BibTeX records: Wojciech Mazurczyk

download as .bib file

@article{DBLP:journals/access/MalanowskaMAMK24,
  author       = {Agnieszka Malanowska and
                  Wojciech Mazurczyk and
                  Tanya Koohpayeh Araghi and
                  David Meg{\'{\i}}as and
                  Minoru Kuribayashi},
  title        = {Digital Watermarking - {A} Meta-Survey and Techniques for Fake News
                  Detection},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {36311--36345},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3374201},
  doi          = {10.1109/ACCESS.2024.3374201},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MalanowskaMAMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MazurczykLV24,
  author       = {Wojciech Mazurczyk and
                  Dongwon Lee and
                  Andreas Vlachos},
  title        = {Disinformation 2.0 in the Age of {AI:} {A} Cybersecurity Perspective},
  journal      = {Commun. {ACM}},
  volume       = {67},
  number       = {3},
  pages        = {36--39},
  year         = {2024},
  url          = {https://doi.org/10.1145/3624721},
  doi          = {10.1145/3624721},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MazurczykLV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SunTMCQC23,
  author       = {Congcong Sun and
                  Hui Tian and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang and
                  Hanyu Quan and
                  Yonghong Chen},
  title        = {Steganalysis of adaptive multi-rate speech with unknown embedding
                  rates using clustering and ensemble learning},
  journal      = {Comput. Electr. Eng.},
  volume       = {111},
  number       = {Part {A}},
  pages        = {108909},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108909},
  doi          = {10.1016/J.COMPELECENG.2023.108909},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/SunTMCQC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ZorawskiCM23,
  author       = {Piotr Z{\'{o}}rawski and
                  Luca Caviglione and
                  Wojciech Mazurczyk},
  title        = {A Long-Term Perspective of the Internet Susceptibility to Covert Channels},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {10},
  pages        = {171--177},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.011.2200744},
  doi          = {10.1109/MCOM.011.2200744},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/ZorawskiCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KowalskiM23,
  author       = {Mikolaj Kowalski and
                  Wojciech Mazurczyk},
  title        = {Toward the mutual routing security in wide area networks: {A} scoping
                  review of current threats and countermeasures},
  journal      = {Comput. Networks},
  volume       = {230},
  pages        = {109778},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109778},
  doi          = {10.1016/J.COMNET.2023.109778},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KowalskiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhvanooeyZOMMCL23,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Shiyan Ou and
                  Hassan Dana Mazraeh and
                  Wojciech Mazurczyk and
                  Kim{-}Kwang Raymond Choo and
                  Chuan Li},
  title        = {AFPr-AM: {A} novel Fuzzy-AHP based privacy risk assessment model for
                  strategic information management of social media platforms},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103263},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103263},
  doi          = {10.1016/J.COSE.2023.103263},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhvanooeyZOMMCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WendzelCM23,
  author       = {Steffen Wendzel and
                  Luca Caviglione and
                  Wojciech Mazurczyk},
  title        = {Avoiding Research Tribal Wars Using Taxonomies},
  journal      = {Computer},
  volume       = {56},
  number       = {1},
  pages        = {93--96},
  year         = {2023},
  url          = {https://doi.org/10.1109/MC.2022.3218175},
  doi          = {10.1109/MC.2022.3218175},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/WendzelCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KozikMCPPC23,
  author       = {Rafal Kozik and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Aleksandra Pawlicka and
                  Marek Pawlicki and
                  Michal Choras},
  title        = {Deep Learning for Combating Misinformation in Multicategorical Text
                  Contents},
  journal      = {Sensors},
  volume       = {23},
  number       = {24},
  pages        = {9666},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23249666},
  doi          = {10.3390/S23249666},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KozikMCPPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taslp/TianQMLQ23,
  author       = {Hui Tian and
                  Yiqin Qiu and
                  Wojciech Mazurczyk and
                  Haizhou Li and
                  Zhenxing Qian},
  title        = {{STFF-SM:} Steganalysis Model Based on Spatial and Temporal Feature
                  Fusion for Speech Streams},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {31},
  pages        = {277--289},
  year         = {2023},
  url          = {https://doi.org/10.1109/TASLP.2022.3224295},
  doi          = {10.1109/TASLP.2022.3224295},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taslp/TianQMLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Rajba0M23,
  author       = {Pawel Rajba and
                  J{\"{o}}rg Keller and
                  Wojciech Mazurczyk},
  title        = {Proof-of-work based new encoding scheme for information hiding purposes},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {45:1--45:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605085},
  doi          = {10.1145/3600160.3605085},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Rajba0M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OrzechowskiRSCM23,
  author       = {Natan Orzechowski and
                  Karol Rzepka and
                  Przemyslaw Szary and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk and
                  Helen C. Leligou and
                  Marcin Przybyszewski and
                  Rafal Kozik and
                  Michal Choras},
  title        = {Security Architecture in the {SILVANUS} project},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {49:1--49:9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605082},
  doi          = {10.1145/3600160.3605082},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OrzechowskiRSCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/KozikMCPPC23,
  author       = {Rafal Kozik and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Aleksandra Pawlicka and
                  Marek Pawlicki and
                  Michal Choras},
  title        = {Combating Disinformation with Holistic Architecture, Neuro-symbolic
                  {AI} and {NLU} Models},
  booktitle    = {10th {IEEE} International Conference on Data Science and Advanced
                  Analytics, {DSAA} 2023, Thessaloniki, Greece, October 9-13, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSAA60987.2023.10302543},
  doi          = {10.1109/DSAA60987.2023.10302543},
  timestamp    = {Thu, 16 Nov 2023 09:03:43 +0100},
  biburl       = {https://dblp.org/rec/conf/dsaa/KozikMCPPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BialczakM23,
  author       = {Piotr Bialczak and
                  Wojciech Mazurczyk},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Malware Classification Using Open Set Recognition and {HTTP} Protocol
                  Requests},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {235--254},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_12},
  doi          = {10.1007/978-3-031-51476-0\_12},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BialczakM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-05569,
  author       = {Wojciech Mazurczyk and
                  Dongwon Lee and
                  Andreas Vlachos},
  title        = {Disinformation 2.0 in the Age of {AI:} {A} Cybersecurity Perspective},
  journal      = {CoRR},
  volume       = {abs/2306.05569},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.05569},
  doi          = {10.48550/ARXIV.2306.05569},
  eprinttype    = {arXiv},
  eprint       = {2306.05569},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-05569.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SzaryMWC22,
  author       = {Przemyslaw Szary and
                  Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Luca Caviglione},
  title        = {Analysis of Reversible Network Covert Channels},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {41226--41238},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3168018},
  doi          = {10.1109/ACCESS.2022.3168018},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SzaryMWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AhvanooeyZMB22,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Wojciech Mazurczyk and
                  Malika Bendechache},
  title        = {Information Hiding in Digital Textual Contents: Techniques and Current
                  Challenges},
  journal      = {Computer},
  volume       = {55},
  number       = {6},
  pages        = {56--65},
  year         = {2022},
  url          = {https://doi.org/10.1109/MC.2021.3113922},
  doi          = {10.1109/MC.2021.3113922},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AhvanooeyZMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WendzelMCH22,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Luca Caviglione and
                  Amir Houmansadr},
  title        = {Emerging topics in defending networked systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {128},
  pages        = {317--319},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.10.010},
  doi          = {10.1016/J.FUTURE.2021.10.010},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/WendzelMCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CaviglioneM22,
  author       = {Luca Caviglione and
                  Wojciech Mazurczyk},
  title        = {Never Mind the Malware, Here's the Stegomalware},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {5},
  pages        = {101--106},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3178205},
  doi          = {10.1109/MSEC.2022.3178205},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CaviglioneM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/SunTMCCC22,
  author       = {Congcong Sun and
                  Hui Tian and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang and
                  Yiqiao Cai and
                  Yonghong Chen},
  title        = {Towards blind detection of steganography in low-bit-rate speech streams},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {12085--12112},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23077},
  doi          = {10.1002/INT.23077},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/SunTMCCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AhvanooeyZLMCGC22,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Qianmu Li and
                  Wojciech Mazurczyk and
                  Kim{-}Kwang Raymond Choo and
                  Brij Bhooshan Gupta and
                  Mauro Conti},
  title        = {Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical
                  Survey},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {10},
  pages        = {7639--7663},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3138073},
  doi          = {10.1109/JIOT.2021.3138073},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AhvanooeyZLMCGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/LvMSSM22,
  author       = {Zhihan Lv and
                  Jaime Lloret Mauri and
                  Houbing Song and
                  Jun Shen and
                  Wojciech Mazurczyk},
  title        = {Guest Editorial: Secure Communications Over the Internet of Artificially
                  Intelligent Things},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {5},
  number       = {1},
  pages        = {58--60},
  year         = {2022},
  url          = {https://doi.org/10.1109/MIOT.2022.9773087},
  doi          = {10.1109/MIOT.2022.9773087},
  timestamp    = {Fri, 24 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/LvMSSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/LvLSSM22,
  author       = {Zhihan Lv and
                  Jaime Lloret and
                  Houbing Song and
                  Jun Shen and
                  Wojciech Mazurczyk},
  title        = {Guest Editorial: Secure Communications Over the Internet of Artificially
                  Intelligent Things: Part 2},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {5},
  number       = {2},
  pages        = {46--49},
  year         = {2022},
  url          = {https://doi.org/10.1109/MIOT.2022.9889289},
  doi          = {10.1109/MIOT.2022.9889289},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotm/LvLSSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QiuTTMC22,
  author       = {Yiqin Qiu and
                  Hui Tian and
                  Lili Tang and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang},
  title        = {Steganalysis of adaptive multi-rate speech streams with distributed
                  representations of codewords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103250},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103250},
  doi          = {10.1016/J.JISA.2022.103250},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QiuTTMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhvanooeyZMLKCC22,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Wojciech Mazurczyk and
                  Qianmu Li and
                  Max Kilger and
                  Kim{-}Kwang Raymond Choo and
                  Mauro Conti},
  title        = {CovertSYS: {A} systematic covert communication approach for providing
                  secure end-to-end conversation via social networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103368},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103368},
  doi          = {10.1016/J.JISA.2022.103368},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhvanooeyZMLKCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/WendzelCMLM22,
  author       = {Steffen Wendzel and
                  Luca Caviglione and
                  Aleksandra Mileva and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Wojciech Mazurczyk},
  title        = {Guest editorial: Information security methodology and replication
                  studies},
  journal      = {it Inf. Technol.},
  volume       = {64},
  number       = {1-2},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.1515/itit-2022-0016},
  doi          = {10.1515/ITIT-2022-0016},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/WendzelCMLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/AhvanooeyZMCCZ22,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Wojciech Mazurczyk and
                  Kim{-}Kwang Raymond Choo and
                  Mauro Conti and
                  Jing Zhang},
  title        = {Misinformation Detection on Social Media: Challenges and the Road
                  Ahead},
  journal      = {{IT} Prof.},
  volume       = {24},
  number       = {1},
  pages        = {34--40},
  year         = {2022},
  url          = {https://doi.org/10.1109/MITP.2021.3120876},
  doi          = {10.1109/MITP.2021.3120876},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/AhvanooeyZMCCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NilizadehNMZL22,
  author       = {Amirfarhad Nilizadeh and
                  Shirin Nilizadeh and
                  Wojciech Mazurczyk and
                  Cliff C. Zou and
                  Gary T. Leavens},
  title        = {Adaptive Matrix Pattern Steganography on {RGB} Images},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1111},
