Wojciech Mazurczyk

According to our database1, Wojciech Mazurczyk authored at least 133 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario.
IEEE Trans. Netw. Serv. Manag., 2020

Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020

VoIP network covert channels to enhance privacy and information sharing.
Future Gener. Comput. Syst., 2020

Special issue on Advancements in 5G Networks Security.
Future Gener. Comput. Syst., 2020

Mobile Communications and Networks.
IEEE Commun. Mag., 2020

Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning.
IEEE Access, 2020

Sniffing Detection Based on Network Traffic Probing and Machine Learning.
IEEE Access, 2020

Providing End-to-End Security Using Quantum Walks in IoT Networks.
IEEE Access, 2020

Design and performance evaluation of reversible network covert channels.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Exploiting minification for data hiding purposes.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Distributed packet inspection for network security purposes in software-defined networking environments.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Trans. Ind. Informatics, 2019

Smart Television Services Using NFV/SDN Network Management.
IEEE Trans. Broadcast., 2019

Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.
Secur. Commun. Networks, 2019

Detection of Size Modulation Covert Channels Using Countermeasure Variation.
J. Univers. Comput. Sci., 2019

Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes.
J. Univers. Comput. Sci., 2019

Cyberattack Detection and Response.
J. Univers. Comput. Sci., 2019

Recent Advancements in Digital Forensics, Part 2.
IEEE Secur. Priv., 2019

Countering adaptive network covert communication with dynamic wardens.
Future Gener. Comput. Syst., 2019

Efficient quantum-based security protocols for information sharing and data protection in 5G networks.
Future Gener. Comput. Syst., 2019

(In)Secure Android Debugging: Security analysis and lessons learned.
Comput. Secur., 2019

Covert Channels in the MQTT-Based Internet of Things.
IEEE Access, 2019

Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Teaching Android Mobile Security.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

IPv6 Covert Channels in the Wild.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Towards Reversible Storage Network Covert Channels.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
User perspective and security of a new mobile authentication method.
Telecommun. Syst., 2018

Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Secur. Commun. Networks, 2018

Technical and Social Aspects of Critical Infrastructure Security.
J. Univers. Comput. Sci., 2018

The New Threats of Information Hiding: The Road Ahead.
IT Prof., 2018

Cybersecurity: trends, issues, and challenges.
EURASIP J. Inf. Secur., 2018

Exploiting IP telephony with silence suppression for hidden data transfers.
Comput. Secur., 2018

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics.
Comput. Electr. Eng., 2018

Information hiding: Challenges for forensic experts.
Commun. ACM, 2018

One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

A review of network vulnerabilities scanning tools: types, capabilities and functioning.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Utilization of Covert Channels as a Green Networking Technique.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018


2017
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox.
IEEE Trans. Ind. Informatics, 2017

Steganography for Cyber-physicalSystems.
J. Cyber Secur. Mobil., 2017

Recent Advancements in Digital Forensics.
IEEE Secur. Priv., 2017

The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Secur. Priv., 2017

Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017

Traffic Measurements for Cyber Security.
IEEE Commun. Mag., 2017

Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016

Guest Editors' Introduction: Special Issue on Cyber Crime.
IEEE Trans. Dependable Secur. Comput., 2016

Steganography in IEEE 802.11 OFDM symbols.
Secur. Commun. Networks, 2016

Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
Secur. Commun. Networks, 2016

On importance of steganographic cost for network steganography.
Secur. Commun. Networks, 2016

Trends in modern information hiding: techniques, applications, and detection.
Secur. Commun. Networks, 2016

Cyber Crime.
Secur. Commun. Networks, 2016

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall.
IEEE Netw., 2016

YouSkyde: information hiding for Skype video traffic.
Multim. Tools Appl., 2016

Unified Description for Network Information Hiding Methods.
J. Univers. Comput. Sci., 2016

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average.
EURASIP J. Wirel. Commun. Netw., 2016

Bio-inspired cyber security for communications and networking.
IEEE Commun. Mag., 2016

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Influence of speech codecs selection on transcoding steganography.
Telecommun. Syst., 2015

On the undetectability of transcoding steganography.
Secur. Commun. Networks, 2015

Security-A Perpetual War: Lessons from Nature.
IT Prof., 2015

Information Hiding as a Challenge for Malware Detection.
IEEE Secur. Priv., 2015

Towards a Systematic View on Cybersecurity Ecology.
CoRR, 2015

Steganography in Modern Smartphones and Mitigation Techniques.
IEEE Commun. Surv. Tutorials, 2015

Understanding Information Hiding in iOS.
Computer, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
On steganography in lost audio packets.
Secur. Commun. Networks, 2014

Using transcoding for hidden communication in IP telephony.
Multim. Tools Appl., 2014

Advances in digital media security and right management.
Multim. Syst., 2014

Insights from the Nature for Cybersecurity.
CoRR, 2014

Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment.
CoRR, 2014

How to covertly leak data from iOS?
CoRR, 2014

Principles and overview of network steganography.
IEEE Commun. Mag., 2014

Trends in steganography.
Commun. ACM, 2014

Network forensics and challenges for cybersecurity.
Ann. des Télécommunications, 2014

Steganalysis of transcoding steganography.
Ann. des Télécommunications, 2014

Improving Hard Disk Contention-Based Covert Channel in Cloud Computing.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

2013
On information hiding in retransmissions.
Telecommun. Syst., 2013

PadSteg: introducing inter-protocol steganography.
Telecommun. Syst., 2013

Trends in modern information hiding: techniques, applications and detection.
Secur. Commun. Networks, 2013

SkyDe: a Skype-based Steganographic Method.
Int. J. Comput. Commun. Control, 2013

VoIP steganography and its Detection - A survey.
ACM Comput. Surv., 2013

StegTorrent: A Steganographic Method for the P2P File Sharing Service.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Multi-segment Green Light Optimal Speed Advisory.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

Vehicular ad hoc networks for joint traffic and mobility management.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

2012
Toward network steganography detection.
Telecommun. Syst., 2012

Evaluation of steganographic methods for oversized IP packets.
Telecommun. Syst., 2012

Towards Quality of Experience-based reputation models for future web service provisioning.
Telecommun. Syst., 2012

Lost audio packets steganography: the first practical evaluation.
Secur. Commun. Networks, 2012

Security and privacy issues for the network of the future.
Secur. Commun. Networks, 2012

What are suspicious VoIP delays?
Multim. Tools Appl., 2012

Multilevel Steganography: Improving Hidden Communication in Networks.
J. Univers. Comput. Sci., 2012

The Advent of Steganography in Computing Environments
CoRR, 2012

Hiding information in a Stream Control Transmission Protocol.
Comput. Commun., 2012

Toward Effective and Reliable Digital Forensics.
Comput. J., 2012

Towards steganography detection through network traffic visualisation.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

2011
Retransmission steganography and its detection.
Soft Comput., 2011

What more can be learnt about BitTorrent from meta-data files and μTorrent logs?
CoRR, 2011

Is Cloud Computing Steganography-proof?
CoRR, 2011

How Hidden Can Be Even More Hidden?
CoRR, 2011

Sending Hidden Data via Google Suggest
CoRR, 2011

Multi-Level Steganography: Improving Hidden Communication in Networks
CoRR, 2011

2010
LACK - a VoIP steganographic method.
Telecommun. Syst., 2010

Retransmission Steganography Applied
CoRR, 2010

Hiding Data in OFDM Symbols of IEEE 802.11 Networks
CoRR, 2010

Stream Control Transmission Protocol Steganography
CoRR, 2010

Information Hiding Using Improper Frame Padding
CoRR, 2010

2009
Steganography in Handling Oversized IP Packets
CoRR, 2009

Hiding Information in Retransmissions
CoRR, 2009

2008
SecMon: end-to-end quality and security monitoring system.
Ann. UMCS Informatica, 2008

Analysis of a procedure for inserting steganographic data into VoIP calls
CoRR, 2008

Steganographic Routing in Multi Agent System Environment
CoRR, 2008

Covert Channels in SIP for VoIP signalling
CoRR, 2008

TrustMAS: Trusted Communication Platform for Multi-Agent Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Steganography of VoIP Streams.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Covert Channel for Improving VoIP Security.
Proceedings of the Advances in Information Processing and Protection., 2007

2006
New security and control protocol for VoIP based on steganography and digital watermarking.
Ann. UMCS Informatica, 2006

Lightweight security mechanism for PSTN-VoIP cooperation
CoRR, 2006

New VoIP Traffic Security Scheme with Digital Watermarking.
Proceedings of the Computer Safety, 2006

2005
Alternative security architecture for IP Telephony based on digital watermarking
CoRR, 2005


  Loading...