Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wojciech Mazurczyk
@article{DBLP:journals/access/MalanowskaMAMK24, author = {Agnieszka Malanowska and Wojciech Mazurczyk and Tanya Koohpayeh Araghi and David Meg{\'{\i}}as and Minoru Kuribayashi}, title = {Digital Watermarking - {A} Meta-Survey and Techniques for Fake News Detection}, journal = {{IEEE} Access}, volume = {12}, pages = {36311--36345}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3374201}, doi = {10.1109/ACCESS.2024.3374201}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MalanowskaMAMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MazurczykLV24, author = {Wojciech Mazurczyk and Dongwon Lee and Andreas Vlachos}, title = {Disinformation 2.0 in the Age of {AI:} {A} Cybersecurity Perspective}, journal = {Commun. {ACM}}, volume = {67}, number = {3}, pages = {36--39}, year = {2024}, url = {https://doi.org/10.1145/3624721}, doi = {10.1145/3624721}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MazurczykLV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SunTMCQC23, author = {Congcong Sun and Hui Tian and Wojciech Mazurczyk and Chin{-}Chen Chang and Hanyu Quan and Yonghong Chen}, title = {Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning}, journal = {Comput. Electr. Eng.}, volume = {111}, number = {Part {A}}, pages = {108909}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108909}, doi = {10.1016/J.COMPELECENG.2023.108909}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/SunTMCQC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ZorawskiCM23, author = {Piotr Z{\'{o}}rawski and Luca Caviglione and Wojciech Mazurczyk}, title = {A Long-Term Perspective of the Internet Susceptibility to Covert Channels}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {10}, pages = {171--177}, year = {2023}, url = {https://doi.org/10.1109/MCOM.011.2200744}, doi = {10.1109/MCOM.011.2200744}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/ZorawskiCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KowalskiM23, author = {Mikolaj Kowalski and Wojciech Mazurczyk}, title = {Toward the mutual routing security in wide area networks: {A} scoping review of current threats and countermeasures}, journal = {Comput. Networks}, volume = {230}, pages = {109778}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109778}, doi = {10.1016/J.COMNET.2023.109778}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KowalskiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhvanooeyZOMMCL23, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Shiyan Ou and Hassan Dana Mazraeh and Wojciech Mazurczyk and Kim{-}Kwang Raymond Choo and Chuan Li}, title = {AFPr-AM: {A} novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms}, journal = {Comput. Secur.}, volume = {130}, pages = {103263}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103263}, doi = {10.1016/J.COSE.2023.103263}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhvanooeyZOMMCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WendzelCM23, author = {Steffen Wendzel and Luca Caviglione and Wojciech Mazurczyk}, title = {Avoiding Research Tribal Wars Using Taxonomies}, journal = {Computer}, volume = {56}, number = {1}, pages = {93--96}, year = {2023}, url = {https://doi.org/10.1109/MC.2022.3218175}, doi = {10.1109/MC.2022.3218175}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/WendzelCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KozikMCPPC23, author = {Rafal Kozik and Wojciech Mazurczyk and Krzysztof Cabaj and Aleksandra Pawlicka and Marek Pawlicki and Michal Choras}, title = {Deep Learning for Combating Misinformation in Multicategorical Text Contents}, journal = {Sensors}, volume = {23}, number = {24}, pages = {9666}, year = {2023}, url = {https://doi.org/10.3390/s23249666}, doi = {10.3390/S23249666}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KozikMCPPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taslp/TianQMLQ23, author = {Hui Tian and Yiqin Qiu and Wojciech Mazurczyk and Haizhou Li and Zhenxing Qian}, title = {{STFF-SM:} Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams}, journal = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.}, volume = {31}, pages = {277--289}, year = {2023}, url = {https://doi.org/10.1109/TASLP.2022.3224295}, doi = {10.1109/TASLP.2022.3224295}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taslp/TianQMLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Rajba0M23, author = {Pawel Rajba and J{\"{o}}rg Keller and Wojciech Mazurczyk}, title = {Proof-of-work based new encoding scheme for information hiding purposes}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {45:1--45:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605085}, doi = {10.1145/3600160.3605085}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Rajba0M23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OrzechowskiRSCM23, author = {Natan Orzechowski and Karol Rzepka and Przemyslaw Szary and Krzysztof Cabaj and Wojciech Mazurczyk and Helen C. Leligou and Marcin Przybyszewski and Rafal Kozik and Michal Choras}, title = {Security Architecture in the {SILVANUS} project}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {49:1--49:9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605082}, doi = {10.1145/3600160.3605082}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/OrzechowskiRSCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsaa/KozikMCPPC23, author = {Rafal Kozik and Wojciech Mazurczyk and Krzysztof Cabaj and Aleksandra Pawlicka and Marek Pawlicki and Michal Choras}, title = {Combating Disinformation with Holistic Architecture, Neuro-symbolic {AI} and {NLU} Models}, booktitle = {10th {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2023, Thessaloniki, Greece, October 9-13, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSAA60987.2023.10302543}, doi = {10.1109/DSAA60987.2023.10302543}, timestamp = {Thu, 16 Nov 2023 09:03:43 +0100}, biburl = {https://dblp.org/rec/conf/dsaa/KozikMCPPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BialczakM23, author = {Piotr Bialczak and Wojciech Mazurczyk}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Malware Classification Using Open Set Recognition and {HTTP} Protocol Requests}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {235--254}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_12}, doi = {10.1007/978-3-031-51476-0\_12}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BialczakM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05569, author = {Wojciech Mazurczyk and Dongwon Lee and Andreas Vlachos}, title = {Disinformation 2.0 in the Age of {AI:} {A} Cybersecurity Perspective}, journal = {CoRR}, volume = {abs/2306.05569}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05569}, doi = {10.48550/ARXIV.2306.05569}, eprinttype = {arXiv}, eprint = {2306.05569}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05569.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SzaryMWC22, author = {Przemyslaw Szary and Wojciech Mazurczyk and Steffen Wendzel and Luca Caviglione}, title = {Analysis of Reversible Network Covert Channels}, journal = {{IEEE} Access}, volume = {10}, pages = {41226--41238}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3168018}, doi = {10.1109/ACCESS.2022.3168018}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SzaryMWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AhvanooeyZMB22, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Wojciech Mazurczyk and Malika Bendechache}, title = {Information Hiding in Digital Textual Contents: Techniques and Current Challenges}, journal = {Computer}, volume = {55}, number = {6}, pages = {56--65}, year = {2022}, url = {https://doi.org/10.1109/MC.2021.3113922}, doi = {10.1109/MC.2021.3113922}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AhvanooeyZMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WendzelMCH22, author = {Steffen Wendzel and Wojciech Mazurczyk and Luca Caviglione and Amir Houmansadr}, title = {Emerging topics in defending networked systems}, journal = {Future Gener. Comput. Syst.}, volume = {128}, pages = {317--319}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.10.010}, doi = {10.1016/J.FUTURE.2021.10.010}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/WendzelMCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CaviglioneM22, author = {Luca Caviglione and Wojciech Mazurczyk}, title = {Never Mind the Malware, Here's the Stegomalware}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {5}, pages = {101--106}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3178205}, doi = {10.1109/MSEC.2022.3178205}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CaviglioneM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/SunTMCCC22, author = {Congcong Sun and Hui Tian and Wojciech Mazurczyk and Chin{-}Chen Chang and Yiqiao Cai and Yonghong Chen}, title = {Towards blind detection of steganography in low-bit-rate speech streams}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {12085--12112}, year = {2022}, url = {https://doi.org/10.1002/int.23077}, doi = {10.1002/INT.23077}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/SunTMCCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AhvanooeyZLMCGC22, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Qianmu Li and Wojciech Mazurczyk and Kim{-}Kwang Raymond Choo and Brij Bhooshan Gupta and Mauro Conti}, title = {Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {10}, pages = {7639--7663}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3138073}, doi = {10.1109/JIOT.2021.3138073}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AhvanooeyZLMCGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/LvMSSM22, author = {Zhihan Lv and Jaime Lloret Mauri and Houbing Song and Jun Shen and Wojciech Mazurczyk}, title = {Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things}, journal = {{IEEE} Internet Things Mag.}, volume = {5}, number = {1}, pages = {58--60}, year = {2022}, url = {https://doi.org/10.1109/MIOT.2022.9773087}, doi = {10.1109/MIOT.2022.9773087}, timestamp = {Fri, 24 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/LvMSSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/LvLSSM22, author = {Zhihan Lv and Jaime Lloret and Houbing Song and Jun Shen and Wojciech Mazurczyk}, title = {Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things: Part 2}, journal = {{IEEE} Internet Things Mag.}, volume = {5}, number = {2}, pages = {46--49}, year = {2022}, url = {https://doi.org/10.1109/MIOT.2022.9889289}, doi = {10.1109/MIOT.2022.9889289}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotm/LvLSSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiuTTMC22, author = {Yiqin Qiu and Hui Tian and Lili Tang and Wojciech Mazurczyk and Chin{-}Chen Chang}, title = {Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103250}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103250}, doi = {10.1016/J.JISA.2022.103250}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiuTTMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhvanooeyZMLKCC22, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Wojciech Mazurczyk and Qianmu Li and Max Kilger and Kim{-}Kwang Raymond Choo and Mauro Conti}, title = {CovertSYS: {A} systematic covert communication approach for providing secure end-to-end conversation via social networks}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103368}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103368}, doi = {10.1016/J.JISA.2022.103368}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhvanooeyZMLKCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/WendzelCMLM22, author = {Steffen Wendzel and Luca Caviglione and Aleksandra Mileva and Jean{-}Fran{\c{c}}ois Lalande and Wojciech Mazurczyk}, title = {Guest editorial: Information security methodology and replication studies}, journal = {it Inf. Technol.}, volume = {64}, number = {1-2}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.1515/itit-2022-0016}, doi = {10.1515/ITIT-2022-0016}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/WendzelCMLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/AhvanooeyZMCCZ22, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Wojciech Mazurczyk and Kim{-}Kwang Raymond Choo and Mauro Conti and Jing Zhang}, title = {Misinformation Detection on Social Media: Challenges and the Road Ahead}, journal = {{IT} Prof.}, volume = {24}, number = {1}, pages = {34--40}, year = {2022}, url = {https://doi.org/10.1109/MITP.2021.3120876}, doi = {10.1109/MITP.2021.3120876}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/AhvanooeyZMCCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NilizadehNMZL22, author = {Amirfarhad Nilizadeh and Shirin Nilizadeh and Wojciech Mazurczyk and Cliff C. Zou and Gary T. Leavens}, title = {Adaptive Matrix Pattern Steganography on {RGB} Images}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {1}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1111}, doi = {10.13052/JCSM2245-1439.1111}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NilizadehNMZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MegiasKRCM22, author = {David Meg{\'{\i}}as and Minoru Kuribayashi and Andrea Rosales and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {33--55}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.033}, doi = {10.22667/JOWUA.2022.03.31.033}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MegiasKRCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/CaviglioneSZM22, author = {Luca Caviglione and Andreas Schaffhauser and Marco Zuppelli and Wojciech Mazurczyk}, title = {IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration}, journal = {SoftwareX}, volume = {17}, pages = {100975}, year = {2022}, url = {https://doi.org/10.1016/j.softx.2022.100975}, doi = {10.1016/J.SOFTX.2022.100975}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/CaviglioneSZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ZuppelliRSMC22, author = {Marco Zuppelli and Matteo Repetto and Andreas Schaffhauser and Wojciech Mazurczyk and Luca Caviglione}, title = {Code Layering for the Detection of Network Covert Channels in Agentless Systems}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {3}, pages = {2282--2294}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3176752}, doi = {10.1109/TNSM.2022.3176752}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ZuppelliRSMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CaviglioneGGMZS22, author = {Luca Caviglione and Martin Grabowski and Kai Gutberlet and Adrian Marzecki and Marco Zuppelli and Andreas Schaffhauser and Wojciech Mazurczyk}, title = {Detection of Malicious Images in Production-Quality Scenarios with the {SIMARGL} Toolkit}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {46:1--46:7}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544469}, doi = {10.1145/3538969.3544469}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CaviglioneGGMZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KowalczykMMC22, author = {Marcin Kowalczyk and Agnieszka Malanowska and Wojciech Mazurczyk and Krzysztof Cabaj}, title = {Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {47:1--47:9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544471}, doi = {10.1145/3538969.3544471}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KowalczykMMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RajbaM22, author = {Pawel Rajba and Wojciech Mazurczyk}, title = {Limitations of Web Cryptojacking Detection: {A} Practical Evaluation}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {52:1--52:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544466}, doi = {10.1145/3538969.3544466}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/RajbaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RzepkaSCM22, author = {Karol Rzepka and Przemyslaw Szary and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Performance Evaluation of {DTLS} Implementations on {RIOT} {OS} for Internet of Things Applications}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {64:1--64:9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544470}, doi = {10.1145/3538969.3544470}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/RzepkaSCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaviglioneCCJMP21, author = {Luca Caviglione and Michal Choras and Igino Corona and Artur Janicki and Wojciech Mazurczyk and Marek Pawlicki and Katarzyna Wasielewska}, title = {Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection}, journal = {{IEEE} Access}, volume = {9}, pages = {5371--5396}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3048319}, doi = {10.1109/ACCESS.2020.3048319}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CaviglioneCCJMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RajbaM21, author = {Pawel Rajba and Wojciech Mazurczyk}, title = {Information Hiding Using Minification}, journal = {{IEEE} Access}, volume = {9}, pages = {66436--66449}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3077197}, doi = {10.1109/ACCESS.2021.3077197}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RajbaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SiewrukM21, author = {Grzegorz Siewruk and Wojciech Mazurczyk}, title = {Context-Aware Software Vulnerability Classification Using Machine Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {88852--88867}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3075385}, doi = {10.1109/ACCESS.2021.3075385}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SiewrukM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/LakaKM21, author = {Pawel Laka and Zbigniew Korzeb and Wojciech Mazurczyk}, title = {Novel user authentication method based on body composition analysis}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {76}, number = {3-4}, pages = {175--185}, year = {2021}, url = {https://doi.org/10.1007/s12243-020-00779-y}, doi = {10.1007/S12243-020-00779-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/LakaKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MazurczykC21, author = {Wojciech Mazurczyk and Luca Caviglione}, title = {Cyber reconnaissance techniques}, journal = {Commun. {ACM}}, volume = {64}, number = {3}, pages = {86--95}, year = {2021}, url = {https://doi.org/10.1145/3418293}, doi = {10.1145/3418293}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/MazurczykC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaviglioneMRSZ21, author = {Luca Caviglione and Wojciech Mazurczyk and Matteo Repetto and Andreas Schaffhauser and Marco Zuppelli}, title = {Kernel-level tracing for detecting stegomalware and covert channels in Linux environments}, journal = {Comput. Networks}, volume = {191}, pages = {108010}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108010}, doi = {10.1016/J.COMNET.2021.108010}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CaviglioneMRSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MilevaVHWM21, author = {Aleksandra Mileva and Aleksandar Velinov and Laura Hartmann and Steffen Wendzel and Wojciech Mazurczyk}, title = {Comprehensive analysis of {MQTT} 5.0 susceptibility to network covert channels}, journal = {Comput. Secur.}, volume = {104}, pages = {102207}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102207}, doi = {10.1016/J.COSE.2021.102207}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MilevaVHWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/BialczakM21, author = {Piotr Bialczak and Wojciech Mazurczyk}, title = {Hfinger: Malware {HTTP} Request Fingerprinting}, journal = {Entropy}, volume = {23}, number = {5}, pages = {507}, year = {2021}, url = {https://doi.org/10.3390/e23050507}, doi = {10.3390/E23050507}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/BialczakM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NowakowskiZCM21, author = {Piotr Nowakowski and Piotr Z{\'{o}}rawski and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {20--43}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.020}, doi = {10.22667/JOWUA.2021.03.31.020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NowakowskiZCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShiZSVMCMACZ21, author = {Dayu Shi and Xun Zhang and Lina Shi and Andrei Vladimirescu and Wojciech Mazurczyk and Krzysztof Cabaj and Ben Meunier and Kareem Ali and John Cosmas and Yue Zhang}, title = {On Improving 5G Internet of Radio Light Security Based on {LED} Fingerprint Identification Method}, journal = {Sensors}, volume = {21}, number = {4}, pages = {1515}, year = {2021}, url = {https://doi.org/10.3390/s21041515}, doi = {10.3390/S21041515}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ShiZSVMCMACZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MegiasKRM21, author = {David Meg{\'{\i}}as and Minoru Kuribayashi and Andrea Rosales and Wojciech Mazurczyk}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {{DISSIMILAR:} Towards fake news detection using information hiding, signal processing and machine learning}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {66:1--66:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470088}, doi = {10.1145/3465481.3470088}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MegiasKRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WendzelCMMDKLVH21, author = {Steffen Wendzel and Luca Caviglione and Wojciech Mazurczyk and Aleksandra Mileva and Jana Dittmann and Christian Kr{\"{a}}tzer and Kevin Lamsh{\"{o}}ft and Claus Vielhauer and Laura Hartmann and J{\"{o}}rg Keller and Tom Neubert}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {A Revised Taxonomy of Steganography Embedding Patterns}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {67:1--67:12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470069}, doi = {10.1145/3465481.3470069}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/WendzelCMMDKLVH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NowakowskiZCM21, author = {Piotr Nowakowski and Piotr Z{\'{o}}rawski and Krzysztof Cabaj and Wojciech Mazurczyk}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {73:1--73:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470087}, doi = {10.1145/3465481.3470087}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NowakowskiZCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RajbaM21, author = {Pawel Rajba and Wojciech Mazurczyk}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Data Hiding Using Code Obfuscation}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {75:1--75:10}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470086}, doi = {10.1145/3465481.3470086}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/RajbaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/HospitalMM21, author = {Javier Hospital and David Meg{\'{\i}}as and Wojciech Mazurczyk}, editor = {Martin Gilje Jaatun and Geir M. K{\o}ien and Oksana Kulyk}, title = {Retransmission steganography in real-world scenarios: a practical study}, booktitle = {{EICC} '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021}, pages = {60--65}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487405.3487659}, doi = {10.1145/3487405.3487659}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eicc/HospitalMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AhvanooeyZMKC21, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Wojciech Mazurczyk and Max Kilger and Kim{-}Kwang Raymond Choo}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Do Dark Web and Cryptocurrencies Empower Cybercriminals?}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {277--293}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_17}, doi = {10.1007/978-3-031-06365-7\_17}, timestamp = {Fri, 19 Apr 2024 14:54:06 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AhvanooeyZMKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChouribWM21, author = {Mehdi Chourib and Steffen Wendzel and Wojciech Mazurczyk}, title = {Adaptive Warden Strategy for Countering Network Covert Storage Channels}, booktitle = {46th {IEEE} Conference on Local Computer Networks, {LCN} 2021, Edmonton, AB, Canada, October 4-7, 2021}, pages = {148--153}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/LCN52139.2021.9524939}, doi = {10.1109/LCN52139.2021.9524939}, timestamp = {Tue, 16 Aug 2022 23:04:40 +0200}, biburl = {https://dblp.org/rec/conf/lcn/ChouribWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/CaviglioneZMSR21, author = {Luca Caviglione and Marco Zuppelli and Wojciech Mazurczyk and Andreas Schaffhauser and Matteo Repetto}, editor = {Kohei Shiomoto and Young{-}Tak Kim and Christian Esteve Rothenberg and Barbara Martini and Eiji Oki and Baek{-}Young Choi and Noriaki Kamiyama and Stefano Secci}, title = {Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label}, booktitle = {7th {IEEE} International Conference on Network Softwarization, NetSoft 2021, Tokyo, Japan, June 28 - July 2, 2021}, pages = {450--456}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NetSoft51509.2021.9492661}, doi = {10.1109/NETSOFT51509.2021.9492661}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/CaviglioneZMSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GregorczykM21, author = {Marcin Gregorczyk and Wojciech Mazurczyk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Inferring Flow Table State through Active Fingerprinting in {SDN} Environments: {A} Practical Approach}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {576--586}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010573905760586}, doi = {10.5220/0010573905760586}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GregorczykM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-00433, author = {Wojciech Mazurczyk and Steffen Wendzel and Mehdi Chourib and J{\"{o}}rg Keller}, title = {Countering Adaptive Network Covert Communication with Dynamic Wardens}, journal = {CoRR}, volume = {abs/2103.00433}, year = {2021}, url = {https://arxiv.org/abs/2103.00433}, eprinttype = {arXiv}, eprint = {2103.00433}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-00433.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08654, author = {Steffen Wendzel and Luca Caviglione and Wojciech Mazurczyk and Aleksandra Mileva and Jana Dittmann and Christian Kr{\"{a}}tzer and Kevin Lamsh{\"{o}}ft and Claus Vielhauer and Laura Hartmann and J{\"{o}}rg Keller and Tom Neubert}, title = {A Revised Taxonomy of Steganography Embedding Patterns}, journal = {CoRR}, volume = {abs/2106.08654}, year = {2021}, url = {https://arxiv.org/abs/2106.08654}, eprinttype = {arXiv}, eprint = {2106.08654}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08654.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03310, author = {Mehdi Chourib and Steffen Wendzel and Wojciech Mazurczyk}, title = {Adaptive Warden Strategy for Countering Network Covert Storage Channels}, journal = {CoRR}, volume = {abs/2111.03310}, year = {2021}, url = {https://arxiv.org/abs/2111.03310}, eprinttype = {arXiv}, eprint = {2111.03310}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03310.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SkowronJM20, author = {Monika Skowron and Artur Janicki and Wojciech Mazurczyk}, title = {Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning}, journal = {{IEEE} Access}, volume = {8}, pages = {20386--20400}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2969015}, doi = {10.1109/ACCESS.2020.2969015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SkowronJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/El-LatifAVEPBSM20, author = {Ahmed A. Abd El{-}Latif and Bassem Abd{-}El{-}Atty and Salvador E. Venegas{-}Andraca and Haitham Elwahsh and Md. Jalil Piran and Ali Kashif Bashir and Oh{-}Young Song and Wojciech Mazurczyk}, title = {Providing End-to-End Security Using Quantum Walks in IoT Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {92687--92696}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2992820}, doi = {10.1109/ACCESS.2020.2992820}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/El-LatifAVEPBSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GregorczykZNCM20, author = {Marcin Gregorczyk and Piotr Z{\'{o}}rawski and Piotr Nowakowski and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Sniffing Detection Based on Network Traffic Probing and Machine Learning}, journal = {{IEEE} Access}, volume = {8}, pages = {149255--149269}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3016076}, doi = {10.1109/ACCESS.2020.3016076}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GregorczykZNCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP20, author = {Tom Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {58}, number = {3}, pages = {54}, year = {2020}, url = {https://doi.org/10.1109/MCOM.2020.9040263}, doi = {10.1109/MCOM.2020.9040263}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP20a, author = {Tom Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {58}, number = {5}, pages = {48}, year = {2020}, url = {https://doi.org/10.1109/MCOM.2020.9112741}, doi = {10.1109/MCOM.2020.9112741}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP20b, author = {Thomas Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {58}, number = {7}, pages = {12}, year = {2020}, url = {https://doi.org/10.1109/MCOM.2020.9161987}, doi = {10.1109/MCOM.2020.9161987}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CabajZNPM20, author = {Krzysztof Cabaj and Piotr Z{\'{o}}rawski and Piotr Nowakowski and Maciej Purski and Wojciech Mazurczyk}, title = {Efficient distributed network covert channels for Internet of things environments{\textdagger}}, journal = {J. Cybersecur.}, volume = {6}, number = {1}, year = {2020}, url = {https://doi.org/10.1093/cybsec/tyaa018}, doi = {10.1093/CYBSEC/TYAA018}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/CabajZNPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MazurczykBJNC20, author = {Wojciech Mazurczyk and Pascal Bisson and Roger Piqueras Jover and Koji Nakao and Krzysztof Cabaj}, title = {Special issue on Advancements in 5G Networks Security}, journal = {Future Gener. Comput. Syst.}, volume = {110}, pages = {314--316}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.04.043}, doi = {10.1016/J.FUTURE.2020.04.043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/MazurczykBJNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SaengerMKC20, author = {Jens Saenger and Wojciech Mazurczyk and J{\"{o}}rg Keller and Luca Caviglione}, title = {VoIP network covert channels to enhance privacy and information sharing}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {96--106}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.04.032}, doi = {10.1016/J.FUTURE.2020.04.032}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/SaengerMKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NowaczewskiM20, author = {Slawomir Nowaczewski and Wojciech Mazurczyk}, title = {Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and {DNSSEC}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {87--106}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.087}, doi = {10.22667/JOWUA.2020.09.30.087}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/NowaczewskiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/WendzelCCMLM20, author = {Steffen Wendzel and Luca Caviglione and Alessandro Checco and Aleksandra Mileva and Jean{-}Fran{\c{c}}ois Lalande and Wojciech Mazurczyk}, title = {Information Security Methodology, Replication Studies and Information Security Education}, journal = {J. Univers. Comput. Sci.}, volume = {26}, number = {7}, pages = {762--763}, year = {2020}, url = {http://www.jucs.org/jucs\_26\_7/information\_security\_ethodology\_replication}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/WendzelCCMLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BialczakM20, author = {Piotr Bialczak and Wojciech Mazurczyk}, title = {Characterizing Anomalies in Malware-Generated {HTTP} Traffic}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8848863:1--8848863:26}, year = {2020}, url = {https://doi.org/10.1155/2020/8848863}, doi = {10.1155/2020/8848863}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/BialczakM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/El-LatifAMFV20, author = {Ahmed A. Abd El{-}Latif and Bassem Abd{-}El{-}Atty and Wojciech Mazurczyk and Carol J. Fung and Salvador E. Venegas{-}Andraca}, title = {Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {1}, pages = {118--131}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2020.2969863}, doi = {10.1109/TNSM.2020.2969863}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/El-LatifAMFV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/MazurczykBJNC20, author = {Wojciech Mazurczyk and Pascal Bisson and Roger Piqueras Jover and Koji Nakao and Krzysztof Cabaj}, title = {Challenges and Novel Solutions for 5G Network Security, Privacy and Trust}, journal = {{IEEE} Wirel. Commun.}, volume = {27}, number = {4}, pages = {6--7}, year = {2020}, url = {https://doi.org/10.1109/MWC.2020.9170261}, doi = {10.1109/MWC.2020.9170261}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/MazurczykBJNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SzaryMWC20, author = {Przemyslaw Szary and Wojciech Mazurczyk and Steffen Wendzel and Luca Caviglione}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Design and performance evaluation of reversible network covert channels}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {68:1--68:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409215}, doi = {10.1145/3407023.3409215}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SzaryMWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NowakowskiZCM20, author = {Piotr Nowakowski and Piotr Z{\'{o}}rawski and Krzysztof Cabaj and Wojciech Mazurczyk}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {69:1--69:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409217}, doi = {10.1145/3407023.3409217}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NowakowskiZCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RajbaM20, author = {Pawel Rajba and Wojciech Mazurczyk}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Exploiting minification for data hiding purposes}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {72:1--72:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409209}, doi = {10.1145/3407023.3409209}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/RajbaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NowakowskiZCGPM20, author = {Piotr Nowakowski and Piotr Z{\'{o}}rawski and Krzysztof Cabaj and Marcin Gregorczyk and Maciej Purski and Wojciech Mazurczyk}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Distributed packet inspection for network security purposes in software-defined networking environments}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {106:1--106:7}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409210}, doi = {10.1145/3407023.3409210}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NowakowskiZCGPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/CosmasJAM00GMCL20, author = {John Cosmas and Nawar Jawad and Kareem Ali and Ben Meunier and Yue Zhang and Wei Li and Marcin Gregorczyk and Wojciech Mazurczyk and Krzysztof Cabaj and Mathias Lacaud and Daniel N{\'{e}}gru and Sara Cuerva Navas and Ignacio Losas Davila and Charilaos C. Zarakovitis and Harilaos Koumaras and Michail{-}Alexandros Kourtis}, title = {Network and Application Layer Services for High Performance Communications in Buildings}, booktitle = {{IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2020, Paris, France, October 27-29, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BMSB49480.2020.9379769}, doi = {10.1109/BMSB49480.2020.9379769}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bmsb/CosmasJAM00GMCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/HeinzMC20, author = {Corinna Heinz and Wojciech Mazurczyk and Luca Caviglione}, editor = {Luca Caviglione and Aleksandra Mileva and Steffen Wendzel}, title = {Covert Channels in Transport Layer Security}, booktitle = {{EICC} 2020: European Interdisciplinary Cybersecurity Conference, Rennes, France, November 18, 2020}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3424954.3424962}, doi = {10.1145/3424954.3424962}, timestamp = {Wed, 01 Dec 2021 19:21:14 +0100}, biburl = {https://dblp.org/rec/conf/eicc/HeinzMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KorczynskiMC20, author = {Maciej Korczynski and Wojciech Mazurczyk and Pedro Casas}, title = {Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {521}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00076}, doi = {10.1109/EUROSPW51379.2020.00076}, timestamp = {Thu, 29 Oct 2020 11:34:40 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KorczynskiMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/VelinovMWM19, author = {Aleksandar Velinov and Aleksandra Mileva and Steffen Wendzel and Wojciech Mazurczyk}, title = {Covert Channels in the MQTT-Based Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {161899--161915}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2951425}, doi = {10.1109/ACCESS.2019.2951425}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/VelinovMWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP19, author = {Thomas Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {57}, number = {1}, pages = {42}, year = {2019}, url = {https://doi.org/10.1109/MCOM.2019.8613272}, doi = {10.1109/MCOM.2019.8613272}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP19a, author = {Tom Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {57}, number = {4}, pages = {94}, year = {2019}, url = {https://doi.org/10.1109/MCOM.2019.8703472}, doi = {10.1109/MCOM.2019.8703472}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP19b, author = {Thomas Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {57}, number = {9}, pages = {112}, year = {2019}, url = {https://doi.org/10.1109/MCOM.2019.8847237}, doi = {10.1109/MCOM.2019.8847237}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderMMP19c, author = {Tom Alexander and Wojciech Mazurczyk and Amitabh Mishra and Alberto Perotti}, title = {Mobile Communications and Networks}, journal = {{IEEE} Commun. Mag.}, volume = {57}, number = {12}, pages = {37}, year = {2019}, url = {https://doi.org/10.1109/MCOM.2019.8930823}, doi = {10.1109/MCOM.2019.8930823}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderMMP19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OpasiakM19, author = {Krzysztof Opasiak and Wojciech Mazurczyk}, title = {(In)Secure Android Debugging: Security analysis and lessons learned}, journal = {Comput. Secur.}, volume = {82}, pages = {80--98}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.12.010}, doi = {10.1016/J.COSE.2018.12.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OpasiakM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MazurczykWCK19, author = {Wojciech Mazurczyk and Steffen Wendzel and Mehdi Chourib and J{\"{o}}rg Keller}, title = {Countering adaptive network covert communication with dynamic wardens}, journal = {Future Gener. Comput. Syst.}, volume = {94}, pages = {712--725}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.12.047}, doi = {10.1016/J.FUTURE.2018.12.047}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/MazurczykWCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/El-LatifAVM19, author = {Ahmed A. Abd El{-}Latif and Bassem Abd{-}El{-}Atty and Salvador E. Venegas{-}Andraca and Wojciech Mazurczyk}, title = {Efficient quantum-based security protocols for information sharing and data protection in 5G networks}, journal = {Future Gener. Comput. Syst.}, volume = {100}, pages = {893--906}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.05.053}, doi = {10.1016/J.FUTURE.2019.05.053}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/El-LatifAVM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MazurczykCW19, author = {Wojciech Mazurczyk and Luca Caviglione and Steffen Wendzel}, title = {Recent Advancements in Digital Forensics, Part 2}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {7--8}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2896857}, doi = {10.1109/MSEC.2019.2896857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MazurczykCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/JanickiMLY19, author = {Artur Janicki and Wojciech Mazurczyk and Xiangyang Luo and Dengpan Ye}, title = {Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {9}, pages = {1039--1042}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_9/recent\_advances\_in\_detection}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/JanickiMLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/0001MGFV19, author = {J{\"{o}}rg Keller and Wojciech Mazurczyk and B{\'{e}}la Genge and Lothar Fritsch and Simon Vrhovec}, title = {Cyberattack Detection and Response}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {11}, pages = {1394--1395}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_11/cyberattack\_detection\_and\_response}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/0001MGFV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/WendzelLEM19, author = {Steffen Wendzel and Florian Link and Daniela Eller and Wojciech Mazurczyk}, title = {Detection of Size Modulation Covert Channels Using Countermeasure Variation}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {11}, pages = {1396--1416}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_11/detection\_of\_size\_modulation}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/WendzelLEM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CabajGMNZ19, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, title = {Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4930908:1--4930908:22}, year = {2019}, url = {https://doi.org/10.1155/2019/4930908}, doi = {10.1155/2019/4930908}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CabajGMNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/JawadSAMZZZZKKS19, author = {Nawar Jawad and Mukhald A. Salih and Kareem Ali and Ben Meunier and Yue Zhang and Xun Zhang and Rudolf Zetik and Charilaos C. Zarakovitis and Harilaos Koumaras and Michail{-}Alexandros Kourtis and Lina Shi and Wojciech Mazurczyk and John Cosmas}, title = {Smart Television Services Using {NFV/SDN} Network Management}, journal = {{IEEE} Trans. Broadcast.}, volume = {65}, number = {2}, pages = {404--413}, year = {2019}, url = {https://doi.org/10.1109/TBC.2019.2898159}, doi = {10.1109/TBC.2019.2898159}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbc/JawadSAMZZZZKKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LvMWS19, author = {Zhihan Lv and Wojciech Mazurczyk and Steffen Wendzel and Houbing Song}, title = {Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {12}, pages = {6468--6471}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2945971}, doi = {10.1109/TII.2019.2945971}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/LvMWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchmidbauerWMM19, author = {Tobias Schmidbauer and Steffen Wendzel and Aleksandra Mileva and Wojciech Mazurczyk}, title = {Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {64:1--64:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341488}, doi = {10.1145/3339252.3341488}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SchmidbauerWMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CabajMNZ19, author = {Krzysztof Cabaj and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, title = {Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {65:1--65:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341489}, doi = {10.1145/3339252.3341489}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CabajMNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MazurczykSWC19, author = {Wojciech Mazurczyk and Przemyslaw Szary and Steffen Wendzel and Luca Caviglione}, title = {Towards Reversible Storage Network Covert Channels}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {69:1--69:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341493}, doi = {10.1145/3339252.3341493}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MazurczykSWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CabajGMNZ19, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, title = {Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {108:1--108:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341494}, doi = {10.1145/3339252.3341494}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CabajGMNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/RaufMM19, author = {Usman Rauf and Mujahid Mohsin and Wojciech Mazurczyk}, editor = {Adriana B. Compagnoni and William Casey and Yang Cai and Bud Mishra}, title = {Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense}, booktitle = {Bio-inspired Information and Communication Technologies - 11th {EAI} International Conference, {BICT} 2019, Pittsburgh, PA, USA, March 13-14, 2019, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {289}, pages = {156--174}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24202-2\_12}, doi = {10.1007/978-3-030-24202-2\_12}, timestamp = {Wed, 24 Jul 2019 17:14:55 +0200}, biburl = {https://dblp.org/rec/conf/bionetics/RaufMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/MazurczykPC19, author = {Wojciech Mazurczyk and Krystian Pow{\'{o}}jski and Luca Caviglione}, title = {IPv6 Covert Channels in the Wild}, booktitle = {Proceedings of the Third Central European Cybersecurity Conference, {CECC} 2019, Munich, Germany, November 14-15, 2019}, pages = {10:1--10:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3360664.3360674}, doi = {10.1145/3360664.3360674}, timestamp = {Mon, 28 Oct 2019 08:10:46 +0100}, biburl = {https://dblp.org/rec/conf/cecc/MazurczykPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/LalandeTGHMCB19, author = {Jean{-}Fran{\c{c}}ois Lalande and Val{\'{e}}rie Viet Triem Tong and Pierre Graux and Guillaume Hiet and Wojciech Mazurczyk and Habiba Chaoui and Pascal Berthom{\'{e}}}, editor = {Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and Sarah Heckman and Jian Zhang}, title = {Teaching Android Mobile Security}, booktitle = {Proceedings of the 50th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2019, Minneapolis, MN, USA, February 27 - March 02, 2019}, pages = {232--238}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3287324.3287406}, doi = {10.1145/3287324.3287406}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/LalandeTGHMCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SkwarekKMD19, author = {Marcin Skwarek and Maciej Korczynski and Wojciech Mazurczyk and Andrzej Duda}, title = {Characterizing Vulnerability of {DNS} {AXFR} Transfers with Global-Scale Scanning}, booktitle = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {193--198}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SPW.2019.00044}, doi = {10.1109/SPW.2019.00044}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SkwarekKMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MazurczykW18, author = {Wojciech Mazurczyk and Steffen Wendzel}, title = {Information hiding: Challenges for forensic experts}, journal = {Commun. {ACM}}, volume = {61}, number = {1}, pages = {86--94}, year = {2018}, url = {https://doi.org/10.1145/3158416}, doi = {10.1145/3158416}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MazurczykW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/CabajGM18, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk}, title = {Software-defined networking-based crypto ransomware detection using {HTTP} traffic characteristics}, journal = {Comput. Electr. Eng.}, volume = {66}, pages = {353--368}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2017.10.012}, doi = {10.1016/J.COMPELECENG.2017.10.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/CabajGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchmidtMKKC18, author = {Sabine S. Schmidt and Wojciech Mazurczyk and Radoslaw Kulesza and J{\"{o}}rg Keller and Luca Caviglione}, title = {Exploiting {IP} telephony with silence suppression for hidden data transfers}, journal = {Comput. Secur.}, volume = {79}, pages = {17--32}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.08.006}, doi = {10.1016/J.COSE.2018.08.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SchmidtMKKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CabajKKM18, author = {Krzysztof Cabaj and Zbigniew Kotulski and Bogdan Ksiezopolski and Wojciech Mazurczyk}, title = {Cybersecurity: trends, issues, and challenges}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {10}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0080-0}, doi = {10.1186/S13635-018-0080-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CabajKKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CabajCMWWZ18, author = {Krzysztof Cabaj and Luca Caviglione and Wojciech Mazurczyk and Steffen Wendzel and Alan Woodward and Sebastian Zander}, title = {The New Threats of Information Hiding: The Road Ahead}, journal = {{IT} Prof.}, volume = {20}, number = {3}, pages = {31--39}, year = {2018}, url = {https://doi.org/10.1109/MITP.2018.032501746}, doi = {10.1109/MITP.2018.032501746}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/CabajCMWWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/KellerBM18, author = {J{\"{o}}rg Keller and Igor Bernik and Wojciech Mazurczyk}, title = {Technical and Social Aspects of Critical Infrastructure Security}, journal = {J. Univers. Comput. Sci.}, volume = {24}, number = {5}, pages = {554--555}, year = {2018}, url = {http://www.jucs.org/jucs\_24\_5/technical\_and\_social\_aspects}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/KellerBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaviglioneMWZ18, author = {Luca Caviglione and Wojciech Mazurczyk and Steffen Wendzel and Sebastian Zander}, title = {Emerging and Unconventional: New Attacks and Innovative Detection Techniques}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9672523:1}, year = {2018}, url = {https://doi.org/10.1155/2018/9672523}, doi = {10.1155/2018/9672523}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaviglioneMWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/LakaM18, author = {Pawel Laka and Wojciech Mazurczyk}, title = {User perspective and security of a new mobile authentication method}, journal = {Telecommun. Syst.}, volume = {69}, number = {3}, pages = {365--379}, year = {2018}, url = {https://doi.org/10.1007/s11235-018-0437-1}, doi = {10.1007/S11235-018-0437-1}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/LakaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/5gwf/CosmasMAJSZHGGM18, author = {John Cosmas and Ben Meunier and Kareem Ali and Nawar Jawad and Mukhald A. Salih and Yue Zhang and Zion Hadad and Baruch Globen and Haluk Gokmen and Sibel Malkos and Memduh Emre Cakan and Harilaos Koumaras and Akis Kourtis and Christos Sakkas and Daniel N{\'{e}}gru and Mathias Lacaud and Moshe Ran and Einat Ran and Jorge Garcia and Wei Li and Li{-}Ke Huang and Rudolf Zetik and Krzysztof Cabaj and Woiciech Mazurczyk and Xun Zhang and Adam Kapovits}, title = {A 5G Radio-Light {SDN} Architecture for Wireless and Mobile Network Access in Buildings}, booktitle = {{IEEE} 5G World Forum, 5GWF 2018, Silicon Valley, CA, USA, July 9-11, 2018}, pages = {135--140}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/5GWF.2018.8516970}, doi = {10.1109/5GWF.2018.8516970}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/5gwf/CosmasMAJSZHGGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MazurczykWC18, author = {Wojciech Mazurczyk and Steffen Wendzel and Krzysztof Cabaj}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {10:1--10:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233261}, doi = {10.1145/3230833.3233261}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MazurczykWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CabajMNZ18, author = {Krzysztof Cabaj and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {12:1--12:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233264}, doi = {10.1145/3230833.3233264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CabajMNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GeislerM018, author = {Daniel Geisler and Wojciech Mazurczyk and J{\"{o}}rg Keller}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Towards Utilization of Covert Channels as a Green Networking Technique}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {14:1--14:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233262}, doi = {10.1145/3230833.3233262}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GeislerM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CabajGMNZ18, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {49}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233248}, doi = {10.1145/3230833.3233248}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CabajGMNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TundisMM18, author = {Andrea Tundis and Wojciech Mazurczyk and Max M{\"{u}}hlh{\"{a}}user}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {A review of network vulnerabilities scanning tools: types, capabilities and functioning}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {65:1--65:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233287}, doi = {10.1145/3230833.3233287}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TundisMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/CosmasMAJSMGGSH18, author = {John Cosmas and Ben Meunier and Kareem Ali and Nawar Jawad and Mukhald A. Salih and Hongying Meng and Martin Ganley and James Gbadamosi and Atanas Savov and Zion Hadad and Baruch Globen and Haluk Gokmen and Sibel Malkos and Memduh Emre Cakan and Harilaos Koumaras and Michail{-}Alexandros Kourtis and Christos Sakkas and Eliron Salomon and Yoav Avinoam and Daniel N{\'{e}}gru and Mathias Lacaud and Yue Zhang and Li{-}Ke Huang and Rudolf Zetik and Krzysztof Cabaj and Woiciech Mazurczyk and Xun Zhang and Moshe Ran and Dror Malka and Adam Kapovits}, title = {A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes {\&} Businesses}, booktitle = {2018 {IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2018, Valencia, Spain, June 6-8, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BMSB.2018.8436938}, doi = {10.1109/BMSB.2018.8436938}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmsb/CosmasMAJSMGGSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/WendzelEM18, author = {Steffen Wendzel and Daniela Eller and Wojciech Mazurczyk}, title = {One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels}, booktitle = {Proceedings of the Central European Cybersecurity Conference 2018, {CECC} 2018, Ljubljana, Slovenia, November 15-16, 2018}, pages = {1:1--1:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3277570.3277571}, doi = {10.1145/3277570.3277571}, timestamp = {Wed, 09 Jan 2019 16:52:40 +0100}, biburl = {https://dblp.org/rec/conf/cecc/WendzelEM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigcomm/2018wtmc, editor = {Maciej Korczynski and Wojciech Mazurczyk and Pedro Casas}, title = {Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, WTMC@SIGCOMM 2018, Budapest, Hungary, August 20, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3229598}, doi = {10.1145/3229598}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/2018wtmc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-00694, author = {Krzysztof Cabaj and Luca Caviglione and Wojciech Mazurczyk and Steffen Wendzel and Alan Woodward and Sebastian Zander}, title = {The New Threats of Information Hiding: the Road Ahead}, journal = {CoRR}, volume = {abs/1801.00694}, year = {2018}, url = {http://arxiv.org/abs/1801.00694}, eprinttype = {arXiv}, eprint = {1801.00694}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-00694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/MazurczykKNKHY17, author = {Wojciech Mazurczyk and Maciej Korczynski and Koji Nakao and Engin Kirda and Cristian Hesselman and Katsunari Yoshioka}, title = {Traffic Measurements for Cyber Security}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {7}, pages = {12--13}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.7981517}, doi = {10.1109/MCOM.2017.7981517}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/MazurczykKNKHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/UrbanskiMLC17, author = {Marcin Urbanski and Wojciech Mazurczyk and Jean{-}Fran{\c{c}}ois Lalande and Luca Caviglione}, title = {Detecting local covert channels using process activity correlation on Android smartphones}, journal = {Comput. Syst. Sci. Eng.}, volume = {32}, number = {2}, year = {2017}, timestamp = {Wed, 15 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/UrbanskiMLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MazurczykCW17, author = {Wojciech Mazurczyk and Luca Caviglione and Steffen Wendzel}, title = {Recent Advancements in Digital Forensics}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {6}, pages = {10--11}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.4251106}, doi = {10.1109/MSP.2017.4251106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MazurczykCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CaviglioneWM17, author = {Luca Caviglione and Steffen Wendzel and Wojciech Mazurczyk}, title = {The Future of Digital Forensics: Challenges and the Road Ahead}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {6}, pages = {12--17}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.4251117}, doi = {10.1109/MSP.2017.4251117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CaviglioneWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WendzelMH17, author = {Steffen Wendzel and Wojciech Mazurczyk and Georg Haas}, title = {Steganography for Cyber-physicalSystems}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {2}, pages = {105--126}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.621}, doi = {10.13052/JCSM2245-1439.621}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/WendzelMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/CaviglionePMI17, author = {Luca Caviglione and Maciej Podolski and Wojciech Mazurczyk and Massimo Ianigro}, title = {Covert Channels in Personal Cloud Storage Services: The Case of Dropbox}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {13}, number = {4}, pages = {1921--1931}, year = {2017}, url = {https://doi.org/10.1109/TII.2016.2627503}, doi = {10.1109/TII.2016.2627503}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/CaviglionePMI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchmidtM0C17, author = {Sabine S. Schmidt and Wojciech Mazurczyk and J{\"{o}}rg Keller and Luca Caviglione}, title = {A New Data-Hiding Approach for {IP} Telephony Applications with Silence Suppression}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {83:1--83:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3106066}, doi = {10.1145/3098954.3106066}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SchmidtM0C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/NilizadehMZL17, author = {Amirfarhad Nilizadeh and Wojciech Mazurczyk and Cliff C. Zou and Gary T. Leavens}, title = {Information Hiding in {RGB} Images Using an Improved Matrix Pattern Approach}, booktitle = {2017 {IEEE} Conference on Computer Vision and Pattern Recognition Workshops, {CVPR} Workshops 2017, Honolulu, HI, USA, July 21-26, 2017}, pages = {1407--1415}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CVPRW.2017.183}, doi = {10.1109/CVPRW.2017.183}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/NilizadehMZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/LehnerM0W17, author = {Florian Lehner and Wojciech Mazurczyk and J{\"{o}}rg Keller and Steffen Wendzel}, title = {Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach}, booktitle = {42nd {IEEE} Conference on Local Computer Networks, {LCN} 2017, Singapore, October 9-12, 2017}, pages = {78--85}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/LCN.2017.32}, doi = {10.1109/LCN.2017.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/LehnerM0W17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WendzelMH17, author = {Steffen Wendzel and Wojciech Mazurczyk and Georg Haas}, title = {Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {29--34}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.40}, doi = {10.1109/SPW.2017.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WendzelMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2017, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2}, doi = {10.1007/978-3-319-64701-2}, isbn = {978-3-319-64700-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/MazurczykMFWL16, author = {Wojciech Mazurczyk and Sean Moore and Errin W. Fulp and Hiroshi Wada and Kenji Leibnitz}, title = {Bio-inspired cyber security for communications and networking}, journal = {{IEEE} Commun. Mag.}, volume = {54}, number = {6}, pages = {58--59}, year = {2016}, url = {https://doi.org/10.1109/MCOM.2016.7497767}, doi = {10.1109/MCOM.2016.7497767}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/MazurczykMFWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/AndrysiakSM16, author = {Tomasz Andrysiak and Lukasz Saganowski and Wojciech Mazurczyk}, title = {Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2016}, pages = {245}, year = {2016}, url = {https://doi.org/10.1186/s13638-016-0744-8}, doi = {10.1186/S13638-016-0744-8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/AndrysiakSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/WendzelMZ16, author = {Steffen Wendzel and Wojciech Mazurczyk and Sebastian Zander}, title = {Unified Description for Network Information Hiding Methods}, journal = {J. Univers. Comput. Sci.}, volume = {22}, number = {11}, pages = {1456--1486}, year = {2016}, url = {http://www.jucs.org/jucs\_22\_11/unified\_description\_for\_network}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/WendzelMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MazurczykKSJ16, author = {Wojciech Mazurczyk and Maciej Karas and Krzysztof Szczypiorski and Artur Janicki}, title = {YouSkyde: information hiding for Skype video traffic}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13521--13540}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2740-0}, doi = {10.1007/S11042-015-2740-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MazurczykKSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/CabajM16, author = {Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall}, journal = {{IEEE} Netw.}, volume = {30}, number = {6}, pages = {14--20}, year = {2016}, url = {https://doi.org/10.1109/MNET.2016.1600110NM}, doi = {10.1109/MNET.2016.1600110NM}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/CabajM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SzczypiorskiM16, author = {Krzysztof Szczypiorski and Wojciech Mazurczyk}, title = {Steganography in {IEEE} 802.11 {OFDM} symbols}, journal = {Secur. Commun. Networks}, volume = {9}, number = {2}, pages = {118--129}, year = {2016}, url = {https://doi.org/10.1002/sec.306}, doi = {10.1002/SEC.306}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SzczypiorskiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykSJT16, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Artur Janicki and Hui Tian}, title = {Trends in modern information hiding: techniques, applications, and detection}, journal = {Secur. Commun. Networks}, volume = {9}, number = {8}, pages = {703--704}, year = {2016}, url = {https://doi.org/10.1002/sec.1469}, doi = {10.1002/SEC.1469}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykSJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykWVS16, author = {Wojciech Mazurczyk and Steffen Wendzel and Ignacio Azagra Villares and Krzysztof Szczypiorski}, title = {On importance of steganographic cost for network steganography}, journal = {Secur. Commun. Networks}, volume = {9}, number = {8}, pages = {781--790}, year = {2016}, url = {https://doi.org/10.1002/sec.1085}, doi = {10.1002/SEC.1085}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykWVS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykSDY16, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Zoran Duric and Dengpan Ye}, title = {Cyber Crime}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2861--2863}, year = {2016}, url = {https://doi.org/10.1002/sec.1603}, doi = {10.1002/SEC.1603}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykSDY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NaumannWM016, author = {Matthias Naumann and Steffen Wendzel and Wojciech Mazurczyk and J{\"{o}}rg Keller}, title = {Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2972--2985}, year = {2016}, url = {https://doi.org/10.1002/sec.1500}, doi = {10.1002/SEC.1500}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NaumannWM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MazurczykHS16, author = {Wojciech Mazurczyk and Thomas Holt and Krzysztof Szczypiorski}, title = {Guest Editors' Introduction: Special Issue on Cyber Crime}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {146--147}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2502407}, doi = {10.1109/TDSC.2015.2502407}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MazurczykHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaviglioneGLMU16, author = {Luca Caviglione and Mauro Gaggero and Jean{-}Fran{\c{c}}ois Lalande and Wojciech Mazurczyk and Marcin Urbanski}, title = {Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {799--810}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510825}, doi = {10.1109/TIFS.2015.2510825}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaviglioneGLMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WendzelM16, author = {Steffen Wendzel and Wojciech Mazurczyk}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} An Educational Network Protocol for Covert Channel Analysis Using Patterns}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1739--1741}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989037}, doi = {10.1145/2976749.2989037}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WendzelM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CabajM16, author = {Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Using Software-Defined Networking for Ransomware Mitigation: the Case of CryptoWall}, journal = {CoRR}, volume = {abs/1608.06673}, year = {2016}, url = {http://arxiv.org/abs/1608.06673}, eprinttype = {arXiv}, eprint = {1608.06673}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CabajM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazurczykKSJ16, author = {Wojciech Mazurczyk and Maciej Karas and Krzysztof Szczypiorski and Artur Janicki}, title = {YouSkyde: Information Hiding for Skype Video Traffic}, journal = {CoRR}, volume = {abs/1608.07337}, year = {2016}, url = {http://arxiv.org/abs/1608.07337}, eprinttype = {arXiv}, eprint = {1608.07337}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazurczykKSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CabajGM16, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk}, title = {Software-Defined Networking-based Crypto Ransomware Detection Using {HTTP} Traffic Characteristics}, journal = {CoRR}, volume = {abs/1611.08294}, year = {2016}, url = {http://arxiv.org/abs/1611.08294}, eprinttype = {arXiv}, eprint = {1611.08294}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CabajGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CaviglioneM15, author = {Luca Caviglione and Wojciech Mazurczyk}, title = {Understanding Information Hiding in iOS}, journal = {Computer}, volume = {48}, number = {1}, pages = {62--65}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.31}, doi = {10.1109/MC.2015.31}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CaviglioneM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/MazurczykC15, author = {Wojciech Mazurczyk and Luca Caviglione}, title = {Steganography in Modern Smartphones and Mitigation Techniques}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {17}, number = {1}, pages = {334--357}, year = {2015}, url = {https://doi.org/10.1109/COMST.2014.2350994}, doi = {10.1109/COMST.2014.2350994}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/MazurczykC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MazurczykC15, author = {Wojciech Mazurczyk and Luca Caviglione}, title = {Information Hiding as a Challenge for Malware Detection}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {2}, pages = {89--93}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.33}, doi = {10.1109/MSP.2015.33}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MazurczykC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/MazurczykR15, author = {Wojciech Mazurczyk and Elzbieta Rzeszutko}, title = {Security-A Perpetual War: Lessons from Nature}, journal = {{IT} Prof.}, volume = {17}, number = {1}, pages = {16--22}, year = {2015}, url = {https://doi.org/10.1109/MITP.2015.14}, doi = {10.1109/MITP.2015.14}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/MazurczykR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JanickiMS15, author = {Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {On the undetectability of transcoding steganography}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3804--3814}, year = {2015}, url = {https://doi.org/10.1002/sec.1301}, doi = {10.1002/SEC.1301}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JanickiMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/JanickiMS15, author = {Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Influence of speech codecs selection on transcoding steganography}, journal = {Telecommun. Syst.}, volume = {59}, number = {3}, pages = {305--315}, year = {2015}, url = {https://doi.org/10.1007/s11235-014-9937-9}, doi = {10.1007/S11235-014-9937-9}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/JanickiMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/CaviglioneLMW15, author = {Luca Caviglione and Jean{-}Fran{\c{c}}ois Lalande and Wojciech Mazurczyk and Steffen Wendzel}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Analysis of Human Awareness of Security and Privacy Threats in Smart Environments}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {165--177}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_15}, doi = {10.1007/978-3-319-20376-8\_15}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/CaviglioneLMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CaviglioneLMW15, author = {Luca Caviglione and Jean{-}Fran{\c{c}}ois Lalande and Wojciech Mazurczyk and Steffen Wendzel}, title = {Analysis of Human Awareness of Security and Privacy Threats in Smart Environments}, journal = {CoRR}, volume = {abs/1502.00868}, year = {2015}, url = {http://arxiv.org/abs/1502.00868}, eprinttype = {arXiv}, eprint = {1502.00868}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CaviglioneLMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazurczykC15, author = {Wojciech Mazurczyk and Luca Caviglione}, title = {Information Hiding as a Challenge for Malware Detection}, journal = {CoRR}, volume = {abs/1504.04867}, year = {2015}, url = {http://arxiv.org/abs/1504.04867}, eprinttype = {arXiv}, eprint = {1504.04867}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazurczykC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazurczykDM15, author = {Wojciech Mazurczyk and Szymon Drobniak and Sean Moore}, title = {Towards a Systematic View on Cybersecurity Ecology}, journal = {CoRR}, volume = {abs/1505.04207}, year = {2015}, url = {http://arxiv.org/abs/1505.04207}, eprinttype = {arXiv}, eprint = {1505.04207}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazurczykDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NaumannWM015, author = {Matthias Naumann and Steffen Wendzel and Wojciech Mazurczyk and J{\"{o}}rg Keller}, title = {Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions}, journal = {CoRR}, volume = {abs/1505.07757}, year = {2015}, url = {http://arxiv.org/abs/1505.07757}, eprinttype = {arXiv}, eprint = {1505.07757}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NaumannWM015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WendzelMZ15, author = {Steffen Wendzel and Wojciech Mazurczyk and Sebastian Zander}, title = {Unified Description for Network Information Hiding Methods}, journal = {CoRR}, volume = {abs/1512.07438}, year = {2015}, url = {http://arxiv.org/abs/1512.07438}, eprinttype = {arXiv}, eprint = {1512.07438}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WendzelMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/MazurczykST14, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Hui Tian}, title = {Network forensics and challenges for cybersecurity}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {69}, number = {7-8}, pages = {345--346}, year = {2014}, url = {https://doi.org/10.1007/s12243-014-0434-7}, doi = {10.1007/S12243-014-0434-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/MazurczykST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/JanickiMS14, author = {Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Steganalysis of transcoding steganography}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {69}, number = {7-8}, pages = {449--460}, year = {2014}, url = {https://doi.org/10.1007/s12243-013-0385-4}, doi = {10.1007/S12243-013-0385-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/JanickiMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ZielinskaMS14, author = {Elzbieta Zielinska and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Trends in steganography}, journal = {Commun. {ACM}}, volume = {57}, number = {3}, pages = {86--95}, year = {2014}, url = {https://doi.org/10.1145/2566590.2566610}, doi = {10.1145/2566590.2566610}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ZielinskaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/LubaczMS14, author = {J{\'{o}}zef Lubacz and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Principles and overview of network steganography}, journal = {{IEEE} Commun. Mag.}, volume = {52}, number = {5}, pages = {225--229}, year = {2014}, url = {https://doi.org/10.1109/MCOM.2014.6815916}, doi = {10.1109/MCOM.2014.6815916}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/LubaczMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/MazurczykS14, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Advances in digital media security and right management}, journal = {Multim. Syst.}, volume = {20}, number = {2}, pages = {101--103}, year = {2014}, url = {https://doi.org/10.1007/s00530-013-0339-8}, doi = {10.1007/S00530-013-0339-8}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/MazurczykS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MazurczykSS14, author = {Wojciech Mazurczyk and Pawel Szaga and Krzysztof Szczypiorski}, title = {Using transcoding for hidden communication in {IP} telephony}, journal = {Multim. Tools Appl.}, volume = {70}, number = {3}, pages = {2139--2165}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1224-8}, doi = {10.1007/S11042-012-1224-8}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MazurczykSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykLS14, author = {Wojciech Mazurczyk and J{\'{o}}zef Lubacz and Krzysztof Szczypiorski}, title = {On steganography in lost audio packets}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2602--2615}, year = {2014}, url = {https://doi.org/10.1002/sec.388}, doi = {10.1002/SEC.388}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/WendzelMC014, author = {Steffen Wendzel and Wojciech Mazurczyk and Luca Caviglione and Michael Meier}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats}, booktitle = {{ISSE} 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014}, pages = {123--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-658-06708-3\_9}, doi = {10.1007/978-3-658-06708-3\_9}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/WendzelMC014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LipinskiMS14, author = {Bartosz Lipinski and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Improving Hard Disk Contention-Based Covert Channel in Cloud Computing}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {100--107}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.24}, doi = {10.1109/SPW.2014.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LipinskiMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LipinskiMS14, author = {Bartosz Lipinski and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment}, journal = {CoRR}, volume = {abs/1402.0239}, year = {2014}, url = {http://arxiv.org/abs/1402.0239}, eprinttype = {arXiv}, eprint = {1402.0239}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LipinskiMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazurczykWVS14, author = {Wojciech Mazurczyk and Steffen Wendzel and Ignacio Azagra Villares and Krzysztof Szczypiorski}, title = {On Importance of Steganographic Cost For Network Steganography}, journal = {CoRR}, volume = {abs/1406.2519}, year = {2014}, url = {http://arxiv.org/abs/1406.2519}, eprinttype = {arXiv}, eprint = {1406.2519}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazurczykWVS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WendzelMCM14, author = {Steffen Wendzel and Wojciech Mazurczyk and Luca Caviglione and Michael Meier}, title = {Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats}, journal = {CoRR}, volume = {abs/1407.2029}, year = {2014}, url = {http://arxiv.org/abs/1407.2029}, eprinttype = {arXiv}, eprint = {1407.2029}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WendzelMCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazurczykR14, author = {Wojciech Mazurczyk and Elzbieta Rzeszutko}, title = {Security - a perpetual war: lessons from nature}, journal = {CoRR}, volume = {abs/1410.4795}, year = {2014}, url = {http://arxiv.org/abs/1410.4795}, eprinttype = {arXiv}, eprint = {1410.4795}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazurczykR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MazurczykC14, author = {Wojciech Mazurczyk and Luca Caviglione}, title = {Steganography in Modern Smartphones and Mitigation Techniques}, journal = {CoRR}, volume = {abs/1410.6796}, year = {2014}, url = {http://arxiv.org/abs/1410.6796}, eprinttype = {arXiv}, eprint = {1410.6796}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MazurczykC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RzeszutkoM14, author = {Elzbieta Rzeszutko and Wojciech Mazurczyk}, title = {Insights from the Nature for Cybersecurity}, journal = {CoRR}, volume = {abs/1410.8317}, year = {2014}, url = {http://arxiv.org/abs/1410.8317}, eprinttype = {arXiv}, eprint = {1410.8317}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RzeszutkoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CaviglioneM14, author = {Luca Caviglione and Wojciech Mazurczyk}, title = {How to covertly leak data from iOS?}, journal = {CoRR}, volume = {abs/1411.3000}, year = {2014}, url = {http://arxiv.org/abs/1411.3000}, eprinttype = {arXiv}, eprint = {1411.3000}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CaviglioneM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Mazurczyk13, author = {Wojciech Mazurczyk}, title = {VoIP steganography and its Detection - {A} survey}, journal = {{ACM} Comput. Surv.}, volume = {46}, number = {2}, pages = {20:1--20:21}, year = {2013}, url = {https://doi.org/10.1145/2543581.2543587}, doi = {10.1145/2543581.2543587}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Mazurczyk13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/MazurczykKS13, author = {Wojciech Mazurczyk and Maciej Karas and Krzysztof Szczypiorski}, title = {SkyDe: a Skype-based Steganographic Method}, journal = {Int. J. Comput. Commun. Control}, volume = {8}, number = {3}, pages = {432--443}, year = {2013}, url = {https://doi.org/10.15837/ijccc.2013.3.469}, doi = {10.15837/IJCCC.2013.3.469}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccc/MazurczykKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykSTL13, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Hui Tian and Yali Liu}, title = {Trends in modern information hiding: techniques, applications and detection}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1414--1415}, year = {2013}, url = {https://doi.org/10.1002/sec.919}, doi = {10.1002/SEC.919}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykSTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/JankowskiMS13, author = {Bartosz Jankowski and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {PadSteg: introducing inter-protocol steganography}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {1101--1111}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9616-z}, doi = {10.1007/S11235-011-9616-Z}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/JankowskiMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/MazurczykSS13, author = {Wojciech Mazurczyk and Milosz Smolarczyk and Krzysztof Szczypiorski}, title = {On information hiding in retransmissions}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {1113--1121}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9617-y}, doi = {10.1007/S11235-011-9617-Y}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/MazurczykSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icumt/SeredynskiAMSK13, author = {Marcin Seredynski and Riad Aggoune and Wojciech Mazurczyk and Krzysztof Szczypiorski and Djamel Khadraoui}, title = {Vehicular ad hoc networks for joint traffic and mobility management}, booktitle = {5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, {ICUMT} 2013, Almaty, Kazakhstan, September 10-13, 2013}, pages = {7--12}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICUMT.2013.6798397}, doi = {10.1109/ICUMT.2013.6798397}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icumt/SeredynskiAMSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SeredynskiMK13, author = {Marcin Seredynski and Wojciech Mazurczyk and Djamel Khadraoui}, title = {Multi-segment Green Light Optimal Speed Advisory}, booktitle = {2013 {IEEE} International Symposium on Parallel {\&} Distributed Processing, Workshops and Phd Forum, Cambridge, MA, USA, May 20-24, 2013}, pages = {459--465}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IPDPSW.2013.157}, doi = {10.1109/IPDPSW.2013.157}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SeredynskiMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KopiczkoMS13, author = {Pawel Kopiczko and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {StegTorrent: {A} Steganographic Method for the {P2P} File Sharing Service}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {151--157}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.11}, doi = {10.1109/SPW.2013.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KopiczkoMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-3632, author = {Wojciech Mazurczyk and Maciej Karas and Krzysztof Szczypiorski}, title = {SkyDe: a Skype-based Steganographic Method}, journal = {CoRR}, volume = {abs/1301.3632}, year = {2013}, url = {http://arxiv.org/abs/1301.3632}, eprinttype = {arXiv}, eprint = {1301.3632}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-3632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-4264, author = {Pawel Kopiczko and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {StegTorrent: a Steganographic Method for the {P2P} File Sharing Service}, journal = {CoRR}, volume = {abs/1303.4264}, year = {2013}, url = {http://arxiv.org/abs/1303.4264}, eprinttype = {arXiv}, eprint = {1303.4264}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-4264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MazurczykS12, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Toward Effective and Reliable Digital Forensics}, journal = {Comput. J.}, volume = {55}, number = {6}, pages = {651--652}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxs012}, doi = {10.1093/COMJNL/BXS012}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/MazurczykS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FraczekMS12, author = {Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Hiding information in a Stream Control Transmission Protocol}, journal = {Comput. Commun.}, volume = {35}, number = {2}, pages = {159--169}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2011.08.009}, doi = {10.1016/J.COMCOM.2011.08.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FraczekMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/FraczekMS12, author = {Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Multilevel Steganography: Improving Hidden Communication in Networks}, journal = {J. Univers. Comput. Sci.}, volume = {18}, number = {14}, pages = {1967--1986}, year = {2012}, url = {https://doi.org/10.3217/jucs-018-14-1967}, doi = {10.3217/JUCS-018-14-1967}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/FraczekMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MazurczykCS12, author = {Wojciech Mazurczyk and Krzysztof Cabaj and Krzysztof Szczypiorski}, title = {What are suspicious VoIP delays?}, journal = {Multim. Tools Appl.}, volume = {57}, number = {1}, pages = {109--126}, year = {2012}, url = {https://doi.org/10.1007/s11042-010-0532-0}, doi = {10.1007/S11042-010-0532-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MazurczykCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MariasBFFHHGLLLMMOPPSVV12, author = {Giannis F. Marias and Jo{\~{a}}o Barros and Markus Fiedler and Andreas Fischer and Harald Hauff and Ralph Herkenh{\"{o}}ner and Antonio Grillo and Alessandro Lentini and Lu{\'{\i}}sa Lima and Charlott Lorentzen and Wojciech Mazurczyk and Hermann de Meer and Paulo F. Oliveira and George C. Polyzos and Enric Pujol and Krzysztof Szczypiorski and Jo{\~{a}}o P. Vilela and Tiago T. V. Vinhoza}, title = {Security and privacy issues for the network of the future}, journal = {Secur. Commun. Networks}, volume = {5}, number = {9}, pages = {987--1005}, year = {2012}, url = {https://doi.org/10.1002/sec.384}, doi = {10.1002/SEC.384}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MariasBFFHHGLLLMMOPPSVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Mazurczyk12, author = {Wojciech Mazurczyk}, title = {Lost audio packets steganography: the first practical evaluation}, journal = {Secur. Commun. Networks}, volume = {5}, number = {12}, pages = {1394--1403}, year = {2012}, url = {https://doi.org/10.1002/sec.502}, doi = {10.1002/SEC.502}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Mazurczyk12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/SzczypiorskiM12, author = {Krzysztof Szczypiorski and Wojciech Mazurczyk}, title = {Toward network steganography detection}, journal = {Telecommun. Syst.}, volume = {49}, number = {2}, pages = {161--162}, year = {2012}, url = {https://doi.org/10.1007/s11235-010-9361-8}, doi = {10.1007/S11235-010-9361-8}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/SzczypiorskiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/MazurczykS12, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Evaluation of steganographic methods for oversized {IP} packets}, journal = {Telecommun. Syst.}, volume = {49}, number = {2}, pages = {207--217}, year = {2012}, url = {https://doi.org/10.1007/s11235-010-9362-7}, doi = {10.1007/S11235-010-9362-7}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/MazurczykS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/CiszkowskiMKHFC12, author = {Tomasz Ciszkowski and Wojciech Mazurczyk and Zbigniew Kotulski and Tobias Ho{\ss}feld and Markus Fiedler and Denis Collange}, title = {Towards Quality of Experience-based reputation models for future web service provisioning}, journal = {Telecommun. Syst.}, volume = {51}, number = {4}, pages = {283--295}, year = {2012}, url = {https://doi.org/10.1007/s11235-011-9435-2}, doi = {10.1007/S11235-011-9435-2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/CiszkowskiMKHFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icumt/MazurczykSJ12, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Bartosz Jankowski}, title = {Towards steganography detection through network traffic visualisation}, booktitle = {4th International Congress on Ultra Modern Telecommunications and Control Systems, {ICUMT} 2012, St. Petersburg, Russia, October 3-5, 2012}, pages = {947--954}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICUMT.2012.6459796}, doi = {10.1109/ICUMT.2012.6459796}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icumt/MazurczykSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-6218, author = {Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Influence of Speech Codecs Selection on Transcoding Steganography}, journal = {CoRR}, volume = {abs/1201.6218}, year = {2012}, url = {http://arxiv.org/abs/1201.6218}, eprinttype = {arXiv}, eprint = {1201.6218}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-6218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-5289, author = {Elzbieta Zielinska and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {The Advent of Steganography in Computing Environments}, journal = {CoRR}, volume = {abs/1202.5289}, year = {2012}, url = {http://arxiv.org/abs/1202.5289}, eprinttype = {arXiv}, eprint = {1202.5289}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-5289.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-4374, author = {Wojciech Mazurczyk}, title = {VoIP Steganography and Its Detection - {A} Survey}, journal = {CoRR}, volume = {abs/1203.4374}, year = {2012}, url = {http://arxiv.org/abs/1203.4374}, eprinttype = {arXiv}, eprint = {1203.4374}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-4374.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-0917, author = {J{\'{o}}zef Lubacz and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Principles and Overview of Network Steganography}, journal = {CoRR}, volume = {abs/1207.0917}, year = {2012}, url = {http://arxiv.org/abs/1207.0917}, eprinttype = {arXiv}, eprint = {1207.0917}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-0917.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-2861, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Bartosz Jankowski}, title = {Towards Steganography Detection Through Network Traffic Visualisation}, journal = {CoRR}, volume = {abs/1208.2861}, year = {2012}, url = {http://arxiv.org/abs/1208.2861}, eprinttype = {arXiv}, eprint = {1208.2861}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-2861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-5888, author = {Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Steganalysis of Transcoding Steganography}, journal = {CoRR}, volume = {abs/1210.5888}, year = {2012}, url = {http://arxiv.org/abs/1210.5888}, eprinttype = {arXiv}, eprint = {1210.5888}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-5888.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/MazurczykSS11, author = {Wojciech Mazurczyk and Milosz Smolarczyk and Krzysztof Szczypiorski}, title = {Retransmission steganography and its detection}, journal = {Soft Comput.}, volume = {15}, number = {3}, pages = {505--515}, year = {2011}, url = {https://doi.org/10.1007/s00500-009-0530-1}, doi = {10.1007/S00500-009-0530-1}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/MazurczykSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-4789, author = {Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Multi-Level Steganography: Improving Hidden Communication in Networks}, journal = {CoRR}, volume = {abs/1101.4789}, year = {2011}, url = {http://arxiv.org/abs/1101.4789}, eprinttype = {arXiv}, eprint = {1101.4789}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-4789.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-0023, author = {Wojciech Mazurczyk and J{\'{o}}zef Lubacz and Krzysztof Szczypiorski}, title = {On Steganography in Lost Audio Packets}, journal = {CoRR}, volume = {abs/1102.0023}, year = {2011}, url = {http://arxiv.org/abs/1102.0023}, eprinttype = {arXiv}, eprint = {1102.0023}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-0422, author = {Bartosz Jankowski and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {PadSteg: Introducing Inter-Protocol Steganography}, journal = {CoRR}, volume = {abs/1104.0422}, year = {2011}, url = {http://arxiv.org/abs/1104.0422}, eprinttype = {arXiv}, eprint = {1104.0422}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-0422.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-3333, author = {Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Hiding Information in a Stream Control Transmission Protocol}, journal = {CoRR}, volume = {abs/1104.3333}, year = {2011}, url = {http://arxiv.org/abs/1104.3333}, eprinttype = {arXiv}, eprint = {1104.3333}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-3333.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-4062, author = {Piotr Bialczak and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Sending Hidden Data via Google Suggest}, journal = {CoRR}, volume = {abs/1107.4062}, year = {2011}, url = {http://arxiv.org/abs/1107.4062}, eprinttype = {arXiv}, eprint = {1107.4062}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-4062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-4065, author = {Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {How Hidden Can Be Even More Hidden?}, journal = {CoRR}, volume = {abs/1107.4065}, year = {2011}, url = {http://arxiv.org/abs/1107.4065}, eprinttype = {arXiv}, eprint = {1107.4065}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-4065.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-4076, author = {Wojciech Mazurczyk}, title = {Lost Audio Packets Steganography: The First Practical Evaluation}, journal = {CoRR}, volume = {abs/1107.4076}, year = {2011}, url = {http://arxiv.org/abs/1107.4076}, eprinttype = {arXiv}, eprint = {1107.4076}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-4076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-4077, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Is Cloud Computing Steganography-proof?}, journal = {CoRR}, volume = {abs/1107.4077}, year = {2011}, url = {http://arxiv.org/abs/1107.4077}, eprinttype = {arXiv}, eprint = {1107.4077}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-4077.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-6265, author = {Wojciech Mazurczyk and Pawel Kopiczko}, title = {What more can be learnt about BitTorrent from meta-data files and {\(\mu\)}Torrent logs?}, journal = {CoRR}, volume = {abs/1110.6265}, year = {2011}, url = {http://arxiv.org/abs/1110.6265}, eprinttype = {arXiv}, eprint = {1110.6265}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-6265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-1250, author = {Wojciech Mazurczyk and Pawel Szaga and Krzysztof Szczypiorski}, title = {Using Transcoding for Hidden Communication in {IP} Telephony}, journal = {CoRR}, volume = {abs/1111.1250}, year = {2011}, url = {http://arxiv.org/abs/1111.1250}, eprinttype = {arXiv}, eprint = {1111.1250}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-1250.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/MazurczykL10, author = {Wojciech Mazurczyk and J{\'{o}}zef Lubacz}, title = {{LACK} - a VoIP steganographic method}, journal = {Telecommun. Syst.}, volume = {45}, number = {2-3}, pages = {153--163}, year = {2010}, url = {https://doi.org/10.1007/s11235-009-9245-y}, doi = {10.1007/S11235-009-9245-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/MazurczykL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-4303, author = {Wojciech Mazurczyk and Krzysztof Cabaj and Krzysztof Szczypiorski}, title = {What are suspicious VoIP delays?}, journal = {CoRR}, volume = {abs/1002.4303}, year = {2010}, url = {http://arxiv.org/abs/1002.4303}, eprinttype = {arXiv}, eprint = {1002.4303}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-4303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-1925, author = {Bartosz Jankowski and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Information Hiding Using Improper Frame Padding}, journal = {CoRR}, volume = {abs/1005.1925}, year = {2010}, url = {http://arxiv.org/abs/1005.1925}, eprinttype = {arXiv}, eprint = {1005.1925}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-1925.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-0247, author = {Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Stream Control Transmission Protocol Steganography}, journal = {CoRR}, volume = {abs/1006.0247}, year = {2010}, url = {http://arxiv.org/abs/1006.0247}, eprinttype = {arXiv}, eprint = {1006.0247}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-0247.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-0495, author = {Krzysztof Szczypiorski and Wojciech Mazurczyk}, title = {Hiding Data in {OFDM} Symbols of {IEEE} 802.11 Networks}, journal = {CoRR}, volume = {abs/1006.0495}, year = {2010}, url = {http://arxiv.org/abs/1006.0495}, eprinttype = {arXiv}, eprint = {1006.0495}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-0495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-0767, author = {Wojciech Mazurczyk and Milosz Smolarczyk and Krzysztof Szczypiorski}, title = {Retransmission Steganography Applied}, journal = {CoRR}, volume = {abs/1007.0767}, year = {2010}, url = {http://arxiv.org/abs/1007.0767}, eprinttype = {arXiv}, eprint = {1007.0767}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-0767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0905-0363, author = {Wojciech Mazurczyk and Milosz Smolarczyk and Krzysztof Szczypiorski}, title = {Hiding Information in Retransmissions}, journal = {CoRR}, volume = {abs/0905.0363}, year = {2009}, url = {http://arxiv.org/abs/0905.0363}, eprinttype = {arXiv}, eprint = {0905.0363}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0905-0363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-0313, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Steganography in Handling Oversized {IP} Packets}, journal = {CoRR}, volume = {abs/0907.0313}, year = {2009}, url = {http://arxiv.org/abs/0907.0313}, eprinttype = {arXiv}, eprint = {0907.0313}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-0313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/CiszkowskiEFKLM08, author = {Tomasz Ciszkowski and Charlott Eliasson and Markus Fiedler and Zbigniew Kotulski and Radu Lupu and Wojciech Mazurczyk}, title = {SecMon: end-to-end quality and security monitoring system}, journal = {Ann. {UMCS} Informatica}, volume = {8}, number = {1}, pages = {185--201}, year = {2008}, url = {https://doi.org/10.2478/v10065-008-0018-0}, doi = {10.2478/V10065-008-0018-0}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/CiszkowskiEFKLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/MazurczykS08, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, editor = {Robert Meersman and Zahir Tari}, title = {Steganography of VoIP Streams}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5332}, pages = {1001--1018}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88873-4\_6}, doi = {10.1007/978-3-540-88873-4\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/MazurczykS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/SzczypiorskiMMCR08, author = {Krzysztof Szczypiorski and Igor Margasinski and Wojciech Mazurczyk and Krzysztof Cabaj and Pawel Radziszewski}, editor = {Robert Meersman and Zahir Tari}, title = {TrustMAS: Trusted Communication Platform for Multi-Agent Systems}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5332}, pages = {1019--1035}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88873-4\_7}, doi = {10.1007/978-3-540-88873-4\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/SzczypiorskiMMCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0804-0134, author = {Tomasz Ciszkowski and Charlott Eliasson and Markus Fiedler and Zbigniew Kotulski and Radu Lupu and Wojciech Mazurczyk}, title = {SecMon: End-to-End Quality and Security Monitoring System}, journal = {CoRR}, volume = {abs/0804.0134}, year = {2008}, url = {http://arxiv.org/abs/0804.0134}, eprinttype = {arXiv}, eprint = {0804.0134}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0804-0134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0805-2938, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Steganography of VoIP streams}, journal = {CoRR}, volume = {abs/0805.2938}, year = {2008}, url = {http://arxiv.org/abs/0805.2938}, eprinttype = {arXiv}, eprint = {0805.2938}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0805-2938.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0805-3538, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Covert Channels in {SIP} for VoIP signalling}, journal = {CoRR}, volume = {abs/0805.3538}, year = {2008}, url = {http://arxiv.org/abs/0805.3538}, eprinttype = {arXiv}, eprint = {0805.3538}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0805-3538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0806-0576, author = {Krzysztof Szczypiorski and Igor Margasinski and Wojciech Mazurczyk}, title = {Steganographic Routing in Multi Agent System Environment}, journal = {CoRR}, volume = {abs/0806.0576}, year = {2008}, url = {http://arxiv.org/abs/0806.0576}, eprinttype = {arXiv}, eprint = {0806.0576}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0806-0576.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0806-1034, author = {Wojciech Mazurczyk and J{\'{o}}zef Lubacz}, title = {Analysis of a procedure for inserting steganographic data into VoIP calls}, journal = {CoRR}, volume = {abs/0806.1034}, year = {2008}, url = {http://arxiv.org/abs/0806.1034}, eprinttype = {arXiv}, eprint = {0806.1034}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0806-1034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-4060, author = {Krzysztof Szczypiorski and Igor Margasinski and Wojciech Mazurczyk and Krzysztof Cabaj and Pawel Radziszewski}, title = {TrustMAS: Trusted Communication Platform for Multi-Agent Systems}, journal = {CoRR}, volume = {abs/0808.4060}, year = {2008}, url = {http://arxiv.org/abs/0808.4060}, eprinttype = {arXiv}, eprint = {0808.4060}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-4060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0811-4138, author = {Wojciech Mazurczyk and J{\'{o}}zef Lubacz}, title = {{LACK} - a VoIP Steganographic Method}, journal = {CoRR}, volume = {abs/0811.4138}, year = {2008}, url = {http://arxiv.org/abs/0811.4138}, eprinttype = {arXiv}, eprint = {0811.4138}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0811-4138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/MazurczykK07, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Covert Channel for Improving VoIP Security}, booktitle = {Advances in Information Processing and Protection}, pages = {271--280}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_24}, doi = {10.1007/978-0-387-73137-7\_24}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/MazurczykK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/MazurczykK06, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, title = {New security and control protocol for VoIP based on steganography and digital watermarking}, journal = {Ann. {UMCS} Informatica}, volume = {5}, number = {1}, pages = {417--426}, year = {2006}, url = {https://journals.umcs.pl/ai/article/view/3110}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/umcs/MazurczykK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/MazurczykK06, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, editor = {Janusz G{\'{o}}rski}, title = {New VoIP Traffic Security Scheme with Digital Watermarking}, booktitle = {Computer Safety, Reliability, and Security, 25th International Conference, {SAFECOMP} 2006, Gdansk, Poland, September 27-29, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4166}, pages = {170--181}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11875567\_13}, doi = {10.1007/11875567\_13}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/MazurczykK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0602042, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, title = {New security and control protocol for VoIP based on steganography and digital watermarking}, journal = {CoRR}, volume = {abs/cs/0602042}, year = {2006}, url = {http://arxiv.org/abs/cs/0602042}, eprinttype = {arXiv}, eprint = {cs/0602042}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0602042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0612054, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, title = {Lightweight security mechanism for PSTN-VoIP cooperation}, journal = {CoRR}, volume = {abs/cs/0612054}, year = {2006}, url = {http://arxiv.org/abs/cs/0612054}, eprinttype = {arXiv}, eprint = {cs/0612054}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0612054.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0506076, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, title = {Alternative security architecture for {IP} Telephony based on digital watermarking}, journal = {CoRR}, volume = {abs/cs/0506076}, year = {2005}, url = {http://arxiv.org/abs/cs/0506076}, eprinttype = {arXiv}, eprint = {cs/0506076}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0506076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.