  doi          = {10.13052/JCSM2245-1439.1111},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NilizadehNMZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MegiasKRCM22,
  author       = {David Meg{\'{\i}}as and
                  Minoru Kuribayashi and
                  Andrea Rosales and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Architecture of a fake news detection system combining digital watermarking,
                  signal processing, and machine learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {33--55},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.033},
  doi          = {10.22667/JOWUA.2022.03.31.033},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MegiasKRCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/CaviglioneSZM22,
  author       = {Luca Caviglione and
                  Andreas Schaffhauser and
                  Marco Zuppelli and
                  Wojciech Mazurczyk},
  title        = {IPv6CC: IPv6 covert channels for testing networks against stegomalware
                  and data exfiltration},
  journal      = {SoftwareX},
  volume       = {17},
  pages        = {100975},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.softx.2022.100975},
  doi          = {10.1016/J.SOFTX.2022.100975},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/softx/CaviglioneSZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZuppelliRSMC22,
  author       = {Marco Zuppelli and
                  Matteo Repetto and
                  Andreas Schaffhauser and
                  Wojciech Mazurczyk and
                  Luca Caviglione},
  title        = {Code Layering for the Detection of Network Covert Channels in Agentless
                  Systems},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {2282--2294},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3176752},
  doi          = {10.1109/TNSM.2022.3176752},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZuppelliRSMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CaviglioneGGMZS22,
  author       = {Luca Caviglione and
                  Martin Grabowski and
                  Kai Gutberlet and
                  Adrian Marzecki and
                  Marco Zuppelli and
                  Andreas Schaffhauser and
                  Wojciech Mazurczyk},
  title        = {Detection of Malicious Images in Production-Quality Scenarios with
                  the {SIMARGL} Toolkit},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {46:1--46:7},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544469},
  doi          = {10.1145/3538969.3544469},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CaviglioneGGMZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KowalczykMMC22,
  author       = {Marcin Kowalczyk and
                  Agnieszka Malanowska and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj},
  title        = {Web Page Harvesting for Automatized Large-scale Digital Images Anomaly
                  Detection},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {47:1--47:9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544471},
  doi          = {10.1145/3538969.3544471},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KowalczykMMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RajbaM22,
  author       = {Pawel Rajba and
                  Wojciech Mazurczyk},
  title        = {Limitations of Web Cryptojacking Detection: {A} Practical Evaluation},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {52:1--52:6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544466},
  doi          = {10.1145/3538969.3544466},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RajbaM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RzepkaSCM22,
  author       = {Karol Rzepka and
                  Przemyslaw Szary and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Performance Evaluation of {DTLS} Implementations on {RIOT} {OS} for
                  Internet of Things Applications},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {64:1--64:9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544470},
  doi          = {10.1145/3538969.3544470},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RzepkaSCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaviglioneCCJMP21,
  author       = {Luca Caviglione and
                  Michal Choras and
                  Igino Corona and
                  Artur Janicki and
                  Wojciech Mazurczyk and
                  Marek Pawlicki and
                  Katarzyna Wasielewska},
  title        = {Tight Arms Race: Overview of Current Malware Threats and Trends in
                  Their Detection},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {5371--5396},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3048319},
  doi          = {10.1109/ACCESS.2020.3048319},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CaviglioneCCJMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RajbaM21,
  author       = {Pawel Rajba and
                  Wojciech Mazurczyk},
  title        = {Information Hiding Using Minification},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {66436--66449},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3077197},
  doi          = {10.1109/ACCESS.2021.3077197},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RajbaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SiewrukM21,
  author       = {Grzegorz Siewruk and
                  Wojciech Mazurczyk},
  title        = {Context-Aware Software Vulnerability Classification Using Machine
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {88852--88867},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3075385},
  doi          = {10.1109/ACCESS.2021.3075385},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SiewrukM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/LakaKM21,
  author       = {Pawel Laka and
                  Zbigniew Korzeb and
                  Wojciech Mazurczyk},
  title        = {Novel user authentication method based on body composition analysis},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {76},
  number       = {3-4},
  pages        = {175--185},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12243-020-00779-y},
  doi          = {10.1007/S12243-020-00779-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/LakaKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MazurczykC21,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione},
  title        = {Cyber reconnaissance techniques},
  journal      = {Commun. {ACM}},
  volume       = {64},
  number       = {3},
  pages        = {86--95},
  year         = {2021},
  url          = {https://doi.org/10.1145/3418293},
  doi          = {10.1145/3418293},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/MazurczykC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CaviglioneMRSZ21,
  author       = {Luca Caviglione and
                  Wojciech Mazurczyk and
                  Matteo Repetto and
                  Andreas Schaffhauser and
                  Marco Zuppelli},
  title        = {Kernel-level tracing for detecting stegomalware and covert channels
                  in Linux environments},
  journal      = {Comput. Networks},
  volume       = {191},
  pages        = {108010},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108010},
  doi          = {10.1016/J.COMNET.2021.108010},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/CaviglioneMRSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MilevaVHWM21,
  author       = {Aleksandra Mileva and
                  Aleksandar Velinov and
                  Laura Hartmann and
                  Steffen Wendzel and
                  Wojciech Mazurczyk},
  title        = {Comprehensive analysis of {MQTT} 5.0 susceptibility to network covert
                  channels},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102207},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102207},
  doi          = {10.1016/J.COSE.2021.102207},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MilevaVHWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/BialczakM21,
  author       = {Piotr Bialczak and
                  Wojciech Mazurczyk},
  title        = {Hfinger: Malware {HTTP} Request Fingerprinting},
  journal      = {Entropy},
  volume       = {23},
  number       = {5},
  pages        = {507},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23050507},
  doi          = {10.3390/E23050507},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/BialczakM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NowakowskiZCM21,
  author       = {Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Detecting Network Covert Channels using Machine Learning, Data Mining
                  and Hierarchical Organisation of Frequent Sets},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {20--43},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.020},
  doi          = {10.22667/JOWUA.2021.03.31.020},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NowakowskiZCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShiZSVMCMACZ21,
  author       = {Dayu Shi and
                  Xun Zhang and
                  Lina Shi and
                  Andrei Vladimirescu and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Ben Meunier and
                  Kareem Ali and
                  John Cosmas and
                  Yue Zhang},
  title        = {On Improving 5G Internet of Radio Light Security Based on {LED} Fingerprint
                  Identification Method},
  journal      = {Sensors},
  volume       = {21},
  number       = {4},
  pages        = {1515},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21041515},
  doi          = {10.3390/S21041515},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ShiZSVMCMACZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MegiasKRM21,
  author       = {David Meg{\'{\i}}as and
                  Minoru Kuribayashi and
                  Andrea Rosales and
                  Wojciech Mazurczyk},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {{DISSIMILAR:} Towards fake news detection using information hiding,
                  signal processing and machine learning},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {66:1--66:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470088},
  doi          = {10.1145/3465481.3470088},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MegiasKRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WendzelCMMDKLVH21,
  author       = {Steffen Wendzel and
                  Luca Caviglione and
                  Wojciech Mazurczyk and
                  Aleksandra Mileva and
                  Jana Dittmann and
                  Christian Kr{\"{a}}tzer and
                  Kevin Lamsh{\"{o}}ft and
                  Claus Vielhauer and
                  Laura Hartmann and
                  J{\"{o}}rg Keller and
                  Tom Neubert},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {A Revised Taxonomy of Steganography Embedding Patterns},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {67:1--67:12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470069},
  doi          = {10.1145/3465481.3470069},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WendzelCMMDKLVH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NowakowskiZCM21,
  author       = {Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Study of the Error Detection and Correction Scheme for Distributed
                  Network Covert Channels},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {73:1--73:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470087},
  doi          = {10.1145/3465481.3470087},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NowakowskiZCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RajbaM21,
  author       = {Pawel Rajba and
                  Wojciech Mazurczyk},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Data Hiding Using Code Obfuscation},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {75:1--75:10},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470086},
  doi          = {10.1145/3465481.3470086},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RajbaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eicc/HospitalMM21,
  author       = {Javier Hospital and
                  David Meg{\'{\i}}as and
                  Wojciech Mazurczyk},
  editor       = {Martin Gilje Jaatun and
                  Geir M. K{\o}ien and
                  Oksana Kulyk},
  title        = {Retransmission steganography in real-world scenarios: a practical
                  study},
  booktitle    = {{EICC} '21: European Interdisciplinary Cybersecurity Conference, Virtual
                  Event, Romania, November 10-11, 2021},
  pages        = {60--65},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487405.3487659},
  doi          = {10.1145/3487405.3487659},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eicc/HospitalMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AhvanooeyZMKC21,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Wojciech Mazurczyk and
                  Max Kilger and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Do Dark Web and Cryptocurrencies Empower Cybercriminals?},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_17},
  doi          = {10.1007/978-3-031-06365-7\_17},
  timestamp    = {Fri, 19 Apr 2024 14:54:06 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AhvanooeyZMKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ChouribWM21,
  author       = {Mehdi Chourib and
                  Steffen Wendzel and
                  Wojciech Mazurczyk},
  title        = {Adaptive Warden Strategy for Countering Network Covert Storage Channels},
  booktitle    = {46th {IEEE} Conference on Local Computer Networks, {LCN} 2021, Edmonton,
                  AB, Canada, October 4-7, 2021},
  pages        = {148--153},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCN52139.2021.9524939},
  doi          = {10.1109/LCN52139.2021.9524939},
  timestamp    = {Tue, 16 Aug 2022 23:04:40 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/ChouribWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/CaviglioneZMSR21,
  author       = {Luca Caviglione and
                  Marco Zuppelli and
                  Wojciech Mazurczyk and
                  Andreas Schaffhauser and
                  Matteo Repetto},
  editor       = {Kohei Shiomoto and
                  Young{-}Tak Kim and
                  Christian Esteve Rothenberg and
                  Barbara Martini and
                  Eiji Oki and
                  Baek{-}Young Choi and
                  Noriaki Kamiyama and
                  Stefano Secci},
  title        = {Code Augmentation for Detecting Covert Channels Targeting the IPv6
                  Flow Label},
  booktitle    = {7th {IEEE} International Conference on Network Softwarization, NetSoft
                  2021, Tokyo, Japan, June 28 - July 2, 2021},
  pages        = {450--456},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NetSoft51509.2021.9492661},
  doi          = {10.1109/NETSOFT51509.2021.9492661},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/CaviglioneZMSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GregorczykM21,
  author       = {Marcin Gregorczyk and
                  Wojciech Mazurczyk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Inferring Flow Table State through Active Fingerprinting in {SDN}
                  Environments: {A} Practical Approach},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {576--586},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010573905760586},
  doi          = {10.5220/0010573905760586},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GregorczykM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-00433,
  author       = {Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Mehdi Chourib and
                  J{\"{o}}rg Keller},
  title        = {Countering Adaptive Network Covert Communication with Dynamic Wardens},
  journal      = {CoRR},
  volume       = {abs/2103.00433},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.00433},
  eprinttype    = {arXiv},
  eprint       = {2103.00433},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-00433.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08654,
  author       = {Steffen Wendzel and
                  Luca Caviglione and
                  Wojciech Mazurczyk and
                  Aleksandra Mileva and
                  Jana Dittmann and
                  Christian Kr{\"{a}}tzer and
                  Kevin Lamsh{\"{o}}ft and
                  Claus Vielhauer and
                  Laura Hartmann and
                  J{\"{o}}rg Keller and
                  Tom Neubert},
  title        = {A Revised Taxonomy of Steganography Embedding Patterns},
  journal      = {CoRR},
  volume       = {abs/2106.08654},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08654},
  eprinttype    = {arXiv},
  eprint       = {2106.08654},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08654.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03310,
  author       = {Mehdi Chourib and
                  Steffen Wendzel and
                  Wojciech Mazurczyk},
  title        = {Adaptive Warden Strategy for Countering Network Covert Storage Channels},
  journal      = {CoRR},
  volume       = {abs/2111.03310},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03310},
  eprinttype    = {arXiv},
  eprint       = {2111.03310},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03310.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SkowronJM20,
  author       = {Monika Skowron and
                  Artur Janicki and
                  Wojciech Mazurczyk},
  title        = {Traffic Fingerprinting Attacks on Internet of Things Using Machine
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {20386--20400},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2969015},
  doi          = {10.1109/ACCESS.2020.2969015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SkowronJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/El-LatifAVEPBSM20,
  author       = {Ahmed A. Abd El{-}Latif and
                  Bassem Abd{-}El{-}Atty and
                  Salvador E. Venegas{-}Andraca and
                  Haitham Elwahsh and
                  Md. Jalil Piran and
                  Ali Kashif Bashir and
                  Oh{-}Young Song and
                  Wojciech Mazurczyk},
  title        = {Providing End-to-End Security Using Quantum Walks in IoT Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {92687--92696},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2992820},
  doi          = {10.1109/ACCESS.2020.2992820},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/El-LatifAVEPBSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GregorczykZNCM20,
  author       = {Marcin Gregorczyk and
                  Piotr Z{\'{o}}rawski and
                  Piotr Nowakowski and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Sniffing Detection Based on Network Traffic Probing and Machine Learning},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {149255--149269},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3016076},
  doi          = {10.1109/ACCESS.2020.3016076},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GregorczykZNCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP20,
  author       = {Tom Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {58},
  number       = {3},
  pages        = {54},
  year         = {2020},
  url          = {https://doi.org/10.1109/MCOM.2020.9040263},
  doi          = {10.1109/MCOM.2020.9040263},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP20a,
  author       = {Tom Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {58},
  number       = {5},
  pages        = {48},
  year         = {2020},
  url          = {https://doi.org/10.1109/MCOM.2020.9112741},
  doi          = {10.1109/MCOM.2020.9112741},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP20b,
  author       = {Thomas Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {58},
  number       = {7},
  pages        = {12},
  year         = {2020},
  url          = {https://doi.org/10.1109/MCOM.2020.9161987},
  doi          = {10.1109/MCOM.2020.9161987},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/CabajZNPM20,
  author       = {Krzysztof Cabaj and
                  Piotr Z{\'{o}}rawski and
                  Piotr Nowakowski and
                  Maciej Purski and
                  Wojciech Mazurczyk},
  title        = {Efficient distributed network covert channels for Internet of things
                  environments{\textdagger}},
  journal      = {J. Cybersecur.},
  volume       = {6},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1093/cybsec/tyaa018},
  doi          = {10.1093/CYBSEC/TYAA018},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/CabajZNPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MazurczykBJNC20,
  author       = {Wojciech Mazurczyk and
                  Pascal Bisson and
                  Roger Piqueras Jover and
                  Koji Nakao and
                  Krzysztof Cabaj},
  title        = {Special issue on Advancements in 5G Networks Security},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {110},
  pages        = {314--316},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.04.043},
  doi          = {10.1016/J.FUTURE.2020.04.043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/MazurczykBJNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SaengerMKC20,
  author       = {Jens Saenger and
                  Wojciech Mazurczyk and
                  J{\"{o}}rg Keller and
                  Luca Caviglione},
  title        = {VoIP network covert channels to enhance privacy and information sharing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {96--106},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.04.032},
  doi          = {10.1016/J.FUTURE.2020.04.032},
  timestamp    = {Thu, 16 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/SaengerMKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NowaczewskiM20,
  author       = {Slawomir Nowaczewski and
                  Wojciech Mazurczyk},
  title        = {Securing Future Internet and 5G using Customer Edge Switching using
                  DNSCrypt and {DNSSEC}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {87--106},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.087},
  doi          = {10.22667/JOWUA.2020.09.30.087},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/NowaczewskiM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WendzelCCMLM20,
  author       = {Steffen Wendzel and
                  Luca Caviglione and
                  Alessandro Checco and
                  Aleksandra Mileva and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Wojciech Mazurczyk},
  title        = {Information Security Methodology, Replication Studies and Information
                  Security Education},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {26},
  number       = {7},
  pages        = {762--763},
  year         = {2020},
  url          = {http://www.jucs.org/jucs\_26\_7/information\_security\_ethodology\_replication},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/WendzelCCMLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BialczakM20,
  author       = {Piotr Bialczak and
                  Wojciech Mazurczyk},
  title        = {Characterizing Anomalies in Malware-Generated {HTTP} Traffic},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8848863:1--8848863:26},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8848863},
  doi          = {10.1155/2020/8848863},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/BialczakM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/El-LatifAMFV20,
  author       = {Ahmed A. Abd El{-}Latif and
                  Bassem Abd{-}El{-}Atty and
                  Wojciech Mazurczyk and
                  Carol J. Fung and
                  Salvador E. Venegas{-}Andraca},
  title        = {Secure Data Encryption Based on Quantum Walks for 5G Internet of Things
                  Scenario},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {118--131},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2020.2969863},
  doi          = {10.1109/TNSM.2020.2969863},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/El-LatifAMFV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/MazurczykBJNC20,
  author       = {Wojciech Mazurczyk and
                  Pascal Bisson and
                  Roger Piqueras Jover and
                  Koji Nakao and
                  Krzysztof Cabaj},
  title        = {Challenges and Novel Solutions for 5G Network Security, Privacy and
                  Trust},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {27},
  number       = {4},
  pages        = {6--7},
  year         = {2020},
  url          = {https://doi.org/10.1109/MWC.2020.9170261},
  doi          = {10.1109/MWC.2020.9170261},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/MazurczykBJNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SzaryMWC20,
  author       = {Przemyslaw Szary and
                  Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Luca Caviglione},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Design and performance evaluation of reversible network covert channels},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {68:1--68:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3409215},
  doi          = {10.1145/3407023.3409215},
  timestamp    = {Mon, 03 Aug 2020 16:17:13 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SzaryMWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NowakowskiZCM20,
  author       = {Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Network covert channels detection using data mining and hierarchical
                  organisation of frequent sets: an initial study},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {69:1--69:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3409217},
  doi          = {10.1145/3407023.3409217},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NowakowskiZCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RajbaM20,
  author       = {Pawel Rajba and
                  Wojciech Mazurczyk},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Exploiting minification for data hiding purposes},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {72:1--72:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3409209},
  doi          = {10.1145/3407023.3409209},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RajbaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NowakowskiZCGPM20,
  author       = {Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski and
                  Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Maciej Purski and
                  Wojciech Mazurczyk},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Distributed packet inspection for network security purposes in software-defined
                  networking environments},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {106:1--106:7},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3409210},
  doi          = {10.1145/3407023.3409210},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NowakowskiZCGPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsb/CosmasJAM00GMCL20,
  author       = {John Cosmas and
                  Nawar Jawad and
                  Kareem Ali and
                  Ben Meunier and
                  Yue Zhang and
                  Wei Li and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Mathias Lacaud and
                  Daniel N{\'{e}}gru and
                  Sara Cuerva Navas and
                  Ignacio Losas Davila and
                  Charilaos C. Zarakovitis and
                  Harilaos Koumaras and
                  Michail{-}Alexandros Kourtis},
  title        = {Network and Application Layer Services for High Performance Communications
                  in Buildings},
  booktitle    = {{IEEE} International Symposium on Broadband Multimedia Systems and
                  Broadcasting, {BMSB} 2020, Paris, France, October 27-29, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BMSB49480.2020.9379769},
  doi          = {10.1109/BMSB49480.2020.9379769},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bmsb/CosmasJAM00GMCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eicc/HeinzMC20,
  author       = {Corinna Heinz and
                  Wojciech Mazurczyk and
                  Luca Caviglione},
  editor       = {Luca Caviglione and
                  Aleksandra Mileva and
                  Steffen Wendzel},
  title        = {Covert Channels in Transport Layer Security},
  booktitle    = {{EICC} 2020: European Interdisciplinary Cybersecurity Conference,
                  Rennes, France, November 18, 2020},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3424954.3424962},
  doi          = {10.1145/3424954.3424962},
  timestamp    = {Wed, 01 Dec 2021 19:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/HeinzMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KorczynskiMC20,
  author       = {Maciej Korczynski and
                  Wojciech Mazurczyk and
                  Pedro Casas},
  title        = {Preface on the 5th International Workshop on Traffic Measurements
                  for Cybersecurity},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {521},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00076},
  doi          = {10.1109/EUROSPW51379.2020.00076},
  timestamp    = {Thu, 29 Oct 2020 11:34:40 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KorczynskiMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/VelinovMWM19,
  author       = {Aleksandar Velinov and
                  Aleksandra Mileva and
                  Steffen Wendzel and
                  Wojciech Mazurczyk},
  title        = {Covert Channels in the MQTT-Based Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {161899--161915},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2951425},
  doi          = {10.1109/ACCESS.2019.2951425},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/VelinovMWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP19,
  author       = {Thomas Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {57},
  number       = {1},
  pages        = {42},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCOM.2019.8613272},
  doi          = {10.1109/MCOM.2019.8613272},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP19a,
  author       = {Tom Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {57},
  number       = {4},
  pages        = {94},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCOM.2019.8703472},
  doi          = {10.1109/MCOM.2019.8703472},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP19b,
  author       = {Thomas Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {57},
  number       = {9},
  pages        = {112},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCOM.2019.8847237},
  doi          = {10.1109/MCOM.2019.8847237},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderMMP19c,
  author       = {Tom Alexander and
                  Wojciech Mazurczyk and
                  Amitabh Mishra and
                  Alberto Perotti},
  title        = {Mobile Communications and Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {57},
  number       = {12},
  pages        = {37},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCOM.2019.8930823},
  doi          = {10.1109/MCOM.2019.8930823},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderMMP19c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OpasiakM19,
  author       = {Krzysztof Opasiak and
                  Wojciech Mazurczyk},
  title        = {(In)Secure Android Debugging: Security analysis and lessons learned},
  journal      = {Comput. Secur.},
  volume       = {82},
  pages        = {80--98},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.12.010},
  doi          = {10.1016/J.COSE.2018.12.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OpasiakM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MazurczykWCK19,
  author       = {Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Mehdi Chourib and
                  J{\"{o}}rg Keller},
  title        = {Countering adaptive network covert communication with dynamic wardens},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {94},
  pages        = {712--725},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.12.047},
  doi          = {10.1016/J.FUTURE.2018.12.047},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/MazurczykWCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/El-LatifAVM19,
  author       = {Ahmed A. Abd El{-}Latif and
                  Bassem Abd{-}El{-}Atty and
                  Salvador E. Venegas{-}Andraca and
                  Wojciech Mazurczyk},
  title        = {Efficient quantum-based security protocols for information sharing
                  and data protection in 5G networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {100},
  pages        = {893--906},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.05.053},
  doi          = {10.1016/J.FUTURE.2019.05.053},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/El-LatifAVM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MazurczykCW19,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione and
                  Steffen Wendzel},
  title        = {Recent Advancements in Digital Forensics, Part 2},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {7--8},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2896857},
  doi          = {10.1109/MSEC.2019.2896857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MazurczykCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/JanickiMLY19,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Xiangyang Luo and
                  Dengpan Ye},
  title        = {Recent Advances in Detection, Investigation and Mitigation of Cyber
                  Crimes},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {9},
  pages        = {1039--1042},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_9/recent\_advances\_in\_detection},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/JanickiMLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/0001MGFV19,
  author       = {J{\"{o}}rg Keller and
                  Wojciech Mazurczyk and
                  B{\'{e}}la Genge and
                  Lothar Fritsch and
                  Simon Vrhovec},
  title        = {Cyberattack Detection and Response},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {11},
  pages        = {1394--1395},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_11/cyberattack\_detection\_and\_response},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/0001MGFV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WendzelLEM19,
  author       = {Steffen Wendzel and
                  Florian Link and
                  Daniela Eller and
                  Wojciech Mazurczyk},
  title        = {Detection of Size Modulation Covert Channels Using Countermeasure
                  Variation},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {11},
  pages        = {1396--1416},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_11/detection\_of\_size\_modulation},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/WendzelLEM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CabajGMNZ19,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  title        = {Network Threats Mitigation Using Software-Defined Networking for the
                  5G Internet of Radio Light System},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4930908:1--4930908:22},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4930908},
  doi          = {10.1155/2019/4930908},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CabajGMNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/JawadSAMZZZZKKS19,
  author       = {Nawar Jawad and
                  Mukhald A. Salih and
                  Kareem Ali and
                  Ben Meunier and
                  Yue Zhang and
                  Xun Zhang and
                  Rudolf Zetik and
                  Charilaos C. Zarakovitis and
                  Harilaos Koumaras and
                  Michail{-}Alexandros Kourtis and
                  Lina Shi and
                  Wojciech Mazurczyk and
                  John Cosmas},
  title        = {Smart Television Services Using {NFV/SDN} Network Management},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {65},
  number       = {2},
  pages        = {404--413},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBC.2019.2898159},
  doi          = {10.1109/TBC.2019.2898159},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbc/JawadSAMZZZZKKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LvMWS19,
  author       = {Zhihan Lv and
                  Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Houbing Song},
  title        = {Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial
                  Environments},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {12},
  pages        = {6468--6471},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2019.2945971},
  doi          = {10.1109/TII.2019.2945971},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/LvMWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchmidbauerWMM19,
  author       = {Tobias Schmidbauer and
                  Steffen Wendzel and
                  Aleksandra Mileva and
                  Wojciech Mazurczyk},
  title        = {Introducing Dead Drops to Network Steganography using ARP-Caches and
                  SNMP-Walks},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {64:1--64:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341488},
  doi          = {10.1145/3339252.3341488},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchmidbauerWMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CabajMNZ19,
  author       = {Krzysztof Cabaj and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  title        = {Fine-tuning of Distributed Network Covert Channels Parameters and
                  Their Impact on Undetectability},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {65:1--65:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341489},
  doi          = {10.1145/3339252.3341489},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CabajMNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MazurczykSWC19,
  author       = {Wojciech Mazurczyk and
                  Przemyslaw Szary and
                  Steffen Wendzel and
                  Luca Caviglione},
  title        = {Towards Reversible Storage Network Covert Channels},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {69:1--69:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341493},
  doi          = {10.1145/3339252.3341493},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MazurczykSWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CabajGMNZ19,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  title        = {Sniffing Detection within the Network: Revisiting Existing and Proposing
                  Novel Approaches},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {108:1--108:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341494},
  doi          = {10.1145/3339252.3341494},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CabajGMNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/RaufMM19,
  author       = {Usman Rauf and
                  Mujahid Mohsin and
                  Wojciech Mazurczyk},
  editor       = {Adriana B. Compagnoni and
                  William Casey and
                  Yang Cai and
                  Bud Mishra},
  title        = {Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework
                  for Cyber-Defense},
  booktitle    = {Bio-inspired Information and Communication Technologies - 11th {EAI}
                  International Conference, {BICT} 2019, Pittsburgh, PA, USA, March
                  13-14, 2019, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {289},
  pages        = {156--174},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24202-2\_12},
  doi          = {10.1007/978-3-030-24202-2\_12},
  timestamp    = {Wed, 24 Jul 2019 17:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/bionetics/RaufMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/MazurczykPC19,
  author       = {Wojciech Mazurczyk and
                  Krystian Pow{\'{o}}jski and
                  Luca Caviglione},
  title        = {IPv6 Covert Channels in the Wild},
  booktitle    = {Proceedings of the Third Central European Cybersecurity Conference,
                  {CECC} 2019, Munich, Germany, November 14-15, 2019},
  pages        = {10:1--10:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360664.3360674},
  doi          = {10.1145/3360664.3360674},
  timestamp    = {Mon, 28 Oct 2019 08:10:46 +0100},
  biburl       = {https://dblp.org/rec/conf/cecc/MazurczykPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/LalandeTGHMCB19,
  author       = {Jean{-}Fran{\c{c}}ois Lalande and
                  Val{\'{e}}rie Viet Triem Tong and
                  Pierre Graux and
                  Guillaume Hiet and
                  Wojciech Mazurczyk and
                  Habiba Chaoui and
                  Pascal Berthom{\'{e}}},
  editor       = {Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and
                  Sarah Heckman and
                  Jian Zhang},
  title        = {Teaching Android Mobile Security},
  booktitle    = {Proceedings of the 50th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2019, Minneapolis, MN, USA, February 27 - March
                  02, 2019},
  pages        = {232--238},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3287324.3287406},
  doi          = {10.1145/3287324.3287406},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/LalandeTGHMCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SkwarekKMD19,
  author       = {Marcin Skwarek and
                  Maciej Korczynski and
                  Wojciech Mazurczyk and
                  Andrzej Duda},
  title        = {Characterizing Vulnerability of {DNS} {AXFR} Transfers with Global-Scale
                  Scanning},
  booktitle    = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San
                  Francisco, CA, USA, May 19-23, 2019},
  pages        = {193--198},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SPW.2019.00044},
  doi          = {10.1109/SPW.2019.00044},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SkwarekKMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MazurczykW18,
  author       = {Wojciech Mazurczyk and
                  Steffen Wendzel},
  title        = {Information hiding: Challenges for forensic experts},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {1},
  pages        = {86--94},
  year         = {2018},
  url          = {https://doi.org/10.1145/3158416},
  doi          = {10.1145/3158416},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MazurczykW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/CabajGM18,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk},
  title        = {Software-defined networking-based crypto ransomware detection using
                  {HTTP} traffic characteristics},
  journal      = {Comput. Electr. Eng.},
  volume       = {66},
  pages        = {353--368},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2017.10.012},
  doi          = {10.1016/J.COMPELECENG.2017.10.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/CabajGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchmidtMKKC18,
  author       = {Sabine S. Schmidt and
                  Wojciech Mazurczyk and
                  Radoslaw Kulesza and
                  J{\"{o}}rg Keller and
                  Luca Caviglione},
  title        = {Exploiting {IP} telephony with silence suppression for hidden data
                  transfers},
  journal      = {Comput. Secur.},
  volume       = {79},
  pages        = {17--32},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.08.006},
  doi          = {10.1016/J.COSE.2018.08.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SchmidtMKKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CabajKKM18,
  author       = {Krzysztof Cabaj and
                  Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Wojciech Mazurczyk},
  title        = {Cybersecurity: trends, issues, and challenges},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {10},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0080-0},
  doi          = {10.1186/S13635-018-0080-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CabajKKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CabajCMWWZ18,
  author       = {Krzysztof Cabaj and
                  Luca Caviglione and
                  Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Alan Woodward and
                  Sebastian Zander},
  title        = {The New Threats of Information Hiding: The Road Ahead},
  journal      = {{IT} Prof.},
  volume       = {20},
  number       = {3},
  pages        = {31--39},
  year         = {2018},
  url          = {https://doi.org/10.1109/MITP.2018.032501746},
  doi          = {10.1109/MITP.2018.032501746},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/CabajCMWWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/KellerBM18,
  author       = {J{\"{o}}rg Keller and
                  Igor Bernik and
                  Wojciech Mazurczyk},
  title        = {Technical and Social Aspects of Critical Infrastructure Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {24},
  number       = {5},
  pages        = {554--555},
  year         = {2018},
  url          = {http://www.jucs.org/jucs\_24\_5/technical\_and\_social\_aspects},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/KellerBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaviglioneMWZ18,
  author       = {Luca Caviglione and
                  Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Sebastian Zander},
  title        = {Emerging and Unconventional: New Attacks and Innovative Detection
                  Techniques},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9672523:1},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9672523},
  doi          = {10.1155/2018/9672523},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaviglioneMWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LakaM18,
  author       = {Pawel Laka and
                  Wojciech Mazurczyk},
  title        = {User perspective and security of a new mobile authentication method},
  journal      = {Telecommun. Syst.},
  volume       = {69},
  number       = {3},
  pages        = {365--379},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11235-018-0437-1},
  doi          = {10.1007/S11235-018-0437-1},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LakaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/5gwf/CosmasMAJSZHGGM18,
  author       = {John Cosmas and
                  Ben Meunier and
                  Kareem Ali and
                  Nawar Jawad and
                  Mukhald A. Salih and
                  Yue Zhang and
                  Zion Hadad and
                  Baruch Globen and
                  Haluk Gokmen and
                  Sibel Malkos and
                  Memduh Emre Cakan and
                  Harilaos Koumaras and
                  Akis Kourtis and
                  Christos Sakkas and
                  Daniel N{\'{e}}gru and
                  Mathias Lacaud and
                  Moshe Ran and
                  Einat Ran and
                  Jorge Garcia and
                  Wei Li and
                  Li{-}Ke Huang and
                  Rudolf Zetik and
                  Krzysztof Cabaj and
                  Woiciech Mazurczyk and
                  Xun Zhang and
                  Adam Kapovits},
  title        = {A 5G Radio-Light {SDN} Architecture for Wireless and Mobile Network
                  Access in Buildings},
  booktitle    = {{IEEE} 5G World Forum, 5GWF 2018, Silicon Valley, CA, USA, July 9-11,
                  2018},
  pages        = {135--140},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/5GWF.2018.8516970},
  doi          = {10.1109/5GWF.2018.8516970},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/5gwf/CosmasMAJSZHGGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MazurczykWC18,
  author       = {Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Krzysztof Cabaj},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Towards Deriving Insights into Data Hiding Methods Using Pattern-based
                  Approach},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {10:1--10:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233261},
  doi          = {10.1145/3230833.3233261},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MazurczykWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CabajMNZ18,
  author       = {Krzysztof Cabaj and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Towards Distributed Network Covert Channels Detection Using Data Mining-based
                  Approach},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {12:1--12:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233264},
  doi          = {10.1145/3230833.3233264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CabajMNZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GeislerM018,
  author       = {Daniel Geisler and
                  Wojciech Mazurczyk and
                  J{\"{o}}rg Keller},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Towards Utilization of Covert Channels as a Green Networking Technique},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {14:1--14:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233262},
  doi          = {10.1145/3230833.3233262},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GeislerM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CabajGMNZ18,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio
                  Light System},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {49},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233248},
  doi          = {10.1145/3230833.3233248},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CabajGMNZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TundisMM18,
  author       = {Andrea Tundis and
                  Wojciech Mazurczyk and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {A review of network vulnerabilities scanning tools: types, capabilities
                  and functioning},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {65:1--65:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233287},
  doi          = {10.1145/3230833.3233287},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TundisMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsb/CosmasMAJSMGGSH18,
  author       = {John Cosmas and
                  Ben Meunier and
                  Kareem Ali and
                  Nawar Jawad and
                  Mukhald A. Salih and
                  Hongying Meng and
                  Martin Ganley and
                  James Gbadamosi and
                  Atanas Savov and
                  Zion Hadad and
                  Baruch Globen and
                  Haluk Gokmen and
                  Sibel Malkos and
                  Memduh Emre Cakan and
                  Harilaos Koumaras and
                  Michail{-}Alexandros Kourtis and
                  Christos Sakkas and
                  Eliron Salomon and
                  Yoav Avinoam and
                  Daniel N{\'{e}}gru and
                  Mathias Lacaud and
                  Yue Zhang and
                  Li{-}Ke Huang and
                  Rudolf Zetik and
                  Krzysztof Cabaj and
                  Woiciech Mazurczyk and
                  Xun Zhang and
                  Moshe Ran and
                  Dror Malka and
                  Adam Kapovits},
  title        = {A Scalable and License Free 5G Internet of Radio Light Architecture
                  for Services in Homes {\&} Businesses},
  booktitle    = {2018 {IEEE} International Symposium on Broadband Multimedia Systems
                  and Broadcasting, {BMSB} 2018, Valencia, Spain, June 6-8, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BMSB.2018.8436938},
  doi          = {10.1109/BMSB.2018.8436938},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmsb/CosmasMAJSMGGSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/WendzelEM18,
  author       = {Steffen Wendzel and
                  Daniela Eller and
                  Wojciech Mazurczyk},
  title        = {One Countermeasure, Multiple Patterns: Countermeasure Variation for
                  Covert Channels},
  booktitle    = {Proceedings of the Central European Cybersecurity Conference 2018,
                  {CECC} 2018, Ljubljana, Slovenia, November 15-16, 2018},
  pages        = {1:1--1:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3277570.3277571},
  doi          = {10.1145/3277570.3277571},
  timestamp    = {Wed, 09 Jan 2019 16:52:40 +0100},
  biburl       = {https://dblp.org/rec/conf/cecc/WendzelEM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2018wtmc,
  editor       = {Maciej Korczynski and
                  Wojciech Mazurczyk and
                  Pedro Casas},
  title        = {Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity,
                  WTMC@SIGCOMM 2018, Budapest, Hungary, August 20, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3229598},
  doi          = {10.1145/3229598},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/2018wtmc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-00694,
  author       = {Krzysztof Cabaj and
                  Luca Caviglione and
                  Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Alan Woodward and
                  Sebastian Zander},
  title        = {The New Threats of Information Hiding: the Road Ahead},
  journal      = {CoRR},
  volume       = {abs/1801.00694},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.00694},
  eprinttype    = {arXiv},
  eprint       = {1801.00694},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-00694.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/MazurczykKNKHY17,
  author       = {Wojciech Mazurczyk and
                  Maciej Korczynski and
                  Koji Nakao and
                  Engin Kirda and
                  Cristian Hesselman and
                  Katsunari Yoshioka},
  title        = {Traffic Measurements for Cyber Security},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {7},
  pages        = {12--13},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.7981517},
  doi          = {10.1109/MCOM.2017.7981517},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/MazurczykKNKHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/UrbanskiMLC17,
  author       = {Marcin Urbanski and
                  Wojciech Mazurczyk and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Luca Caviglione},
  title        = {Detecting local covert channels using process activity correlation
                  on Android smartphones},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {32},
  number       = {2},
  year         = {2017},
  timestamp    = {Wed, 15 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/UrbanskiMLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MazurczykCW17,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione and
                  Steffen Wendzel},
  title        = {Recent Advancements in Digital Forensics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {6},
  pages        = {10--11},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.4251106},
  doi          = {10.1109/MSP.2017.4251106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MazurczykCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CaviglioneWM17,
  author       = {Luca Caviglione and
                  Steffen Wendzel and
                  Wojciech Mazurczyk},
  title        = {The Future of Digital Forensics: Challenges and the Road Ahead},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {6},
  pages        = {12--17},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.4251117},
  doi          = {10.1109/MSP.2017.4251117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CaviglioneWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WendzelMH17,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Georg Haas},
  title        = {Steganography for Cyber-physicalSystems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {2},
  pages        = {105--126},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.621},
  doi          = {10.13052/JCSM2245-1439.621},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/WendzelMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/CaviglionePMI17,
  author       = {Luca Caviglione and
                  Maciej Podolski and
                  Wojciech Mazurczyk and
                  Massimo Ianigro},
  title        = {Covert Channels in Personal Cloud Storage Services: The Case of Dropbox},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {13},
  number       = {4},
  pages        = {1921--1931},
  year         = {2017},
  url          = {https://doi.org/10.1109/TII.2016.2627503},
  doi          = {10.1109/TII.2016.2627503},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/CaviglionePMI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchmidtM0C17,
  author       = {Sabine S. Schmidt and
                  Wojciech Mazurczyk and
                  J{\"{o}}rg Keller and
                  Luca Caviglione},
  title        = {A New Data-Hiding Approach for {IP} Telephony Applications with Silence
                  Suppression},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {83:1--83:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3106066},
  doi          = {10.1145/3098954.3106066},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchmidtM0C17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/NilizadehMZL17,
  author       = {Amirfarhad Nilizadeh and
                  Wojciech Mazurczyk and
                  Cliff C. Zou and
                  Gary T. Leavens},
  title        = {Information Hiding in {RGB} Images Using an Improved Matrix Pattern
                  Approach},
  booktitle    = {2017 {IEEE} Conference on Computer Vision and Pattern Recognition
                  Workshops, {CVPR} Workshops 2017, Honolulu, HI, USA, July 21-26, 2017},
  pages        = {1407--1415},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CVPRW.2017.183},
  doi          = {10.1109/CVPRW.2017.183},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/NilizadehMZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/LehnerM0W17,
  author       = {Florian Lehner and
                  Wojciech Mazurczyk and
                  J{\"{o}}rg Keller and
                  Steffen Wendzel},
  title        = {Inter-Protocol Steganography for Real-Time Services and Its Detection
                  Using Traffic Coloring Approach},
  booktitle    = {42nd {IEEE} Conference on Local Computer Networks, {LCN} 2017, Singapore,
                  October 9-12, 2017},
  pages        = {78--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/LCN.2017.32},
  doi          = {10.1109/LCN.2017.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/LehnerM0W17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WendzelMH17,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Georg Haas},
  title        = {Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems},
  booktitle    = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
                  Jose, CA, USA, May 25, 2017},
  pages        = {29--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SPW.2017.40},
  doi          = {10.1109/SPW.2017.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WendzelMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2017,
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2},
  doi          = {10.1007/978-3-319-64701-2},
  isbn         = {978-3-319-64700-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/MazurczykMFWL16,
  author       = {Wojciech Mazurczyk and
                  Sean Moore and
                  Errin W. Fulp and
                  Hiroshi Wada and
                  Kenji Leibnitz},
  title        = {Bio-inspired cyber security for communications and networking},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {54},
  number       = {6},
  pages        = {58--59},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCOM.2016.7497767},
  doi          = {10.1109/MCOM.2016.7497767},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/MazurczykMFWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/AndrysiakSM16,
  author       = {Tomasz Andrysiak and
                  Lukasz Saganowski and
                  Wojciech Mazurczyk},
  title        = {Network anomaly detection for railway critical infrastructure based
                  on autoregressive fractional integrated moving average},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2016},
  pages        = {245},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13638-016-0744-8},
  doi          = {10.1186/S13638-016-0744-8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/AndrysiakSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WendzelMZ16,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Sebastian Zander},
  title        = {Unified Description for Network Information Hiding Methods},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {22},
  number       = {11},
  pages        = {1456--1486},
  year         = {2016},
  url          = {http://www.jucs.org/jucs\_22\_11/unified\_description\_for\_network},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/WendzelMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MazurczykKSJ16,
  author       = {Wojciech Mazurczyk and
                  Maciej Karas and
                  Krzysztof Szczypiorski and
                  Artur Janicki},
  title        = {YouSkyde: information hiding for Skype video traffic},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13521--13540},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2740-0},
  doi          = {10.1007/S11042-015-2740-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MazurczykKSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/CabajM16,
  author       = {Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Using Software-Defined Networking for Ransomware Mitigation: The Case
                  of CryptoWall},
  journal      = {{IEEE} Netw.},
  volume       = {30},
  number       = {6},
  pages        = {14--20},
  year         = {2016},
  url          = {https://doi.org/10.1109/MNET.2016.1600110NM},
  doi          = {10.1109/MNET.2016.1600110NM},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/CabajM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SzczypiorskiM16,
  author       = {Krzysztof Szczypiorski and
                  Wojciech Mazurczyk},
  title        = {Steganography in {IEEE} 802.11 {OFDM} symbols},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {118--129},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.306},
  doi          = {10.1002/SEC.306},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SzczypiorskiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykSJT16,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Artur Janicki and
                  Hui Tian},
  title        = {Trends in modern information hiding: techniques, applications, and
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {8},
  pages        = {703--704},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1469},
  doi          = {10.1002/SEC.1469},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykSJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykWVS16,
  author       = {Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Ignacio Azagra Villares and
                  Krzysztof Szczypiorski},
  title        = {On importance of steganographic cost for network steganography},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {8},
  pages        = {781--790},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1085},
  doi          = {10.1002/SEC.1085},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykWVS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykSDY16,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Zoran Duric and
                  Dengpan Ye},
  title        = {Cyber Crime},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2861--2863},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1603},
  doi          = {10.1002/SEC.1603},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykSDY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NaumannWM016,
  author       = {Matthias Naumann and
                  Steffen Wendzel and
                  Wojciech Mazurczyk and
                  J{\"{o}}rg Keller},
  title        = {Micro protocol engineering for unstructured carriers: on the embedding
                  of steganographic control protocols into audio transmissions},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2972--2985},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1500},
  doi          = {10.1002/SEC.1500},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NaumannWM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MazurczykHS16,
  author       = {Wojciech Mazurczyk and
                  Thomas Holt and
                  Krzysztof Szczypiorski},
  title        = {Guest Editors' Introduction: Special Issue on Cyber Crime},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {2},
  pages        = {146--147},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2502407},
  doi          = {10.1109/TDSC.2015.2502407},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MazurczykHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaviglioneGLMU16,
  author       = {Luca Caviglione and
                  Mauro Gaggero and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Wojciech Mazurczyk and
                  Marcin Urbanski},
  title        = {Seeing the Unseen: Revealing Mobile Malware Hidden Communications
                  via Energy Consumption and Artificial Intelligence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {799--810},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510825},
  doi          = {10.1109/TIFS.2015.2510825},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaviglioneGLMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WendzelM16,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} An Educational Network Protocol for Covert Channel Analysis
                  Using Patterns},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1739--1741},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989037},
  doi          = {10.1145/2976749.2989037},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WendzelM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CabajM16,
  author       = {Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Using Software-Defined Networking for Ransomware Mitigation: the Case
                  of CryptoWall},
  journal      = {CoRR},
  volume       = {abs/1608.06673},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.06673},
  eprinttype    = {arXiv},
  eprint       = {1608.06673},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CabajM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazurczykKSJ16,
  author       = {Wojciech Mazurczyk and
                  Maciej Karas and
                  Krzysztof Szczypiorski and
                  Artur Janicki},
  title        = {YouSkyde: Information Hiding for Skype Video Traffic},
  journal      = {CoRR},
  volume       = {abs/1608.07337},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.07337},
  eprinttype    = {arXiv},
  eprint       = {1608.07337},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazurczykKSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CabajGM16,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk},
  title        = {Software-Defined Networking-based Crypto Ransomware Detection Using
                  {HTTP} Traffic Characteristics},
  journal      = {CoRR},
  volume       = {abs/1611.08294},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.08294},
  eprinttype    = {arXiv},
  eprint       = {1611.08294},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CabajGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CaviglioneM15,
  author       = {Luca Caviglione and
                  Wojciech Mazurczyk},
  title        = {Understanding Information Hiding in iOS},
  journal      = {Computer},
  volume       = {48},
  number       = {1},
  pages        = {62--65},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.31},
  doi          = {10.1109/MC.2015.31},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CaviglioneM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/MazurczykC15,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione},
  title        = {Steganography in Modern Smartphones and Mitigation Techniques},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {17},
  number       = {1},
  pages        = {334--357},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMST.2014.2350994},
  doi          = {10.1109/COMST.2014.2350994},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/MazurczykC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MazurczykC15,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione},
  title        = {Information Hiding as a Challenge for Malware Detection},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {2},
  pages        = {89--93},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.33},
  doi          = {10.1109/MSP.2015.33},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MazurczykC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/MazurczykR15,
  author       = {Wojciech Mazurczyk and
                  Elzbieta Rzeszutko},
  title        = {Security-A Perpetual War: Lessons from Nature},
  journal      = {{IT} Prof.},
  volume       = {17},
  number       = {1},
  pages        = {16--22},
  year         = {2015},
  url          = {https://doi.org/10.1109/MITP.2015.14},
  doi          = {10.1109/MITP.2015.14},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/MazurczykR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JanickiMS15,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {On the undetectability of transcoding steganography},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3804--3814},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1301},
  doi          = {10.1002/SEC.1301},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JanickiMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/JanickiMS15,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Influence of speech codecs selection on transcoding steganography},
  journal      = {Telecommun. Syst.},
  volume       = {59},
  number       = {3},
  pages        = {305--315},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11235-014-9937-9},
  doi          = {10.1007/S11235-014-9937-9},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/JanickiMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/CaviglioneLMW15,
  author       = {Luca Caviglione and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Wojciech Mazurczyk and
                  Steffen Wendzel},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Analysis of Human Awareness of Security and Privacy Threats in Smart
                  Environments},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {165--177},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_15},
  doi          = {10.1007/978-3-319-20376-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/CaviglioneLMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CaviglioneLMW15,
  author       = {Luca Caviglione and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Wojciech Mazurczyk and
                  Steffen Wendzel},
  title        = {Analysis of Human Awareness of Security and Privacy Threats in Smart
                  Environments},
  journal      = {CoRR},
  volume       = {abs/1502.00868},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.00868},
  eprinttype    = {arXiv},
  eprint       = {1502.00868},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CaviglioneLMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazurczykC15,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione},
  title        = {Information Hiding as a Challenge for Malware Detection},
  journal      = {CoRR},
  volume       = {abs/1504.04867},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.04867},
  eprinttype    = {arXiv},
  eprint       = {1504.04867},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazurczykC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazurczykDM15,
  author       = {Wojciech Mazurczyk and
                  Szymon Drobniak and
                  Sean Moore},
  title        = {Towards a Systematic View on Cybersecurity Ecology},
  journal      = {CoRR},
  volume       = {abs/1505.04207},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.04207},
  eprinttype    = {arXiv},
  eprint       = {1505.04207},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazurczykDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NaumannWM015,
  author       = {Matthias Naumann and
                  Steffen Wendzel and
                  Wojciech Mazurczyk and
                  J{\"{o}}rg Keller},
  title        = {Micro protocol engineering for unstructured carriers: On the embedding
                  of steganographic control protocols into audio transmissions},
  journal      = {CoRR},
  volume       = {abs/1505.07757},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.07757},
  eprinttype    = {arXiv},
  eprint       = {1505.07757},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NaumannWM015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WendzelMZ15,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Sebastian Zander},
  title        = {Unified Description for Network Information Hiding Methods},
  journal      = {CoRR},
  volume       = {abs/1512.07438},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07438},
  eprinttype    = {arXiv},
  eprint       = {1512.07438},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WendzelMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/MazurczykST14,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Hui Tian},
  title        = {Network forensics and challenges for cybersecurity},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {69},
  number       = {7-8},
  pages        = {345--346},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12243-014-0434-7},
  doi          = {10.1007/S12243-014-0434-7},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/MazurczykST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/JanickiMS14,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Steganalysis of transcoding steganography},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {69},
  number       = {7-8},
  pages        = {449--460},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12243-013-0385-4},
  doi          = {10.1007/S12243-013-0385-4},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/JanickiMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ZielinskaMS14,
  author       = {Elzbieta Zielinska and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Trends in steganography},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {3},
  pages        = {86--95},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566590.2566610},
  doi          = {10.1145/2566590.2566610},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/ZielinskaMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/LubaczMS14,
  author       = {J{\'{o}}zef Lubacz and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Principles and overview of network steganography},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {52},
  number       = {5},
  pages        = {225--229},
  year         = {2014},
  url          = {https://doi.org/10.1109/MCOM.2014.6815916},
  doi          = {10.1109/MCOM.2014.6815916},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/LubaczMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/MazurczykS14,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Advances in digital media security and right management},
  journal      = {Multim. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {101--103},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00530-013-0339-8},
  doi          = {10.1007/S00530-013-0339-8},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/MazurczykS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MazurczykSS14,
  author       = {Wojciech Mazurczyk and
                  Pawel Szaga and
                  Krzysztof Szczypiorski},
  title        = {Using transcoding for hidden communication in {IP} telephony},
  journal      = {Multim. Tools Appl.},
  volume       = {70},
  number       = {3},
  pages        = {2139--2165},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-012-1224-8},
  doi          = {10.1007/S11042-012-1224-8},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MazurczykSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykLS14,
  author       = {Wojciech Mazurczyk and
                  J{\'{o}}zef Lubacz and
                  Krzysztof Szczypiorski},
  title        = {On steganography in lost audio packets},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2602--2615},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.388},
  doi          = {10.1002/SEC.388},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/WendzelMC014,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Luca Caviglione and
                  Michael Meier},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Hidden and Uncontrolled - On the Emergence of Network Steganographic
                  Threats},
  booktitle    = {{ISSE} 2014 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2014 Conference, Brussels,
                  Belgium, October 14-15, 2014},
  pages        = {123--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-658-06708-3\_9},
  doi          = {10.1007/978-3-658-06708-3\_9},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/WendzelMC014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LipinskiMS14,
  author       = {Bartosz Lipinski and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Improving Hard Disk Contention-Based Covert Channel in Cloud Computing},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {100--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.24},
  doi          = {10.1109/SPW.2014.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LipinskiMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LipinskiMS14,
  author       = {Bartosz Lipinski and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Improving Hard Disk Contention-based Covert Channel in Cloud Computing
                  Environment},
  journal      = {CoRR},
  volume       = {abs/1402.0239},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.0239},
  eprinttype    = {arXiv},
  eprint       = {1402.0239},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LipinskiMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazurczykWVS14,
  author       = {Wojciech Mazurczyk and
                  Steffen Wendzel and
                  Ignacio Azagra Villares and
                  Krzysztof Szczypiorski},
  title        = {On Importance of Steganographic Cost For Network Steganography},
  journal      = {CoRR},
  volume       = {abs/1406.2519},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.2519},
  eprinttype    = {arXiv},
  eprint       = {1406.2519},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazurczykWVS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WendzelMCM14,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Luca Caviglione and
                  Michael Meier},
  title        = {Hidden and Uncontrolled - On the Emergence of Network Steganographic
                  Threats},
  journal      = {CoRR},
  volume       = {abs/1407.2029},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.2029},
  eprinttype    = {arXiv},
  eprint       = {1407.2029},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WendzelMCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazurczykR14,
  author       = {Wojciech Mazurczyk and
                  Elzbieta Rzeszutko},
  title        = {Security - a perpetual war: lessons from nature},
  journal      = {CoRR},
  volume       = {abs/1410.4795},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.4795},
  eprinttype    = {arXiv},
  eprint       = {1410.4795},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazurczykR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MazurczykC14,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione},
  title        = {Steganography in Modern Smartphones and Mitigation Techniques},
  journal      = {CoRR},
  volume       = {abs/1410.6796},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.6796},
  eprinttype    = {arXiv},
  eprint       = {1410.6796},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MazurczykC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RzeszutkoM14,
  author       = {Elzbieta Rzeszutko and
                  Wojciech Mazurczyk},
  title        = {Insights from the Nature for Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/1410.8317},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.8317},
  eprinttype    = {arXiv},
  eprint       = {1410.8317},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RzeszutkoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CaviglioneM14,
  author       = {Luca Caviglione and
                  Wojciech Mazurczyk},
  title        = {How to covertly leak data from iOS?},
  journal      = {CoRR},
  volume       = {abs/1411.3000},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.3000},
  eprinttype    = {arXiv},
  eprint       = {1411.3000},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CaviglioneM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Mazurczyk13,
  author       = {Wojciech Mazurczyk},
  title        = {VoIP steganography and its Detection - {A} survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {46},
  number       = {2},
  pages        = {20:1--20:21},
  year         = {2013},
  url          = {https://doi.org/10.1145/2543581.2543587},
  doi          = {10.1145/2543581.2543587},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Mazurczyk13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccc/MazurczykKS13,
  author       = {Wojciech Mazurczyk and
                  Maciej Karas and
                  Krzysztof Szczypiorski},
  title        = {SkyDe: a Skype-based Steganographic Method},
  journal      = {Int. J. Comput. Commun. Control},
  volume       = {8},
  number       = {3},
  pages        = {432--443},
  year         = {2013},
  url          = {https://doi.org/10.15837/ijccc.2013.3.469},
  doi          = {10.15837/IJCCC.2013.3.469},
  timestamp    = {Mon, 16 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijccc/MazurczykKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykSTL13,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Hui Tian and
                  Yali Liu},
  title        = {Trends in modern information hiding: techniques, applications and
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1414--1415},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.919},
  doi          = {10.1002/SEC.919},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykSTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/JankowskiMS13,
  author       = {Bartosz Jankowski and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {PadSteg: introducing inter-protocol steganography},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {1101--1111},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9616-z},
  doi          = {10.1007/S11235-011-9616-Z},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/JankowskiMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/MazurczykSS13,
  author       = {Wojciech Mazurczyk and
                  Milosz Smolarczyk and
                  Krzysztof Szczypiorski},
  title        = {On information hiding in retransmissions},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {1113--1121},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9617-y},
  doi          = {10.1007/S11235-011-9617-Y},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/MazurczykSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icumt/SeredynskiAMSK13,
  author       = {Marcin Seredynski and
                  Riad Aggoune and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Djamel Khadraoui},
  title        = {Vehicular ad hoc networks for joint traffic and mobility management},
  booktitle    = {5th International Congress on Ultra Modern Telecommunications and
                  Control Systems and Workshops, {ICUMT} 2013, Almaty, Kazakhstan, September
                  10-13, 2013},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICUMT.2013.6798397},
  doi          = {10.1109/ICUMT.2013.6798397},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icumt/SeredynskiAMSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SeredynskiMK13,
  author       = {Marcin Seredynski and
                  Wojciech Mazurczyk and
                  Djamel Khadraoui},
  title        = {Multi-segment Green Light Optimal Speed Advisory},
  booktitle    = {2013 {IEEE} International Symposium on Parallel {\&} Distributed
                  Processing, Workshops and Phd Forum, Cambridge, MA, USA, May 20-24,
                  2013},
  pages        = {459--465},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IPDPSW.2013.157},
  doi          = {10.1109/IPDPSW.2013.157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SeredynskiMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KopiczkoMS13,
  author       = {Pawel Kopiczko and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {StegTorrent: {A} Steganographic Method for the {P2P} File Sharing
                  Service},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {151--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.11},
  doi          = {10.1109/SPW.2013.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KopiczkoMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-3632,
  author       = {Wojciech Mazurczyk and
                  Maciej Karas and
                  Krzysztof Szczypiorski},
  title        = {SkyDe: a Skype-based Steganographic Method},
  journal      = {CoRR},
  volume       = {abs/1301.3632},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.3632},
  eprinttype    = {arXiv},
  eprint       = {1301.3632},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-3632.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-4264,
  author       = {Pawel Kopiczko and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {StegTorrent: a Steganographic Method for the {P2P} File Sharing Service},
  journal      = {CoRR},
  volume       = {abs/1303.4264},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.4264},
  eprinttype    = {arXiv},
  eprint       = {1303.4264},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-4264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MazurczykS12,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Toward Effective and Reliable Digital Forensics},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {6},
  pages        = {651--652},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxs012},
  doi          = {10.1093/COMJNL/BXS012},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/MazurczykS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FraczekMS12,
  author       = {Wojciech Fraczek and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Hiding information in a Stream Control Transmission Protocol},
  journal      = {Comput. Commun.},
  volume       = {35},
  number       = {2},
  pages        = {159--169},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2011.08.009},
  doi          = {10.1016/J.COMCOM.2011.08.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FraczekMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/FraczekMS12,
  author       = {Wojciech Fraczek and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Multilevel Steganography: Improving Hidden Communication in Networks},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {18},
  number       = {14},
  pages        = {1967--1986},
  year         = {2012},
  url          = {https://doi.org/10.3217/jucs-018-14-1967},
  doi          = {10.3217/JUCS-018-14-1967},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/FraczekMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MazurczykCS12,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Krzysztof Szczypiorski},
  title        = {What are suspicious VoIP delays?},
  journal      = {Multim. Tools Appl.},
  volume       = {57},
  number       = {1},
  pages        = {109--126},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11042-010-0532-0},
  doi          = {10.1007/S11042-010-0532-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MazurczykCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MariasBFFHHGLLLMMOPPSVV12,
  author       = {Giannis F. Marias and
                  Jo{\~{a}}o Barros and
                  Markus Fiedler and
                  Andreas Fischer and
                  Harald Hauff and
                  Ralph Herkenh{\"{o}}ner and
                  Antonio Grillo and
                  Alessandro Lentini and
                  Lu{\'{\i}}sa Lima and
                  Charlott Lorentzen and
                  Wojciech Mazurczyk and
                  Hermann de Meer and
                  Paulo F. Oliveira and
                  George C. Polyzos and
                  Enric Pujol and
                  Krzysztof Szczypiorski and
                  Jo{\~{a}}o P. Vilela and
                  Tiago T. V. Vinhoza},
  title        = {Security and privacy issues for the network of the future},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {9},
  pages        = {987--1005},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.384},
  doi          = {10.1002/SEC.384},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MariasBFFHHGLLLMMOPPSVV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Mazurczyk12,
  author       = {Wojciech Mazurczyk},
  title        = {Lost audio packets steganography: the first practical evaluation},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1394--1403},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.502},
  doi          = {10.1002/SEC.502},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Mazurczyk12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/SzczypiorskiM12,
  author       = {Krzysztof Szczypiorski and
                  Wojciech Mazurczyk},
  title        = {Toward network steganography detection},
  journal      = {Telecommun. Syst.},
  volume       = {49},
  number       = {2},
  pages        = {161--162},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11235-010-9361-8},
  doi          = {10.1007/S11235-010-9361-8},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/SzczypiorskiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/MazurczykS12,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Evaluation of steganographic methods for oversized {IP} packets},
  journal      = {Telecommun. Syst.},
  volume       = {49},
  number       = {2},
  pages        = {207--217},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11235-010-9362-7},
  doi          = {10.1007/S11235-010-9362-7},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/MazurczykS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/CiszkowskiMKHFC12,
  author       = {Tomasz Ciszkowski and
                  Wojciech Mazurczyk and
                  Zbigniew Kotulski and
                  Tobias Ho{\ss}feld and
                  Markus Fiedler and
                  Denis Collange},
  title        = {Towards Quality of Experience-based reputation models for future web
                  service provisioning},
  journal      = {Telecommun. Syst.},
  volume       = {51},
  number       = {4},
  pages        = {283--295},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11235-011-9435-2},
  doi          = {10.1007/S11235-011-9435-2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/CiszkowskiMKHFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icumt/MazurczykSJ12,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Bartosz Jankowski},
  title        = {Towards steganography detection through network traffic visualisation},
  booktitle    = {4th International Congress on Ultra Modern Telecommunications and
                  Control Systems, {ICUMT} 2012, St. Petersburg, Russia, October 3-5,
                  2012},
  pages        = {947--954},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICUMT.2012.6459796},
  doi          = {10.1109/ICUMT.2012.6459796},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icumt/MazurczykSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-6218,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Influence of Speech Codecs Selection on Transcoding Steganography},
  journal      = {CoRR},
  volume       = {abs/1201.6218},
  year         = {2012},
  url          = {http://arxiv.org/abs/1201.6218},
  eprinttype    = {arXiv},
  eprint       = {1201.6218},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-6218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-5289,
  author       = {Elzbieta Zielinska and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {The Advent of Steganography in Computing Environments},
  journal      = {CoRR},
  volume       = {abs/1202.5289},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.5289},
  eprinttype    = {arXiv},
  eprint       = {1202.5289},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-5289.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-4374,
  author       = {Wojciech Mazurczyk},
  title        = {VoIP Steganography and Its Detection - {A} Survey},
  journal      = {CoRR},
  volume       = {abs/1203.4374},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.4374},
  eprinttype    = {arXiv},
  eprint       = {1203.4374},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-4374.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-0917,
  author       = {J{\'{o}}zef Lubacz and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Principles and Overview of Network Steganography},
  journal      = {CoRR},
  volume       = {abs/1207.0917},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.0917},
  eprinttype    = {arXiv},
  eprint       = {1207.0917},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-0917.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-2861,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Bartosz Jankowski},
  title        = {Towards Steganography Detection Through Network Traffic Visualisation},
  journal      = {CoRR},
  volume       = {abs/1208.2861},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.2861},
  eprinttype    = {arXiv},
  eprint       = {1208.2861},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-2861.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-5888,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Steganalysis of Transcoding Steganography},
  journal      = {CoRR},
  volume       = {abs/1210.5888},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.5888},
  eprinttype    = {arXiv},
  eprint       = {1210.5888},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-5888.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/MazurczykSS11,
  author       = {Wojciech Mazurczyk and
                  Milosz Smolarczyk and
                  Krzysztof Szczypiorski},
  title        = {Retransmission steganography and its detection},
  journal      = {Soft Comput.},
  volume       = {15},
  number       = {3},
  pages        = {505--515},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00500-009-0530-1},
  doi          = {10.1007/S00500-009-0530-1},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/MazurczykSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-4789,
  author       = {Wojciech Fraczek and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Multi-Level Steganography: Improving Hidden Communication in Networks},
  journal      = {CoRR},
  volume       = {abs/1101.4789},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.4789},
  eprinttype    = {arXiv},
  eprint       = {1101.4789},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-4789.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-0023,
  author       = {Wojciech Mazurczyk and
                  J{\'{o}}zef Lubacz and
                  Krzysztof Szczypiorski},
  title        = {On Steganography in Lost Audio Packets},
  journal      = {CoRR},
  volume       = {abs/1102.0023},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.0023},
  eprinttype    = {arXiv},
  eprint       = {1102.0023},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-0422,
  author       = {Bartosz Jankowski and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {PadSteg: Introducing Inter-Protocol Steganography},
  journal      = {CoRR},
  volume       = {abs/1104.0422},
  year         = {2011},
  url          = {http://arxiv.org/abs/1104.0422},
  eprinttype    = {arXiv},
  eprint       = {1104.0422},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1104-0422.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-3333,
  author       = {Wojciech Fraczek and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Hiding Information in a Stream Control Transmission Protocol},
  journal      = {CoRR},
  volume       = {abs/1104.3333},
  year         = {2011},
  url          = {http://arxiv.org/abs/1104.3333},
  eprinttype    = {arXiv},
  eprint       = {1104.3333},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1104-3333.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-4062,
  author       = {Piotr Bialczak and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Sending Hidden Data via Google Suggest},
  journal      = {CoRR},
  volume       = {abs/1107.4062},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.4062},
  eprinttype    = {arXiv},
  eprint       = {1107.4062},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-4062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-4065,
  author       = {Wojciech Fraczek and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {How Hidden Can Be Even More Hidden?},
  journal      = {CoRR},
  volume       = {abs/1107.4065},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.4065},
  eprinttype    = {arXiv},
  eprint       = {1107.4065},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-4065.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-4076,
  author       = {Wojciech Mazurczyk},
  title        = {Lost Audio Packets Steganography: The First Practical Evaluation},
  journal      = {CoRR},
  volume       = {abs/1107.4076},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.4076},
  eprinttype    = {arXiv},
  eprint       = {1107.4076},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-4076.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-4077,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Is Cloud Computing Steganography-proof?},
  journal      = {CoRR},
  volume       = {abs/1107.4077},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.4077},
  eprinttype    = {arXiv},
  eprint       = {1107.4077},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-4077.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-6265,
  author       = {Wojciech Mazurczyk and
                  Pawel Kopiczko},
  title        = {What more can be learnt about BitTorrent from meta-data files and
                  {\(\mu\)}Torrent logs?},
  journal      = {CoRR},
  volume       = {abs/1110.6265},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.6265},
  eprinttype    = {arXiv},
  eprint       = {1110.6265},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-6265.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-1250,
  author       = {Wojciech Mazurczyk and
                  Pawel Szaga and
                  Krzysztof Szczypiorski},
  title        = {Using Transcoding for Hidden Communication in {IP} Telephony},
  journal      = {CoRR},
  volume       = {abs/1111.1250},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.1250},
  eprinttype    = {arXiv},
  eprint       = {1111.1250},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-1250.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/MazurczykL10,
  author       = {Wojciech Mazurczyk and
                  J{\'{o}}zef Lubacz},
  title        = {{LACK} - a VoIP steganographic method},
  journal      = {Telecommun. Syst.},
  volume       = {45},
  number       = {2-3},
  pages        = {153--163},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11235-009-9245-y},
  doi          = {10.1007/S11235-009-9245-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/MazurczykL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-4303,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Krzysztof Szczypiorski},
  title        = {What are suspicious VoIP delays?},
  journal      = {CoRR},
  volume       = {abs/1002.4303},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.4303},
  eprinttype    = {arXiv},
  eprint       = {1002.4303},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-4303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-1925,
  author       = {Bartosz Jankowski and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Information Hiding Using Improper Frame Padding},
  journal      = {CoRR},
  volume       = {abs/1005.1925},
  year         = {2010},
  url          = {http://arxiv.org/abs/1005.1925},
  eprinttype    = {arXiv},
  eprint       = {1005.1925},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1005-1925.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-0247,
  author       = {Wojciech Fraczek and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Stream Control Transmission Protocol Steganography},
  journal      = {CoRR},
  volume       = {abs/1006.0247},
  year         = {2010},
  url          = {http://arxiv.org/abs/1006.0247},
  eprinttype    = {arXiv},
  eprint       = {1006.0247},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1006-0247.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-0495,
  author       = {Krzysztof Szczypiorski and
                  Wojciech Mazurczyk},
  title        = {Hiding Data in {OFDM} Symbols of {IEEE} 802.11 Networks},
  journal      = {CoRR},
  volume       = {abs/1006.0495},
  year         = {2010},
  url          = {http://arxiv.org/abs/1006.0495},
  eprinttype    = {arXiv},
  eprint       = {1006.0495},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1006-0495.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-0767,
  author       = {Wojciech Mazurczyk and
                  Milosz Smolarczyk and
                  Krzysztof Szczypiorski},
  title        = {Retransmission Steganography Applied},
  journal      = {CoRR},
  volume       = {abs/1007.0767},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.0767},
  eprinttype    = {arXiv},
  eprint       = {1007.0767},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-0767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0905-0363,
  author       = {Wojciech Mazurczyk and
                  Milosz Smolarczyk and
                  Krzysztof Szczypiorski},
  title        = {Hiding Information in Retransmissions},
  journal      = {CoRR},
  volume       = {abs/0905.0363},
  year         = {2009},
  url          = {http://arxiv.org/abs/0905.0363},
  eprinttype    = {arXiv},
  eprint       = {0905.0363},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0905-0363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-0313,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Steganography in Handling Oversized {IP} Packets},
  journal      = {CoRR},
  volume       = {abs/0907.0313},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.0313},
  eprinttype    = {arXiv},
  eprint       = {0907.0313},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-0313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/CiszkowskiEFKLM08,
  author       = {Tomasz Ciszkowski and
                  Charlott Eliasson and
                  Markus Fiedler and
                  Zbigniew Kotulski and
                  Radu Lupu and
                  Wojciech Mazurczyk},
  title        = {SecMon: end-to-end quality and security monitoring system},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {8},
  number       = {1},
  pages        = {185--201},
  year         = {2008},
  url          = {https://doi.org/10.2478/v10065-008-0018-0},
  doi          = {10.2478/V10065-008-0018-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/CiszkowskiEFKLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/MazurczykS08,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Steganography of VoIP Streams},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008
                  Confederated International Conferences, CoopIS, DOA, GADA, IS, and
                  {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5332},
  pages        = {1001--1018},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88873-4\_6},
  doi          = {10.1007/978-3-540-88873-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/MazurczykS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/SzczypiorskiMMCR08,
  author       = {Krzysztof Szczypiorski and
                  Igor Margasinski and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Pawel Radziszewski},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {TrustMAS: Trusted Communication Platform for Multi-Agent Systems},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008
                  Confederated International Conferences, CoopIS, DOA, GADA, IS, and
                  {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5332},
  pages        = {1019--1035},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88873-4\_7},
  doi          = {10.1007/978-3-540-88873-4\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/SzczypiorskiMMCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0804-0134,
  author       = {Tomasz Ciszkowski and
                  Charlott Eliasson and
                  Markus Fiedler and
                  Zbigniew Kotulski and
                  Radu Lupu and
                  Wojciech Mazurczyk},
  title        = {SecMon: End-to-End Quality and Security Monitoring System},
  journal      = {CoRR},
  volume       = {abs/0804.0134},
  year         = {2008},
  url          = {http://arxiv.org/abs/0804.0134},
  eprinttype    = {arXiv},
  eprint       = {0804.0134},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0804-0134.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0805-2938,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Steganography of VoIP streams},
  journal      = {CoRR},
  volume       = {abs/0805.2938},
  year         = {2008},
  url          = {http://arxiv.org/abs/0805.2938},
  eprinttype    = {arXiv},
  eprint       = {0805.2938},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0805-2938.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0805-3538,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {Covert Channels in {SIP} for VoIP signalling},
  journal      = {CoRR},
  volume       = {abs/0805.3538},
  year         = {2008},
  url          = {http://arxiv.org/abs/0805.3538},
  eprinttype    = {arXiv},
  eprint       = {0805.3538},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0805-3538.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0806-0576,
  author       = {Krzysztof Szczypiorski and
                  Igor Margasinski and
                  Wojciech Mazurczyk},
  title        = {Steganographic Routing in Multi Agent System Environment},
  journal      = {CoRR},
  volume       = {abs/0806.0576},
  year         = {2008},
  url          = {http://arxiv.org/abs/0806.0576},
  eprinttype    = {arXiv},
  eprint       = {0806.0576},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0806-0576.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0806-1034,
  author       = {Wojciech Mazurczyk and
                  J{\'{o}}zef Lubacz},
  title        = {Analysis of a procedure for inserting steganographic data into VoIP
                  calls},
  journal      = {CoRR},
  volume       = {abs/0806.1034},
  year         = {2008},
  url          = {http://arxiv.org/abs/0806.1034},
  eprinttype    = {arXiv},
  eprint       = {0806.1034},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0806-1034.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-4060,
  author       = {Krzysztof Szczypiorski and
                  Igor Margasinski and
                  Wojciech Mazurczyk and
                  Krzysztof Cabaj and
                  Pawel Radziszewski},
  title        = {TrustMAS: Trusted Communication Platform for Multi-Agent Systems},
  journal      = {CoRR},
  volume       = {abs/0808.4060},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.4060},
  eprinttype    = {arXiv},
  eprint       = {0808.4060},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-4060.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0811-4138,
  author       = {Wojciech Mazurczyk and
                  J{\'{o}}zef Lubacz},
  title        = {{LACK} - a VoIP Steganographic Method},
  journal      = {CoRR},
  volume       = {abs/0811.4138},
  year         = {2008},
  url          = {http://arxiv.org/abs/0811.4138},
  eprinttype    = {arXiv},
  eprint       = {0811.4138},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0811-4138.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/MazurczykK07,
  author       = {Wojciech Mazurczyk and
                  Zbigniew Kotulski},
  editor       = {Jerzy Pejas and
                  Khalid Saeed},
  title        = {Covert Channel for Improving VoIP Security},
  booktitle    = {Advances in Information Processing and Protection},
  pages        = {271--280},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73137-7\_24},
  doi          = {10.1007/978-0-387-73137-7\_24},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/07/MazurczykK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/MazurczykK06,
  author       = {Wojciech Mazurczyk and
                  Zbigniew Kotulski},
  title        = {New security and control protocol for VoIP based on steganography
                  and digital watermarking},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {5},
  number       = {1},
  pages        = {417--426},
  year         = {2006},
  url          = {https://journals.umcs.pl/ai/article/view/3110},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/umcs/MazurczykK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/MazurczykK06,
  author       = {Wojciech Mazurczyk and
                  Zbigniew Kotulski},
  editor       = {Janusz G{\'{o}}rski},
  title        = {New VoIP Traffic Security Scheme with Digital Watermarking},
  booktitle    = {Computer Safety, Reliability, and Security, 25th International Conference,
                  {SAFECOMP} 2006, Gdansk, Poland, September 27-29, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4166},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11875567\_13},
  doi          = {10.1007/11875567\_13},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/MazurczykK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0602042,
  author       = {Wojciech Mazurczyk and
                  Zbigniew Kotulski},
  title        = {New security and control protocol for VoIP based on steganography
                  and digital watermarking},
  journal      = {CoRR},
  volume       = {abs/cs/0602042},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0602042},
  eprinttype    = {arXiv},
  eprint       = {cs/0602042},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0602042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0612054,
  author       = {Wojciech Mazurczyk and
                  Zbigniew Kotulski},
  title        = {Lightweight security mechanism for PSTN-VoIP cooperation},
  journal      = {CoRR},
  volume       = {abs/cs/0612054},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0612054},
  eprinttype    = {arXiv},
  eprint       = {cs/0612054},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0612054.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0506076,
  author       = {Wojciech Mazurczyk and
                  Zbigniew Kotulski},
  title        = {Alternative security architecture for {IP} Telephony based on digital
                  watermarking},
  journal      = {CoRR},
  volume       = {abs/cs/0506076},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0506076},
  eprinttype    = {arXiv},
  eprint       = {cs/0506076},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0506076.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics