

Mazurczyk W, Amann P, Caviglione L, Wendzel S (2016) CUIng: Criminal use of information hiding initiative. European CIIP Newsletter 10:31–32

Contributor (2015a) Security and resilience of smart home environments: Good practices and recommendations. ENISA, https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/smart-homes/security-resilience-good-practices/at_download/fullReport

Contributor (2015b) EU NIS Platform: State-of-the-art of secure ICT landscape. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/research-landscape-deliverable-v2/at_download/file

Contributor (2015c) EU NIS Platform: Cybersecurity strategic research agenda. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/strategic-research-agenda-final-v0.96/at_download/file

Theses

Wendzel S (2020) Network information hiding: Terminology, taxonomy, methodology and countermeasures. Habilitation Thesis, Department of Mathematics; Computer Science, Unversity of Hagen, http://www.wendzel.de/dr.org/files/Papers/thesis_with_cover.pdf

Wendzel S (2013) Novel approaches for network covert storage channels. Dissertation, Department of Mathematics; Computer Science, Unversity of Hagen, https://ub-deposit.fernuni-hagen.de/receive/mir_mods_00000190

Wendzel S (2011) Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle. Master’s Thesis, Augsburg University of Applied Sciences

Wendzel S (2009) Protokollwechsel zur Realisierung von Covert Channels und Headerstrukturveränderungen zur Vermeidung von Covert Channels. Diplomarbeit, Kempten University of Applied Sciences

Technical Reports

Wendzel S, Kobekova A, Tonejc J, Kaur J (2016a) IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt. Smart Home Summit

Wendzel S (2016b) Why Johnny can’t use stego: A human-oriented perspective on the application of steganography. CoRR abs/1609.06664: http://arxiv.org/abs/1609.06664

Wendzel S (2012a) Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft für Informatik, FB Sicherheit, Berlin, p 24, http://www.wendzel.de/dr.org/files/Papers/spring7_17_abstract_wendzel.pdf

Rist T, Wendzel S (2012b) Internationale Forschungskooperation IT4SE. Jahresbericht der Hochschule Augsburg 116

Wendzel S (2012c) Novel Developments in the Area of Network Covert Channels. Forschungsbericht der Hochschule Augsburg 108–112

Koch R, Wendzel S (2012d) Social Network Security Project. Forschungsbericht der Hochschule Augsburg 158–162

Wendzel S (2012e) Sichere Middleware für Gebäude-Automation. Forschungsbericht der Hochschule Augsburg 155

Rist T, Wendzel S, André E, Masoodian M (2011) IT4SE – IT for smart renewable energy generation and use. News from a German-New Zealand Research Cooperation within the BMBF-funded APRA Initiative. Jahresbericht der Hochschule Augsburg 59–66

Wendzel S (2008) Protocol channels as a new design alternative of covert channels. CoRR abs/0809.1949: https://arxiv.org/abs/0809.1949

Miscellaneous Publications

Wendzel S (2017a) Zur IT-Sicherheit von Smart Homes

Wendzel S (2017b) Steganografie: eine zunehmende Bedrohung

Wendzel S (2017c) Made in Germany – Sicherheit als Vertrauensfaktor. CCI-Zeitung 2017:

Wendzel S (2016a) Tatort Smart Building: die Gebäudeautomation muss sicherer werden. CCI-Zeitung 2016:16

Kobekova A, Wendzel S, Tonejc J (2016b) Smart Building – Sicherheitslücken schließen. PROTECTOR 2016:42–43

Wendzel S, Meier M, Tonejc J (2015a) Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation. BusSysteme Magazin 22:257

Wübbeling M, Wendzel S (2015b) IT-Sicherheitsmonitoring. Cyber Security Report 2015 19–21. Mittler Report

Messer-Schmidt K, Rösler D, Ruppricht C, Seebauer H, Wendzel S (2014a) Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik). digitalbusiness CLOUD 40–41, https://fg-secmgt.gi.de/ak-kritis/arbeitsergebnisse

Wendzel S (2014b) Exfiltration vertrauenswürdiger Daten – Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher. digitalbusiness CLOUD 2014:37

Wendzel S (2013a) Gefahrenpotential der Netzwerksteganografie. IT-SICHERHEIT 2013:58–59

Wendzel S (2013b) Sicherheitsaspekte in der Gebäude-Automation – Perspektiven der Personenüberwachung. IT-SICHERHEIT 2013:70–72

Wendzel S (2012a) Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme. BusSysteme Magazin 2012:182–183

Wendzel S, Koch R (2012b) Social network security, pt. 1. Hakin9 (en) 1:

Wendzel S, Rist T, André E, Masoodian M, Wirth R (2012c) Sicherheit beim Energiesparen durch Abstraktion. BusSysteme Magazin 12:

Koch R, Wendzel S (2012d) Social network security, pt. 2. Hakin9 (en) 1:

Contributor/Co-author (2012e) Soziale Netzwerke und ihre Auswirkungen auf die Unternehmenssicherheit

Wendzel S (2011) Bewusstsein für die Sicherheit im Bereich der Gebäudeautomatisierung. Hakin9 (de) 2011:11–12

Wendzel S (2009) Protocol Channels. Hakin9 2009:38–40

Wendzel S (2007a) Forensik nach Angriffen auf Linux-Systeme. Hakin9 2007:

Wendzel S (2007b) Abhärtung von Linux/BSD Systemen. Eine Einführung. Hakin9 2007:

Wendzel S (2007c) Hostbasierte Intrusion Detection. Ein Einblick. Hakin9 2007:

Wendzel S (2007d) Firewalls umgehen mit Protokoll-Tunneling. Hakin9 2007:

Plötner J, Wendzel S (2006) Versionsverwaltung – Mit CVS oder Subversion Quelltexte verwalten. Linux-User 2006:

Wendzel S (2005) Xyria:CDPNNTPd. FreeX 2005:

Wendzel S (2003a) Das Allround-Genie Z-Shell. FreeX 2003:

Wendzel S (2003b) sysctl in OpenBSD. FreeX 2003:

Published Reviews

Wendzel S (2020) Review of the World Scientific Publishing Co., Inc. book “future automation: Changes to lives and to businesses”, 2018). ACM Computing Reviews N.N.: ACM

Wendzel S (2018a) Review of the article “man-in-the-middle attacks on secure simple pairing in bluetooth standard v5.0 and its countermeasure”. ACM Computing Reviews 49: ACM

Wendzel S (2018b) Ich hab’ nichts zu verbergen! Rezension zum Buch “Komplizen des Erkennungsdienstes”. Schwarz-auf-Weiss SAW:

Wendzel S (2017a) Review of the acm csur article “out-of-band covert channels–a survey”. ACM Computing Reviews 48:49. ACM

Wendzel S (2017b) Review of the Cambridge Univ. Press book “darkweb cyber threat intelligence mining”. ACM Computing Reviews 48: ACM