Publications
Key facts on my publications
- Number of Publications: 155+
- Citations: 1,000+ (as counted by Google Scholar).
- DBLP entries: 70+ (my publications in DBLP).
- Best Paper Awards: 2 (ICMP’12 and IWCC’15)
- Published textbooks: 6, covering 18 editions.
- Publications in ranked media according to CORE’2020 ranking:
- Ranked journals:
- ACM Computing Surveys (CSUR), Elsevier Future Generation Computer Systems (FGCS, 2x), IEEE Trans. Industrial Informatics (TII), IEEE ACCESS, Communications of the ACM (2x), IEEE Security & Privacy (S&P, 3x), Elsevier Computers & Security (COAS), Springer Scientometrics, Wiley Security & Communication Networks (SCN, 4x), MDPI Applied Sciences, Journal of Universal Computer Science (J.UCS, 5x).
- Ranked conferences (excluding workshop papers at ranked conferences):
- IFIP SEC (2x), IEEE LCN (2x), IFIP CMS (2x), HCII (2x), ACM CCS, ICIMP, NordSec (CORE 2010).
- Ranked journals:
Some of my key publications are focusing on information hiding taxonomy/patterns [1a], [1b], information hiding methodology [2], traffic normalization/wardens [3a], [3b], covert channel optimization [4a], [4b], scientometric citation analysis [5] and the security of networked IoT devices and smart buildings [6a],[6b],[6c],[6d].
Books
Wendzel S (2021) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 2nd edn. Springer, https://www.springer.com/gp/book/9783658334222
Wendzel S, Plötner J (2019) Einstieg in Linux, 8th edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/einstieg-in-linux-linux-verstehen-und-einsetzen/
Wendzel S (2018) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. Springer, DOI: 10.1007/978-3-658-22603-9
Mazurczyk W, Wendzel S, Zander S et al (2016a) Information hiding in communication networks. Fundamentals, mechanisms, and applications. Wiley-IEEE, DOI: 10.1002/9781119081715
Wendzel S, Ploetner J (2016b) Einstieg in Linux, 7th edn. Rheinwerk Verlag
Wendzel S, Ploetner J (2014) Einstieg in Linux, 6th edn. Galileo Press
Ploetner J, Wendzel S (2012a) Linux. Das umfassende Handbuch, 5th edn. Galileo Press, http://linuxbuch.blogspot.com/p/linux-das-umfassende-handbuch.html
Wendzel S (2012b) Tunnel und verdeckte Kanäle im Netz, 1st edn. Vieweg+Teubner, DOI: 10.1007/978-3-8348-2143-0
Wendzel S, Ploetner J (2012c) Einstieg in Linux, 5th edn. Galileo Press
Ploetner J, Wendzel S (2011) Linux. Das umfassende Handbuch, 4th edn. Galileo Press
Wendzel S, Ploetner J (2010) Einstieg in Linux. Eine distributionsunabhängige Einführung, 4th edn. Galileo Press
Ploetner J, Wendzel S (2009) Linux. Das umfassende Handbuch, 3rd edn. Galileo Press
Wendzel S, Ploetner J (2008a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 3rd edn. Galileo Press
Ploetner J, Wendzel S (2008b) Linux. Das umfassende Handbuch, 2nd edn. Galileo Press
Ploetner J, Wendzel S (2007) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 2nd edn. Galileo Press, http://www.researchgate.net/publication/233765886_Praxisbuch_Netzwerksicherheit
Wendzel S, Ploetner J (2006a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 2nd edn. Galileo Press
Ploetner J, Wendzel S (2006b) Linux. Ein distributionsunabhängiges Handbuch, 1st edn. Galileo Press
Ploetner J, Wendzel S (2005) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 1st edn. Galileo Press
Wendzel S, Ploetner J (2004) Einstieg in Linux. Eine distributionsunabhängige Einführung, 1st edn. Galileo Press
Edited Journal Special Issues
Caviglione L, Wendzel S, Vrhovec S, Mileva A (eds) Security and privacy issues of home globalization. Security and Privacy (S&P) (in progress): IEEE
Caviglione L, Wendzel S, Mileva A, Vrhovec S (eds) Multidisciplinary solutions to modern cybersecurity challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (in progress):
Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A (eds) (2021) Emerging topics in defending networked systems. Future Generation Computer Systems (FGCS) (in progress): Elsevier, https://www.sciencedirect.com/journal/future-generation-computer-systems/special-issue/10D22HMRPP2
Wendzel S, Caviglione L, Checco A (eds) et al (2020) Information security methodology, replication studies and information security education. Journal of Universal Computer Science (JUCS) 26:762–763, http://www.jucs.org/jucs_26_7/information_security_ethodology_replication/jucs_26_07_0762_0763_editorial.pdf
Caviglione L, Wendzel S, Mazurczyk W (eds) (2019a) Information hiding, network steganography, and covert channels. Computers (in progress): MDPI
Lv Z, Mazurczyk W, Wendzel S, Song H (eds) (2019b) Recent advances in cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics (TII) 15:6468–6471. IEEE, DOI: 10.1109/TII.2019.2945971
Mazurczyk W, Caviglione L, Wendzel S (eds) (2019c) Recent advancements in digital forensics, part 2. IEEE Security and Privacy (S&P) 17:7–8. IEEE, DOI: 10.1109/MSEC.2019.2896857
Caviglione L, Mazurczyk W, Wendzel S, Zander S (eds) (2018) Emerging and unconventional: New attacks and innovative detection techniques. Security and Communication Networks (SCN) 2018:1–7. Wiley-Hindawi, DOI: 10.1155/2018/9672523
Mazurczyk W, Caviglione L, Wendzel S (eds) (2017) Recent advancements in digital forensics – part 1. IEEE Security and Privacy (S&P) 15:10–11. IEEE, DOI: 10.1109/MSP.2017.4251106
Wendzel S, Keller J (eds) (2016) Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (JUCS) 22:1201–1202, DOI: 10.3217/jucs-022-09
Edited Conference and Workshop Proceedings
Caviglione L, Mileva A, Wendzel S (eds) (2020a) Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC’20). ACM
Wendzel S, Caviglione L, Checco A (eds) et al (2020b) Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR’20). ACM
Wendzel S, Caviglione L, Checco A (eds) et al (2019) Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR’19). ACM, Rennes, France
Meier M, Reinhardt D, Wendzel S (eds) (2016) Tagungsband der Sicherheit 2016 – Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/20073
Pohl C, Schinzel S, Wendzel S (eds) (2013) Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Gesellschaft für Informatik e.V. (GI), https://fg-sidar.gi.de/fileadmin/FG/SIDAR/Reports/SIDAR-Report-SR-2013-01.pdf
Book Chapters
Caviglione L, Mazurczyk W, Wendzel S (2019) Advanced information hiding techniques for modern botnets. In: Kambourakis G, others (eds) Botnets: Architectures, countermeasures, and challenges. Taylor; Francis, pp 165–188, DOI: 10.1201/9780429329913-4
Wendzel S, Olschewski D (2018) Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. Springer, DOI: 10.1007/978-3-658-22773-9_16
Wendzel S, Tonejc J, Kaur J, Kobekova A (2017) Cyber security of smart buildings. In: Song H, Fink G, Jeschke S (eds) Security and privacy in cyber-physical systems: Foundations and applications. Wiley-IEEE Press, pp 327–352, DOI: 10.1002/9781119226079.ch16
Wendzel S, Keller J (2012) Einführung in die Forschungsthematik der verdeckten Kanäle. In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen? BoD
Journal Articles
Mileva A, Velinov A, Hartmann L et al (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207
Keller J, Wendzel S (2021b) Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences 11: DOI: 10.3390/app11020731
Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122:267–286. Springer, DOI: 10.1007/s11192-019-03279-6
Velinov A, Mileva A, Wendzel S, Mazurczyk W (2019a) Covert Channels in the MQTT-based Internet of Things. ACCESS 7:161899–161915. IEEE, DOI: 10.1109/ACCESS.2019.2951425
Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25:1396–1416, DOI: 10.3217/jucs-025-11-1396
Mazurczyk W, Wendzel S, Chourib M, Keller J (2019c) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047
Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM 61:86–94. ACM, DOI: 10.1145/3158416
Cabaj K, Caviglione L, Mazurczyk W et al (2018b) The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional 20:31–39. IEEE, DOI: 10.1109/MITP.2018.032501746
Keidel R, Wendzel S, Zillien S et al (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24:556–576, DOI: 10.3217/jucs-024-05-0556
Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy 15:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117
Wendzel S, Caviglione L, Mazurczyk W, Lalande J-F (2017b) Network Information Hiding and Science 2.0: Can it be a Match? International Journal of Electronics and Telecommunications (IJET) 62:217–222. Polish Academy of Sciences, DOI: 10.1515/eletel-2017-0029
Spenger G, Keler J, Wendzel S (2017c) Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM) 6:147–170. River Publishers, DOI: 10.13052/jcsm2245-1439.623
Wendzel S, Mazurczyk W, Haas G (2017d) Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM) 6:105–126. River Publishers, DOI: 10.13052/jcsm2245-1439.621
Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59: ACM, DOI: 10.1145/2828636
Wendzel S, Mazurczyk W, Zander S (2016b) A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22:1456–1486, DOI: 10.3217/jucs-022-11-1456
Wendzel S, Kasem-Madani S (2016c) IoT Security: The Improvement-Decelerating ’Cycle of Blame’, DOI: 10.13052/popcas010
Kaur J, Wendzel S, Eissa O et al (2016d) Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN) 9:2986–2997. Wiley, DOI: 10.1002/sec.1471
Naumann M, Wendzel S, Mazurczyk W, Keller J (2016e) Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN) 9:2972–2985. Wiley, DOI: 10.1002/sec.1500
Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K (2016f) On importance of steganographic cost for network steganography. Security and Communication Networks (SCN) 9:781–790. Wiley Online Library, DOI: 10.1002/sec.1085
Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195
Wendzel S, Palmer C (2015b) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21:1684–1705, DOI: 10.3217/jucs-021-12-1684
Szczypiorski K, Janicki A, Wendzel S (2015c) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM) 10: DOI: 10.12720/jcm.10.10.747-752
Wendzel S, Keller J (2014a) Hidden and under control. annals of telecommunications-annales des télécommunications (ANTE) 69:417–430. Springer, DOI: 10.1007/s12243-014-0423-x
Wendzel S, Keller J (2014b) IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten. Controlling 26. Jahrgang: Beck, DOI: 10.15358/0935-0381_2014_6_304
Wendzel S, Keller J (2012) Preventing Protocol Switching Covert Channels. International Journal on Advances in Security 5: Iaria, DOI: 10.5281/zenodo.4618134
Wendzel S, Keller J (2011) Einführung in die Forschungsthematik der verdeckten Kanäle. Magdeburger Journal zur Sicherheitsforschung 2:115–124, http://www.researchgate.net/profile/Steffen_Wendzel/publication/216466431_Einfhrung_in_die_Forschungsthematik_der_verdeckten_Kanle/links/09e415005387fbf9a4000000.pdf
Conference and Workshop Papers
Zillien S, Wendzel S (2021) Reconnection-based Covert Channels in Wireless Networks. In: Proc. 36th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2021). Springer
Keller J, Wendzel S (2020a) Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3424954.3424966
Hartmann L, Wendzel S (2020b) Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3424954.3424963
Schmidbauer T, Wendzel S (2020c) Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3407023.3409207
Szary P, Mazurczyk W, Wendzel S, Caviglione L (2020d) Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, DOI: 10.1145/3407023.3409215
Wendzel S (2019a) Protocol-independent Detection of “Messaging Ordering” Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 63:1–63:8, DOI: 10.1145/3339252.3341477
Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W (2019b) Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 64:1–64:10, DOI: 10.1145/3339252.3341488
Mazurczyk W, Szary P, Wendzel S, Caviglione L (2019c) Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). ACM, New York, NY, USA, pp 69:1–69:8, DOI: 10.1145/3339252.3341493
Wendzel S, Eller D, Mazurczyk W (2018a) One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC’18). ACM, pp 1:1–1:6, DOI: 10.1145/3277570.3277571
Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13
Mazurczyk W, Wendzel S, Cabaj K (2018c) Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). ACM, pp 10:1–10:10, DOI: 10.1145/3230833.3233261
Wendzel S (2018d) Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). ACM, pp 13:1–13:8, DOI: 10.1145/3230833.3233265
Wendzel S, Mazurczyk W, Haas G (2017a) Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW). IEEE, pp 29–34, DOI: 10.1109/SPW.2017.40
Keller J, Spenger G, Wendzel S (2017b) Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW). IEEE, pp 17–22, DOI: 10.1109/SPW.2017.31
Kobekova A, Bültermann L, Tonejc J, Wendzel S (2017c) Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 515–526, https://www.researchgate.net/publication/318015456_Was_bedeutet_das_IT-Sicherheitsgesetz_fur_Smart_Buildings_Konzepte_des_sicheren_Alterns_der_Gebaude-IT
Lehner F, Mazurczyk W, Keller J, Wendzel S (2017d) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32
Wendzel S, Mazurczyk W (2016) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). Association for Computing Machinery, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037
Kaur J, Tonejc J, Wendzel S, Meier M (2015a) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41
Anhaus EM, Wendzel S (2015b) BACtag – Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec, pp 417–248, https://www.researchgate.net/publication/276762604_BACtag_Data_Leakage_Protection_fur_Gebaude?ev=prf_pub
Tonejc J, Kaur J, Karsten A, Wendzel S (2015c) Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, pp 693–704, DOI: 10.1007/978-3-319-20376-8_62
Caviglione L, Lalande J-F, Mazurczyk W, Wendzel S (2015d) Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, pp 165–177, DOI: 10.1007/978-3-319-20376-8_15
Kaur J, Wendzel S, Meier M (2015e) Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES); IWCC Workshop. IEEE, pp 422–428, DOI: 10.1109/ARES.2015.88
Kaur J, Herdin C, Tonejc J et al (2015f) Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 148–155
Szczypiorski K, Janicki A, Wendzel S (2015g) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT’15). Tokyo, Japan
Wendzel S, Mazurczyk W, Caviglione L, Meier M (2014a) Hidden and uncontrolled–on the emergence of network steganographic threats. In: ISSE 2014 Securing Electronic Business Processes. Springer, pp 123–133, DOI: 10.1007/978-3-658-06708-3_9
Wendzel S, Herdin C, Wirth R et al (2014b) Mosaic-chart based visualization in building automation systems. In: Proceedings of 9th future security (security research conference). Fraunhofer Verlag/MEV Verlag, Berlin, pp 687–690, http://www.researchgate.net/profile/Steffen_Wendzel/publication/265785944_Mosaic-chart_based_Visualization_in_Building_Automation_Systems/links/542ad4710cf29bbc126a771f.pdf
Wendzel S, Zwanger V, Meier M, Szlósarczyk S (2014c) Envisioning smart building botnets. In: SICHERHEIT 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/20.500.12116/20053
Szlósarczyk S, Wendzel S, Kaur J et al (2014d) Towards suppressing attacks on and improving resilience of building automation systems – an approach exemplified using BACnet. In: SICHERHEIT 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/handle/20.500.12116/20060
Kaur J, Wendzel S (2014e) Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS), http://cscubs.cs.uni-bonn.de/2014/data/paper_8.pdf
Kaur J, Meier M, Szlósarczyk S, Wendzel S (2014f) A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria, Lisbon, https://www.wendzel.de/dr.org/files/Papers/SECURWARE14poster.pdf
Lalande J-F, Wendzel S (2013a) Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM). IEEE, pp 701–710, DOI: 10.1109/ARES.2013.92
Kahler B, Wendzel S (2013b) How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD, pp H1–H13, https://www.researchgate.net/publication/235702099_How_to_own_a_Building_Wardriving_gegen_die_Gebaude-Automation
Backs P, Wendzel S, Keller J (2012a) Dynamic routing in covert channel overlays based on control protocols. In: 2012 International Conference for Internet Technology and Secured Transactions (ICITST’12). IEEE, pp 32–39, https://ieeexplore.ieee.org/document/6470978
Wendzel S, Kahler B, Rist T (2012b) Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom). IEEE, pp 731–736, DOI: 10.1109/GreenCom.2012.120
Wendzel S, Keller J (2012c) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11
Wendzel S, Keller J (2012d) Design and implementation of an active warden addressing protocol switching covert channels. In: Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012). IARIA, pp 1–6, https://www.researchgate.net/publication/229092168_Design_and_Implementation_of_an_Active_Warden_Addressing_Protocol_Switching_Covert_Channels
Wendzel S, Zander S (2012e) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628
Wendzel S (2012f) The problem of traffic normalization within a covert channel’s network environment learning phase. In: SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., pp 149–161, https://dl.gi.de/handle/20.500.12116/18270
Wendzel S (2012g) Covert and side channels in buildings and the prototype of a building-aware active warden. In: 2012 IEEE International Conference on Communications (ICC). IEEE, pp 6753–6758, DOI: 10.1109/ICC.2012.6364876
Rist T, Wendzel S, Masoodian M, André E (2012h) Next-generation home automation systems. Pabst Science Publishers, https://www.researchgate.net/publication/229092368_Next-Generation_Home_Automation_Systems
Rist T, Wendzel S, Masoodian M et al (2011a) Creating Awareness for Efficient Energy Use in Smart Homes. In: Feuerstein G, Ritter W (eds) Zusammenfassung der Beiträge zum Usability Day IX, Dornbirn, Austria. Pabst, pp 162–168, https://www.researchgate.net/publication/215661204_Creating_Awareness_for_Efficient_Energy_Use_in_Smart_Homes
Wendzel S (2011b) Mikroprotokolle in verdeckten Kanälen. In: Beiträge zum Doktorandenkolleg Ruhr 2011. Meinerzhagen Valbert
Wendzel S, Keller J (2011c) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10
Wendzel S, Rist T, Masoodian M, André E (2011d) A Secure Interoperable Architecture for Building-Automation Applications. In: Proc. 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), DOI: 10.1145/2093698.2093706
Contributions to EU-related Documents
Mazurczyk W, Amann P, Caviglione L, Wendzel S (2016) CUIng: Criminal use of information hiding initiative. European CIIP Newsletter 10:31–32
Contributor (2015a) Security and resilience of smart home environments: Good practices and recommendations. ENISA, https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/smart-homes/security-resilience-good-practices/at_download/fullReport
Contributor (2015b) EU NIS Platform: State-of-the-art of secure ICT landscape. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/research-landscape-deliverable-v2/at_download/file
Contributor (2015c) EU NIS Platform: Cybersecurity strategic research agenda. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/strategic-research-agenda-final-v0.96/at_download/file
Theses
Wendzel S (2020) Network information hiding: Terminology, taxonomy, methodology and countermeasures. Habilitation Thesis, Department of Mathematics; Computer Science, Unversity of Hagen, http://www.wendzel.de/dr.org/files/Papers/thesis_with_cover.pdf
Wendzel S (2013) Novel approaches for network covert storage channels. Dissertation, Department of Mathematics; Computer Science, Unversity of Hagen, https://ub-deposit.fernuni-hagen.de/receive/mir_mods_00000190
Wendzel S (2011) Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle. Master’s Thesis, Augsburg University of Applied Sciences
Wendzel S (2009) Protokollwechsel zur Realisierung von Covert Channels und Headerstrukturveränderungen zur Vermeidung von Covert Channels. Diplomarbeit, Kempten University of Applied Sciences
Technical Reports
Wendzel S, Kobekova A, Tonejc J, Kaur J (2016a) IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt. Smart Home Summit
Wendzel S (2016b) Why Johnny can’t use stego: A human-oriented perspective on the application of steganography. CoRR abs/1609.06664: http://arxiv.org/abs/1609.06664
Wendzel S (2012a) Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft für Informatik, FB Sicherheit, Berlin, p 24, http://www.wendzel.de/dr.org/files/Papers/spring7_17_abstract_wendzel.pdf
Rist T, Wendzel S (2012b) Internationale Forschungskooperation IT4SE. Jahresbericht der Hochschule Augsburg 116
Wendzel S (2012c) Novel Developments in the Area of Network Covert Channels. Forschungsbericht der Hochschule Augsburg 108–112
Koch R, Wendzel S (2012d) Social Network Security Project. Forschungsbericht der Hochschule Augsburg 158–162
Wendzel S (2012e) Sichere Middleware für Gebäude-Automation. Forschungsbericht der Hochschule Augsburg 155
Rist T, Wendzel S, André E, Masoodian M (2011) IT4SE – IT for smart renewable energy generation and use. News from a German-New Zealand Research Cooperation within the BMBF-funded APRA Initiative. Jahresbericht der Hochschule Augsburg 59–66
Wendzel S (2008) Protocol channels as a new design alternative of covert channels. CoRR abs/0809.1949: https://arxiv.org/abs/0809.1949
Miscellaneous Publications
Wendzel S (2017a) Zur IT-Sicherheit von Smart Homes
Wendzel S (2017b) Steganografie: eine zunehmende Bedrohung
Wendzel S (2017c) Made in Germany – Sicherheit als Vertrauensfaktor. CCI-Zeitung 2017:
Wendzel S (2016a) Tatort Smart Building: die Gebäudeautomation muss sicherer werden. CCI-Zeitung 2016:16
Kobekova A, Wendzel S, Tonejc J (2016b) Smart Building – Sicherheitslücken schließen. PROTECTOR 2016:42–43
Wendzel S, Meier M, Tonejc J (2015a) Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation. BusSysteme Magazin 22:257
Wübbeling M, Wendzel S (2015b) IT-Sicherheitsmonitoring. Cyber Security Report 2015 19–21. Mittler Report
Messer-Schmidt K, Rösler D, Ruppricht C et al (2014a) Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik). digitalbusiness CLOUD 40–41, https://fg-secmgt.gi.de/ak-kritis/arbeitsergebnisse
Wendzel S (2014b) Exfiltration vertrauenswürdiger Daten – Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher. digitalbusiness CLOUD 2014:37
Wendzel S (2013a) Gefahrenpotential der Netzwerksteganografie. IT-SICHERHEIT 2013:58–59
Wendzel S (2013b) Sicherheitsaspekte in der Gebäude-Automation – Perspektiven der Personenüberwachung. IT-SICHERHEIT 2013:70–72
Wendzel S (2012a) Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme. BusSysteme Magazin 2012:182–183
Wendzel S, Koch R (2012b) Social network security, pt. 1. Hakin9 (en) 1:
Wendzel S, Rist T, André E et al (2012c) Sicherheit beim Energiesparen durch Abstraktion. BusSysteme Magazin 12:
Koch R, Wendzel S (2012d) Social network security, pt. 2. Hakin9 (en) 1:
Contributor/Co-author (2012e) Soziale Netzwerke und ihre Auswirkungen auf die Unternehmenssicherheit
Wendzel S (2011) Bewusstsein für die Sicherheit im Bereich der Gebäudeautomatisierung. Hakin9 (de) 2011:11–12
Wendzel S (2009) Protocol Channels. Hakin9 2009:38–40
Wendzel S (2007a) Forensik nach Angriffen auf Linux-Systeme. Hakin9 2007:
Wendzel S (2007b) Abhärtung von Linux/BSD Systemen. Eine Einführung. Hakin9 2007:
Wendzel S (2007c) Hostbasierte Intrusion Detection. Ein Einblick. Hakin9 2007:
Wendzel S (2007d) Firewalls umgehen mit Protokoll-Tunneling. Hakin9 2007:
Plötner J, Wendzel S (2006) Versionsverwaltung – Mit CVS oder Subversion Quelltexte verwalten. Linux-User 2006:
Wendzel S (2005) Xyria:CDPNNTPd. FreeX 2005:
Wendzel S (2003a) Das Allround-Genie Z-Shell. FreeX 2003:
Wendzel S (2003b) sysctl in OpenBSD. FreeX 2003: