default search action
Wojciech Mazurczyk
Person information
- affiliation: Warsaw University of Technology, Institute of Telecommunications, Poland
- affiliation: University of Hagen, Faculty of Mathematics and Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j125]Agnieszka Malanowska, Wojciech Mazurczyk, Tanya Koohpayeh Araghi, David Megías, Minoru Kuribayashi:
Digital Watermarking - A Meta-Survey and Techniques for Fake News Detection. IEEE Access 12: 36311-36345 (2024) - [j124]Wojciech Mazurczyk, Dongwon Lee, Andreas Vlachos:
Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective. Commun. ACM 67(3): 36-39 (2024) - [j123]Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk:
Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments. Comput. Networks 242: 110252 (2024) - [j122]Luca Caviglione, Wojciech Mazurczyk:
You Can't Do That on Protocols Anymore: Analysis of Covert Channels in IETF Standards. IEEE Netw. 38(5): 255-263 (2024) - [j121]Dominik Kolasa, Kinga Pilch, Wojciech Mazurczyk:
Federated learning secure model: A framework for malicious clients detection. SoftwareX 27: 101765 (2024) - [j120]Rafal Kozik, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras, Wojciech Mazurczyk, Krzysztof Cabaj:
A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods. IEEE Trans. Comput. Soc. Syst. 11(4): 5219-5229 (2024) - [c59]Kai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione:
Investigating HTTP Covert Channels Through Fuzz Testing. ARES 2024: 19:1-19:9 - [c58]Andrea Rosales, Agnieszka Malanowska, Tanya Koohpayeh Araghi, Minoru Kuribayashi, Marcin Kowalczyk, Daniel Blanche-Tarragó, Wojciech Mazurczyk, David Megías:
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation. ARES 2024: 76:1-76:10 - [c57]Tanya Koohpayeh Araghi, David Megías, Victor Garcia-Font, Minoru Kuribayashi, Wojciech Mazurczyk:
Disinformation detection and source tracking using semi-fragile watermarking and blockchain. EICC 2024: 136-143 - [c56]Krzysztof Cabaj, Marcin Kowalczyk, Marcin Gregorczyk, Michal Choras, Rafal Kozik, Wojciech Mazurczyk:
Strategies to Use Harvesters in Trustworthy Fake News Detection Systems. ICCCI (CCIS Volume 1) 2024: 384-394 - 2023
- [j119]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Hanyu Quan, Yonghong Chen:
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning. Comput. Electr. Eng. 111(Part A): 108909 (2023) - [j118]Piotr Zórawski, Luca Caviglione, Wojciech Mazurczyk:
A Long-Term Perspective of the Internet Susceptibility to Covert Channels. IEEE Commun. Mag. 61(10): 171-177 (2023) - [j117]Mikolaj Kowalski, Wojciech Mazurczyk:
Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures. Comput. Networks 230: 109778 (2023) - [j116]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Shiyan Ou, Hassan Dana Mazraeh, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Chuan Li:
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms. Comput. Secur. 130: 103263 (2023) - [j115]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk:
Avoiding Research Tribal Wars Using Taxonomies. Computer 56(1): 93-96 (2023) - [j114]Rafal Kozik, Wojciech Mazurczyk, Krzysztof Cabaj, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Deep Learning for Combating Misinformation in Multicategorical Text Contents. Sensors 23(24): 9666 (2023) - [j113]Hui Tian, Yiqin Qiu, Wojciech Mazurczyk, Haizhou Li, Zhenxing Qian:
STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams. IEEE ACM Trans. Audio Speech Lang. Process. 31: 277-289 (2023) - [c55]Pawel Rajba, Jörg Keller, Wojciech Mazurczyk:
Proof-of-work based new encoding scheme for information hiding purposes. ARES 2023: 45:1-45:8 - [c54]Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk, Helen C. Leligou, Marcin Przybyszewski, Rafal Kozik, Michal Choras:
Security Architecture in the SILVANUS project. ARES 2023: 49:1-49:9 - [c53]Rafal Kozik, Wojciech Mazurczyk, Krzysztof Cabaj, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models. DSAA 2023: 1-9 - [c52]Piotr Bialczak, Wojciech Mazurczyk:
Malware Classification Using Open Set Recognition and HTTP Protocol Requests. ESORICS (2) 2023: 235-254 - [i55]Wojciech Mazurczyk, Dongwon Lee, Andreas Vlachos:
Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective. CoRR abs/2306.05569 (2023) - 2022
- [j112]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Analysis of Reversible Network Covert Channels. IEEE Access 10: 41226-41238 (2022) - [j111]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Malika Bendechache:
Information Hiding in Digital Textual Contents: Techniques and Current Challenges. Computer 55(6): 56-65 (2022) - [j110]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr:
Emerging topics in defending networked systems. Future Gener. Comput. Syst. 128: 317-319 (2022) - [j109]Luca Caviglione, Wojciech Mazurczyk:
Never Mind the Malware, Here's the Stegomalware. IEEE Secur. Priv. 20(5): 101-106 (2022) - [j108]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen:
Towards blind detection of steganography in low-bit-rate speech streams. Int. J. Intell. Syst. 37(12): 12085-12112 (2022) - [j107]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Qianmu Li, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Brij Bhooshan Gupta, Mauro Conti:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j106]Zhihan Lv, Jaime Lloret Mauri, Houbing Song, Jun Shen, Wojciech Mazurczyk:
Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things. IEEE Internet Things Mag. 5(1): 58-60 (2022) - [j105]Zhihan Lv, Jaime Lloret, Houbing Song, Jun Shen, Wojciech Mazurczyk:
Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things: Part 2. IEEE Internet Things Mag. 5(2): 46-49 (2022) - [j104]Yiqin Qiu, Hui Tian, Lili Tang, Wojciech Mazurczyk, Chin-Chen Chang:
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords. J. Inf. Secur. Appl. 68: 103250 (2022) - [j103]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim-Kwang Raymond Choo, Mauro Conti:
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. J. Inf. Secur. Appl. 71: 103368 (2022) - [j102]Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Guest editorial: Information security methodology and replication studies. it Inf. Technol. 64(1-2): 1-3 (2022) - [j101]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Mauro Conti, Jing Zhang:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022) - [j100]Amirfarhad Nilizadeh, Shirin Nilizadeh, Wojciech Mazurczyk, Cliff C. Zou, Gary T. Leavens:
Adaptive Matrix Pattern Steganography on RGB Images. J. Cyber Secur. Mobil. 11(1) (2022) - [j99]David Megías, Minoru Kuribayashi, Andrea Rosales, Krzysztof Cabaj, Wojciech Mazurczyk:
Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 33-55 (2022) - [j98]Luca Caviglione, Andreas Schaffhauser, Marco Zuppelli, Wojciech Mazurczyk:
IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration. SoftwareX 17: 100975 (2022) - [j97]Marco Zuppelli, Matteo Repetto, Andreas Schaffhauser, Wojciech Mazurczyk, Luca Caviglione:
Code Layering for the Detection of Network Covert Channels in Agentless Systems. IEEE Trans. Netw. Serv. Manag. 19(3): 2282-2294 (2022) - [c51]Luca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk:
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit. ARES 2022: 46:1-46:7 - [c50]Marcin Kowalczyk, Agnieszka Malanowska, Wojciech Mazurczyk, Krzysztof Cabaj:
Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection. ARES 2022: 47:1-47:9 - [c49]Pawel Rajba, Wojciech Mazurczyk:
Limitations of Web Cryptojacking Detection: A Practical Evaluation. ARES 2022: 52:1-52:6 - [c48]Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk:
Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications. ARES 2022: 64:1-64:9 - 2021
- [j96]Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska:
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access 9: 5371-5396 (2021) - [j95]Pawel Rajba, Wojciech Mazurczyk:
Information Hiding Using Minification. IEEE Access 9: 66436-66449 (2021) - [j94]Grzegorz Siewruk, Wojciech Mazurczyk:
Context-Aware Software Vulnerability Classification Using Machine Learning. IEEE Access 9: 88852-88867 (2021) - [j93]Pawel Laka, Zbigniew Korzeb, Wojciech Mazurczyk:
Novel user authentication method based on body composition analysis. Ann. des Télécommunications 76(3-4): 175-185 (2021) - [j92]Wojciech Mazurczyk, Luca Caviglione:
Cyber reconnaissance techniques. Commun. ACM 64(3): 86-95 (2021) - [j91]Luca Caviglione, Wojciech Mazurczyk, Matteo Repetto, Andreas Schaffhauser, Marco Zuppelli:
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments. Comput. Networks 191: 108010 (2021) - [j90]Aleksandra Mileva, Aleksandar Velinov, Laura Hartmann, Steffen Wendzel, Wojciech Mazurczyk:
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Comput. Secur. 104: 102207 (2021) - [j89]Piotr Bialczak, Wojciech Mazurczyk:
Hfinger: Malware HTTP Request Fingerprinting. Entropy 23(5): 507 (2021) - [j88]Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk:
Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 20-43 (2021) - [j87]Dayu Shi, Xun Zhang, Lina Shi, Andrei Vladimirescu, Wojciech Mazurczyk, Krzysztof Cabaj, Ben Meunier, Kareem Ali, John Cosmas, Yue Zhang:
On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method. Sensors 21(4): 1515 (2021) - [c47]David Megías, Minoru Kuribayashi, Andrea Rosales, Wojciech Mazurczyk:
DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning. ARES 2021: 66:1-66:9 - [c46]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. ARES 2021: 67:1-67:12 - [c45]Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk:
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels. ARES 2021: 73:1-73:8 - [c44]Pawel Rajba, Wojciech Mazurczyk:
Data Hiding Using Code Obfuscation. ARES 2021: 75:1-75:10 - [c43]Javier Hospital, David Megías, Wojciech Mazurczyk:
Retransmission steganography in real-world scenarios: a practical study. EICC 2021: 60-65 - [c42]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo:
Do Dark Web and Cryptocurrencies Empower Cybercriminals? ICDF2C 2021: 277-293 - [c41]Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk:
Adaptive Warden Strategy for Countering Network Covert Storage Channels. LCN 2021: 148-153 - [c40]Luca Caviglione, Marco Zuppelli, Wojciech Mazurczyk, Andreas Schaffhauser, Matteo Repetto:
Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label. NetSoft 2021: 450-456 - [c39]Marcin Gregorczyk, Wojciech Mazurczyk:
Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach. SECRYPT 2021: 576-586 - [i54]Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller:
Countering Adaptive Network Covert Communication with Dynamic Wardens. CoRR abs/2103.00433 (2021) - [i53]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. CoRR abs/2106.08654 (2021) - [i52]Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk:
Adaptive Warden Strategy for Countering Network Covert Storage Channels. CoRR abs/2111.03310 (2021) - 2020
- [j86]Monika Skowron, Artur Janicki, Wojciech Mazurczyk:
Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning. IEEE Access 8: 20386-20400 (2020) - [j85]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Haitham Elwahsh, Md. Jalil Piran, Ali Kashif Bashir, Oh-Young Song, Wojciech Mazurczyk:
Providing End-to-End Security Using Quantum Walks in IoT Networks. IEEE Access 8: 92687-92696 (2020) - [j84]Marcin Gregorczyk, Piotr Zórawski, Piotr Nowakowski, Krzysztof Cabaj, Wojciech Mazurczyk:
Sniffing Detection Based on Network Traffic Probing and Machine Learning. IEEE Access 8: 149255-149269 (2020) - [j83]Tom Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 58(3): 54 (2020) - [j82]Tom Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 58(5): 48 (2020) - [j81]Thomas Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 58(7): 12 (2020) - [j80]Krzysztof Cabaj, Piotr Zórawski, Piotr Nowakowski, Maciej Purski, Wojciech Mazurczyk:
Efficient distributed network covert channels for Internet of things environments†. J. Cybersecur. 6(1) (2020) - [j79]Wojciech Mazurczyk, Pascal Bisson, Roger Piqueras Jover, Koji Nakao, Krzysztof Cabaj:
Special issue on Advancements in 5G Networks Security. Future Gener. Comput. Syst. 110: 314-316 (2020) - [j78]Jens Saenger, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
VoIP network covert channels to enhance privacy and information sharing. Future Gener. Comput. Syst. 111: 96-106 (2020) - [j77]Slawomir Nowaczewski, Wojciech Mazurczyk:
Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(3): 87-106 (2020) - [j76]Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Information Security Methodology, Replication Studies and Information Security Education. J. Univers. Comput. Sci. 26(7): 762-763 (2020) - [j75]Piotr Bialczak, Wojciech Mazurczyk:
Characterizing Anomalies in Malware-Generated HTTP Traffic. Secur. Commun. Networks 2020: 8848863:1-8848863:26 (2020) - [j74]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Wojciech Mazurczyk, Carol J. Fung, Salvador E. Venegas-Andraca:
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Trans. Netw. Serv. Manag. 17(1): 118-131 (2020) - [j73]Wojciech Mazurczyk, Pascal Bisson, Roger Piqueras Jover, Koji Nakao, Krzysztof Cabaj:
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wirel. Commun. 27(4): 6-7 (2020) - [c38]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Design and performance evaluation of reversible network covert channels. ARES 2020: 68:1-68:8 - [c37]Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk:
Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study. ARES 2020: 69:1-69:10 - [c36]Pawel Rajba, Wojciech Mazurczyk:
Exploiting minification for data hiding purposes. ARES 2020: 72:1-72:9 - [c35]Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk:
Distributed packet inspection for network security purposes in software-defined networking environments. ARES 2020: 106:1-106:7 - [c34]John Cosmas, Nawar Jawad, Kareem Ali, Ben Meunier, Yue Zhang, Wei Li, Marcin Gregorczyk, Wojciech Mazurczyk, Krzysztof Cabaj, Mathias Lacaud, Daniel Négru, Sara Cuerva Navas, Ignacio Losas Davila, Charilaos C. Zarakovitis, Harilaos Koumaras, Michail-Alexandros Kourtis:
Network and Application Layer Services for High Performance Communications in Buildings. BMSB 2020: 1-8 - [c33]Corinna Heinz, Wojciech Mazurczyk, Luca Caviglione:
Covert Channels in Transport Layer Security. EICC 2020: 6:1-6:6 - [c32]Maciej Korczynski, Wojciech Mazurczyk, Pedro Casas:
Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity. EuroS&P Workshops 2020: 521
2010 – 2019
- 2019
- [j72]Aleksandar Velinov, Aleksandra Mileva, Steffen Wendzel, Wojciech Mazurczyk:
Covert Channels in the MQTT-Based Internet of Things. IEEE Access 7: 161899-161915 (2019) - [j71]Thomas Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 57(1): 42 (2019) - [j70]Tom Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 57(4): 94 (2019) - [j69]Thomas Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 57(9): 112 (2019) - [j68]Tom Alexander, Wojciech Mazurczyk, Amitabh Mishra, Alberto Perotti:
Mobile Communications and Networks. IEEE Commun. Mag. 57(12): 37 (2019) - [j67]Krzysztof Opasiak, Wojciech Mazurczyk:
(In)Secure Android Debugging: Security analysis and lessons learned. Comput. Secur. 82: 80-98 (2019) - [j66]Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller:
Countering adaptive network covert communication with dynamic wardens. Future Gener. Comput. Syst. 94: 712-725 (2019) - [j65]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk:
Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener. Comput. Syst. 100: 893-906 (2019) - [j64]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics, Part 2. IEEE Secur. Priv. 17(1): 7-8 (2019) - [j63]Artur Janicki, Wojciech Mazurczyk, Xiangyang Luo, Dengpan Ye:
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes. J. Univers. Comput. Sci. 25(9): 1039-1042 (2019) - [j62]Jörg Keller, Wojciech Mazurczyk, Béla Genge, Lothar Fritsch, Simon Vrhovec:
Cyberattack Detection and Response. J. Univers. Comput. Sci. 25(11): 1394-1395 (2019) - [j61]Steffen Wendzel, Florian Link, Daniela Eller, Wojciech Mazurczyk:
Detection of Size Modulation Covert Channels Using Countermeasure Variation. J. Univers. Comput. Sci. 25(11): 1396-1416 (2019) - [j60]Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System. Secur. Commun. Networks 2019: 4930908:1-4930908:22 (2019) - [j59]Nawar Jawad, Mukhald A. Salih, Kareem Ali, Ben Meunier, Yue Zhang, Xun Zhang, Rudolf Zetik, Charilaos C. Zarakovitis, Harilaos Koumaras, Michail-Alexandros Kourtis, Lina Shi, Wojciech Mazurczyk, John Cosmas:
Smart Television Services Using NFV/SDN Network Management. IEEE Trans. Broadcast. 65(2): 404-413 (2019) - [j58]Zhihan Lv, Wojciech Mazurczyk, Steffen Wendzel, Houbing Song:
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments. IEEE Trans. Ind. Informatics 15(12): 6468-6471 (2019) - [c31]Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, Wojciech Mazurczyk:
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks. ARES 2019: 64:1-64:10 - [c30]Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability. ARES 2019: 65:1-65:8 - [c29]Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione:
Towards Reversible Storage Network Covert Channels. ARES 2019: 69:1-69:8 - [c28]Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches. ARES 2019: 108:1-108:8 - [c27]Usman Rauf, Mujahid Mohsin, Wojciech Mazurczyk:
Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense. BICT 2019: 156-174 - [c26]Wojciech Mazurczyk, Krystian Powójski, Luca Caviglione:
IPv6 Covert Channels in the Wild. CECC 2019: 10:1-10:6 - [c25]Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, Pascal Berthomé:
Teaching Android Mobile Security. SIGCSE 2019: 232-238 - [c24]Marcin Skwarek, Maciej Korczynski, Wojciech Mazurczyk, Andrzej Duda:
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning. IEEE Symposium on Security and Privacy Workshops 2019: 193-198 - 2018
- [j57]Wojciech Mazurczyk, Steffen Wendzel:
Information hiding: Challenges for forensic experts. Commun. ACM 61(1): 86-94 (2018) - [j56]Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk:
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. Comput. Electr. Eng. 66: 353-368 (2018) - [j55]Sabine S. Schmidt, Wojciech Mazurczyk, Radoslaw Kulesza, Jörg Keller, Luca Caviglione:
Exploiting IP telephony with silence suppression for hidden data transfers. Comput. Secur. 79: 17-32 (2018) - [j54]Krzysztof Cabaj, Zbigniew Kotulski, Bogdan Ksiezopolski, Wojciech Mazurczyk:
Cybersecurity: trends, issues, and challenges. EURASIP J. Inf. Secur. 2018: 10 (2018) - [j53]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: The Road Ahead. IT Prof. 20(3): 31-39 (2018) - [j52]Jörg Keller, Igor Bernik, Wojciech Mazurczyk:
Technical and Social Aspects of Critical Infrastructure Security. J. Univers. Comput. Sci. 24(5): 554-555 (2018) - [j51]Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Secur. Commun. Networks 2018: 9672523:1 (2018) - [j50]Pawel Laka, Wojciech Mazurczyk:
User perspective and security of a new mobile authentication method. Telecommun. Syst. 69(3): 365-379 (2018) - [c23]John Cosmas, Ben Meunier, Kareem Ali, Nawar Jawad, Mukhald A. Salih, Yue Zhang, Zion Hadad, Baruch Globen, Haluk Gokmen, Sibel Malkos, Memduh Emre Cakan, Harilaos Koumaras, Akis Kourtis, Christos Sakkas, Daniel Négru, Mathias Lacaud, Moshe Ran, Einat Ran, Jorge Garcia, Wei Li, Li-Ke Huang, Rudolf Zetik, Krzysztof Cabaj, Woiciech Mazurczyk, Xun Zhang, Adam Kapovits:
A 5G Radio-Light SDN Architecture for Wireless and Mobile Network Access in Buildings. 5G World Forum 2018: 135-140 - [c22]Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj:
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. ARES 2018: 10:1-10:10 - [c21]Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. ARES 2018: 12:1-12:10 - [c20]Daniel Geisler, Wojciech Mazurczyk, Jörg Keller:
Towards Utilization of Covert Channels as a Green Networking Technique. ARES 2018: 14:1-14:10 - [c19]Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System. ARES 2018: 49 - [c18]Andrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser:
A review of network vulnerabilities scanning tools: types, capabilities and functioning. ARES 2018: 65:1-65:10 - [c17]John Cosmas, Ben Meunier, Kareem Ali, Nawar Jawad, Mukhald A. Salih, Hongying Meng, Martin Ganley, James Gbadamosi, Atanas Savov, Zion Hadad, Baruch Globen, Haluk Gokmen, Sibel Malkos, Memduh Emre Cakan, Harilaos Koumaras, Michail-Alexandros Kourtis, Christos Sakkas, Eliron Salomon, Yoav Avinoam, Daniel Négru, Mathias Lacaud, Yue Zhang, Li-Ke Huang, Rudolf Zetik, Krzysztof Cabaj, Woiciech Mazurczyk, Xun Zhang, Moshe Ran, Dror Malka, Adam Kapovits:
A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses. BMSB 2018: 1-6 - [c16]Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk:
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. CECC 2018: 1:1-1:6 - [e2]Maciej Korczynski, Wojciech Mazurczyk, Pedro Casas:
Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, WTMC@SIGCOMM 2018, Budapest, Hungary, August 20, 2018. ACM 2018, ISBN 978-1-4503-5910-8 [contents] - [i51]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: the Road Ahead. CoRR abs/1801.00694 (2018) - 2017
- [j49]Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [j48]Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione:
Detecting local covert channels using process activity correlation on Android smartphones. Comput. Syst. Sci. Eng. 32(2) (2017) - [j47]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics. IEEE Secur. Priv. 15(6): 10-11 (2017) - [j46]Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk:
The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Secur. Priv. 15(6): 12-17 (2017) - [j45]Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
Steganography for Cyber-physicalSystems. J. Cyber Secur. Mobil. 6(2): 105-126 (2017) - [j44]Luca Caviglione, Maciej Podolski, Wojciech Mazurczyk, Massimo Ianigro:
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox. IEEE Trans. Ind. Informatics 13(4): 1921-1931 (2017) - [c15]Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. ARES 2017: 83:1-83:6 - [c14]Amirfarhad Nilizadeh, Wojciech Mazurczyk, Cliff C. Zou, Gary T. Leavens:
Information Hiding in RGB Images Using an Improved Matrix Pattern Approach. CVPR Workshops 2017: 1407-1415 - [c13]Florian Lehner, Wojciech Mazurczyk, Jörg Keller, Steffen Wendzel:
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach. LCN 2017: 78-85 - [c12]Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems. IEEE Symposium on Security and Privacy Workshops 2017: 29-34 - [e1]Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5 [contents] - 2016
- [j43]Wojciech Mazurczyk, Sean Moore, Errin W. Fulp, Hiroshi Wada, Kenji Leibnitz:
Bio-inspired cyber security for communications and networking. IEEE Commun. Mag. 54(6): 58-59 (2016) - [j42]Tomasz Andrysiak, Lukasz Saganowski, Wojciech Mazurczyk:
Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average. EURASIP J. Wirel. Commun. Netw. 2016: 245 (2016) - [j41]Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander:
Unified Description for Network Information Hiding Methods. J. Univers. Comput. Sci. 22(11): 1456-1486 (2016) - [j40]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki:
YouSkyde: information hiding for Skype video traffic. Multim. Tools Appl. 75(21): 13521-13540 (2016) - [j39]Krzysztof Cabaj, Wojciech Mazurczyk:
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall. IEEE Netw. 30(6): 14-20 (2016) - [j38]Krzysztof Szczypiorski, Wojciech Mazurczyk:
Steganography in IEEE 802.11 OFDM symbols. Secur. Commun. Networks 9(2): 118-129 (2016) - [j37]Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki, Hui Tian:
Trends in modern information hiding: techniques, applications, and detection. Secur. Commun. Networks 9(8): 703-704 (2016) - [j36]Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On importance of steganographic cost for network steganography. Secur. Commun. Networks 9(8): 781-790 (2016) - [j35]Wojciech Mazurczyk, Krzysztof Szczypiorski, Zoran Duric, Dengpan Ye:
Cyber Crime. Secur. Commun. Networks 9(15): 2861-2863 (2016) - [j34]Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller:
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Secur. Commun. Networks 9(15): 2972-2985 (2016) - [j33]Wojciech Mazurczyk, Thomas Holt, Krzysztof Szczypiorski:
Guest Editors' Introduction: Special Issue on Cyber Crime. IEEE Trans. Dependable Secur. Comput. 13(2): 146-147 (2016) - [j32]Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk, Marcin Urbanski:
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Trans. Inf. Forensics Secur. 11(4): 799-810 (2016) - [c11]Steffen Wendzel, Wojciech Mazurczyk:
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. CCS 2016: 1739-1741 - [i50]Krzysztof Cabaj, Wojciech Mazurczyk:
Using Software-Defined Networking for Ransomware Mitigation: the Case of CryptoWall. CoRR abs/1608.06673 (2016) - [i49]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki:
YouSkyde: Information Hiding for Skype Video Traffic. CoRR abs/1608.07337 (2016) - [i48]Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk:
Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics. CoRR abs/1611.08294 (2016) - 2015
- [j31]Luca Caviglione, Wojciech Mazurczyk:
Understanding Information Hiding in iOS. Computer 48(1): 62-65 (2015) - [j30]Wojciech Mazurczyk, Luca Caviglione:
Steganography in Modern Smartphones and Mitigation Techniques. IEEE Commun. Surv. Tutorials 17(1): 334-357 (2015) - [j29]Wojciech Mazurczyk, Luca Caviglione:
Information Hiding as a Challenge for Malware Detection. IEEE Secur. Priv. 13(2): 89-93 (2015) - [j28]Wojciech Mazurczyk, Elzbieta Rzeszutko:
Security-A Perpetual War: Lessons from Nature. IT Prof. 17(1): 16-22 (2015) - [j27]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
On the undetectability of transcoding steganography. Secur. Commun. Networks 8(18): 3804-3814 (2015) - [j26]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Influence of speech codecs selection on transcoding steganography. Telecommun. Syst. 59(3): 305-315 (2015) - [c10]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. HCI (22) 2015: 165-177 - [i47]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. CoRR abs/1502.00868 (2015) - [i46]Wojciech Mazurczyk, Luca Caviglione:
Information Hiding as a Challenge for Malware Detection. CoRR abs/1504.04867 (2015) - [i45]Wojciech Mazurczyk, Szymon Drobniak, Sean Moore:
Towards a Systematic View on Cybersecurity Ecology. CoRR abs/1505.04207 (2015) - [i44]Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller:
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. CoRR abs/1505.07757 (2015) - [i43]Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander:
Unified Description for Network Information Hiding Methods. CoRR abs/1512.07438 (2015) - 2014
- [j25]Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian:
Network forensics and challenges for cybersecurity. Ann. des Télécommunications 69(7-8): 345-346 (2014) - [j24]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of transcoding steganography. Ann. des Télécommunications 69(7-8): 449-460 (2014) - [j23]Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Trends in steganography. Commun. ACM 57(3): 86-95 (2014) - [j22]Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Principles and overview of network steganography. IEEE Commun. Mag. 52(5): 225-229 (2014) - [j21]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Advances in digital media security and right management. Multim. Syst. 20(2): 101-103 (2014) - [j20]Wojciech Mazurczyk, Pawel Szaga, Krzysztof Szczypiorski:
Using transcoding for hidden communication in IP telephony. Multim. Tools Appl. 70(3): 2139-2165 (2014) - [j19]Wojciech Mazurczyk, Józef Lubacz, Krzysztof Szczypiorski:
On steganography in lost audio packets. Secur. Commun. Networks 7(12): 2602-2615 (2014) - [c9]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. ISSE 2014: 123-133 - [c8]Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Improving Hard Disk Contention-Based Covert Channel in Cloud Computing. IEEE Symposium on Security and Privacy Workshops 2014: 100-107 - [i42]Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment. CoRR abs/1402.0239 (2014) - [i41]Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On Importance of Steganographic Cost For Network Steganography. CoRR abs/1406.2519 (2014) - [i40]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. CoRR abs/1407.2029 (2014) - [i39]Wojciech Mazurczyk, Elzbieta Rzeszutko:
Security - a perpetual war: lessons from nature. CoRR abs/1410.4795 (2014) - [i38]Wojciech Mazurczyk, Luca Caviglione:
Steganography in Modern Smartphones and Mitigation Techniques. CoRR abs/1410.6796 (2014) - [i37]Elzbieta Rzeszutko, Wojciech Mazurczyk:
Insights from the Nature for Cybersecurity. CoRR abs/1410.8317 (2014) - [i36]Luca Caviglione, Wojciech Mazurczyk:
How to covertly leak data from iOS? CoRR abs/1411.3000 (2014) - 2013
- [j18]Wojciech Mazurczyk:
VoIP steganography and its Detection - A survey. ACM Comput. Surv. 46(2): 20:1-20:21 (2013) - [j17]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski:
SkyDe: a Skype-based Steganographic Method. Int. J. Comput. Commun. Control 8(3): 432-443 (2013) - [j16]Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian, Yali Liu:
Trends in modern information hiding: techniques, applications and detection. Secur. Commun. Networks 6(11): 1414-1415 (2013) - [j15]Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
PadSteg: introducing inter-protocol steganography. Telecommun. Syst. 52(2): 1101-1111 (2013) - [j14]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
On information hiding in retransmissions. Telecommun. Syst. 52(2): 1113-1121 (2013) - [c7]Marcin Seredynski, Riad Aggoune, Wojciech Mazurczyk, Krzysztof Szczypiorski, Djamel Khadraoui:
Vehicular ad hoc networks for joint traffic and mobility management. ICUMT 2013: 7-12 - [c6]Marcin Seredynski, Wojciech Mazurczyk, Djamel Khadraoui:
Multi-segment Green Light Optimal Speed Advisory. IPDPS Workshops 2013: 459-465 - [c5]Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski:
StegTorrent: A Steganographic Method for the P2P File Sharing Service. IEEE Symposium on Security and Privacy Workshops 2013: 151-157 - [i35]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski:
SkyDe: a Skype-based Steganographic Method. CoRR abs/1301.3632 (2013) - [i34]Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski:
StegTorrent: a Steganographic Method for the P2P File Sharing Service. CoRR abs/1303.4264 (2013) - 2012
- [j13]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Toward Effective and Reliable Digital Forensics. Comput. J. 55(6): 651-652 (2012) - [j12]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Hiding information in a Stream Control Transmission Protocol. Comput. Commun. 35(2): 159-169 (2012) - [j11]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Multilevel Steganography: Improving Hidden Communication in Networks. J. Univers. Comput. Sci. 18(14): 1967-1986 (2012) - [j10]Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski:
What are suspicious VoIP delays? Multim. Tools Appl. 57(1): 109-126 (2012) - [j9]Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhöner, Antonio Grillo, Alessandro Lentini, Luísa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela, Tiago T. V. Vinhoza:
Security and privacy issues for the network of the future. Secur. Commun. Networks 5(9): 987-1005 (2012) - [j8]Wojciech Mazurczyk:
Lost audio packets steganography: the first practical evaluation. Secur. Commun. Networks 5(12): 1394-1403 (2012) - [j7]Krzysztof Szczypiorski, Wojciech Mazurczyk:
Toward network steganography detection. Telecommun. Syst. 49(2): 161-162 (2012) - [j6]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Evaluation of steganographic methods for oversized IP packets. Telecommun. Syst. 49(2): 207-217 (2012) - [j5]Tomasz Ciszkowski, Wojciech Mazurczyk, Zbigniew Kotulski, Tobias Hoßfeld, Markus Fiedler, Denis Collange:
Towards Quality of Experience-based reputation models for future web service provisioning. Telecommun. Syst. 51(4): 283-295 (2012) - [c4]Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski:
Towards steganography detection through network traffic visualisation. ICUMT 2012: 947-954 - [i33]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Influence of Speech Codecs Selection on Transcoding Steganography. CoRR abs/1201.6218 (2012) - [i32]Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski:
The Advent of Steganography in Computing Environments. CoRR abs/1202.5289 (2012) - [i31]Wojciech Mazurczyk:
VoIP Steganography and Its Detection - A Survey. CoRR abs/1203.4374 (2012) - [i30]Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Principles and Overview of Network Steganography. CoRR abs/1207.0917 (2012) - [i29]Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski:
Towards Steganography Detection Through Network Traffic Visualisation. CoRR abs/1208.2861 (2012) - [i28]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of Transcoding Steganography. CoRR abs/1210.5888 (2012) - 2011
- [j4]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Retransmission steganography and its detection. Soft Comput. 15(3): 505-515 (2011) - [i27]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Multi-Level Steganography: Improving Hidden Communication in Networks. CoRR abs/1101.4789 (2011) - [i26]Wojciech Mazurczyk, Józef Lubacz, Krzysztof Szczypiorski:
On Steganography in Lost Audio Packets. CoRR abs/1102.0023 (2011) - [i25]Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
PadSteg: Introducing Inter-Protocol Steganography. CoRR abs/1104.0422 (2011) - [i24]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Hiding Information in a Stream Control Transmission Protocol. CoRR abs/1104.3333 (2011) - [i23]Piotr Bialczak, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Sending Hidden Data via Google Suggest. CoRR abs/1107.4062 (2011) - [i22]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
How Hidden Can Be Even More Hidden? CoRR abs/1107.4065 (2011) - [i21]Wojciech Mazurczyk:
Lost Audio Packets Steganography: The First Practical Evaluation. CoRR abs/1107.4076 (2011) - [i20]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Is Cloud Computing Steganography-proof? CoRR abs/1107.4077 (2011) - [i19]Wojciech Mazurczyk, Pawel Kopiczko:
What more can be learnt about BitTorrent from meta-data files and μTorrent logs? CoRR abs/1110.6265 (2011) - [i18]Wojciech Mazurczyk, Pawel Szaga, Krzysztof Szczypiorski:
Using Transcoding for Hidden Communication in IP Telephony. CoRR abs/1111.1250 (2011) - 2010
- [j3]Wojciech Mazurczyk, Józef Lubacz:
LACK - a VoIP steganographic method. Telecommun. Syst. 45(2-3): 153-163 (2010) - [i17]Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski:
What are suspicious VoIP delays? CoRR abs/1002.4303 (2010) - [i16]Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Information Hiding Using Improper Frame Padding. CoRR abs/1005.1925 (2010) - [i15]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Stream Control Transmission Protocol Steganography. CoRR abs/1006.0247 (2010) - [i14]Krzysztof Szczypiorski, Wojciech Mazurczyk:
Hiding Data in OFDM Symbols of IEEE 802.11 Networks. CoRR abs/1006.0495 (2010) - [i13]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Retransmission Steganography Applied. CoRR abs/1007.0767 (2010)
2000 – 2009
- 2009
- [i12]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Hiding Information in Retransmissions. CoRR abs/0905.0363 (2009) - [i11]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography in Handling Oversized IP Packets. CoRR abs/0907.0313 (2009) - 2008
- [j2]Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski, Radu Lupu, Wojciech Mazurczyk:
SecMon: end-to-end quality and security monitoring system. Ann. UMCS Informatica 8(1): 185-201 (2008) - [c3]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography of VoIP Streams. OTM Conferences (2) 2008: 1001-1018 - [c2]Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski:
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. OTM Conferences (2) 2008: 1019-1035 - [i10]Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski, Radu Lupu, Wojciech Mazurczyk:
SecMon: End-to-End Quality and Security Monitoring System. CoRR abs/0804.0134 (2008) - [i9]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography of VoIP streams. CoRR abs/0805.2938 (2008) - [i8]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Covert Channels in SIP for VoIP signalling. CoRR abs/0805.3538 (2008) - [i7]Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk:
Steganographic Routing in Multi Agent System Environment. CoRR abs/0806.0576 (2008) - [i6]Wojciech Mazurczyk, Józef Lubacz:
Analysis of a procedure for inserting steganographic data into VoIP calls. CoRR abs/0806.1034 (2008) - [i5]Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski:
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. CoRR abs/0808.4060 (2008) - [i4]Wojciech Mazurczyk, Józef Lubacz:
LACK - a VoIP Steganographic Method. CoRR abs/0811.4138 (2008) - 2007
- [p1]Wojciech Mazurczyk, Zbigniew Kotulski:
Covert Channel for Improving VoIP Security. Advances in Information Processing and Protection 2007: 271-280 - 2006
- [j1]Wojciech Mazurczyk, Zbigniew Kotulski:
New security and control protocol for VoIP based on steganography and digital watermarking. Ann. UMCS Informatica 5(1): 417-426 (2006) - [c1]Wojciech Mazurczyk, Zbigniew Kotulski:
New VoIP Traffic Security Scheme with Digital Watermarking. SAFECOMP 2006: 170-181 - [i3]Wojciech Mazurczyk, Zbigniew Kotulski:
New security and control protocol for VoIP based on steganography and digital watermarking. CoRR abs/cs/0602042 (2006) - [i2]Wojciech Mazurczyk, Zbigniew Kotulski:
Lightweight security mechanism for PSTN-VoIP cooperation. CoRR abs/cs/0612054 (2006) - 2005
- [i1]Wojciech Mazurczyk, Zbigniew Kotulski:
Alternative security architecture for IP Telephony based on digital watermarking. CoRR abs/cs/0506076 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint