book projects: I wrote 5 books (1x sole author, 1x first author, 3x 2nd author, overall: 16 editions) and published some edited proceedings book chapters. Publishers: Wiley-IEEE, Springer and Galileo Press/Rheinwerk Verlag.

 Information Hiding in Communication Networks  Einstieg in Linux Tunnel und verdeckte Kanäle im Netz Linux. Das umfassende Handbuch Praxisbuch Netzwerksicherheit

scientific papers at ACM Computing Surveys (CSUR), Comm. ACM (CACM, 2x), Journal of Universal Computer Science (J.UCS, 2x), Springer Annals of Telecommunications (ANTE), IFIP Sec, IEEE LCN, WILEY Security and Communication Networks (3x), IFIP CMS (2x) and others.

Books (listed by appearance of first edition)

  1. Steffen Wendzel:
    Netzwerksicherheit (tentative title; book in progress),
    Springer, 2017.
  2. Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, Krzysztof Szczypiorski:
    Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications,
    IEEE Series on Information and Communication Networks Security,
    Wiley, 2016 (cf.
  3. Steffen Wendzel:
    Tunnel und verdeckte Kanäle im Netz,
    1st Ed. Springer-Vieweg, 2012.
  4. Johannes Plötner, Steffen Wendzel:
    Linux. Das umfassende Handbuch, [Download]
    5th Ed., Galileo Press, 2012.
    4th Ed., Galileo Press, 2011.
    3rd Ed., Galileo Press, 2009.
    2nd Ed., Galileo Press, 2008.
    1st Ed., Galileo Press, 2006.
  5. Johannes Plötner, Steffen Wendzel:
    Praxisbuch Netzwerk-Sicherheit, [Download]
    2nd Ed., Galieo Press, 2007.
    1st Ed., Galieo Press, 2005.
  6. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    7th Ed., Rheinwerk, 2016.
    6th Ed., Galileo Press, 2014.
    5th Ed., Galileo Press, 2012.
    4rd Ed., Galileo Press, 2010.
    3rd Ed., Galileo Press, 2008.
    2nd Ed., Galileo Press, 2006.
    1st Ed., Galileo Press, 2004.

Work in Progress / Submitted

  1. W. Mazurczyk, S. Wendzel, M. Chourib, J. Keller:
    You Shall Not Pass: Countering Network Covert Channels with Dynamic Wardens, under review.
  2. F. Lehner, W. Mazurczyk, J. Keller, S. Wendzel:
    Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach, under review.
  3. L. Caviglione, S. Wendzel, W. Mazurczyk:
    The Future of Digital Forensics: Challenges and the Road Ahead, under review.

  Edited Publications

  1. Steffen Wendzel, Jörg Keller (Eds.):
    Special Issue on Security, Privacy and Reliability of Smart Buildings,
    Journal of Universal Computer Science (J.UCS), Vol. 22(9), 2016.
  2. Michael Meier, Delphine Reinhardt, Steffen Wendzel (Eds.):
    Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI),
    LNI Vol. 256, 5.-7. April 2016, Bonn, ISBN 978-3-88579-650-3, Bonn, 2016.
  3. Christoph Pohl, Sebastian Schinzel, Steffen Wendzel (Eds.):
    Tagungsband zum 8. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING),
    SIDAR-Report SR-2013-01, ISSN 2190-846X, München, 2013.

Book Chapters

  1. Steffen Wendzel, Jernej Tonejc, Jaspreet Kaur, Alexandra Kobekova:
    Cyber Security of Smart Buildings,
    in: Security and Privacy in Cyber-Physical Systems: Foundations and Applications, Chapter 16, Editors: H. Song, G. Fink, S. Jeschke, G. Rosner, Wiley, in press.
  2. Steffen Wendzel, Jörg Keller:
    Einführung in die Forschungsthematik der verdeckten Kanäle,
    In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen?, Buchkapitel, Editors: S. Schumacher, R. Pfeiffer, BoD, pp. 91-102, October 2012.

Journal Papers

  1. Wojciech Mazurczyk, Steffen Wendzel:
    Information Hiding: Challenges for Forensic Experts,
    Communications of the ACM (accepted).
  2. Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Jean-Francois Lalande:
    Network Information Hiding and Science 2.0: Can it be a Match?,
    Int. Journal of Electronics and Telecommunications, Vol. 63(2), pp. 217-222, 2017.
  3. Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander:
    Unified Description for Network Information Hiding Methods,
    Journal of Universal Computer Science (J.UCS), Vol. 22(11), pp. 1456-1486, 2016.
  4. Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller:
    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions,
    Security and Communication Networks (SCN), Vol. 9(15), pp. 2972–2985, Wiley, 2016.
  5. Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc, Michael Meier:
    Covert Channel-internal Control Protocols: Attacks and Defense,
    Security and Communication Networks (SCN), Vol. 9(15), pp. 2986–2997, Wiley, 2016.
  6. Steffen Wendzel: How to increase the security of smart buildings?ACM DL Author-ize service,
    Communications of the ACM, Vol. 59(5), pp. 47-49, ACM, 2016.
  7. Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
    On Importance of Steganographic Cost For Network Steganography,
    Security and Communication Networks (SCN), Wiley, Vol. 9(8), pp. 781-790, 2016.
    (published online already in 2014).
  8. Steffen Wendzel, Saffija Kasem-Madani:
    IoT Security: The Improvement-Decelerating 'Cycle of Blame',
    opinion piece in Journal of Cyber Security and Mobility (JCSM), River Publishers, DOI: 10.13052/popcas010, 2016. 
  9. Steffen Wendzel, Carolin Palmer:
    Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research,
    Journal of Universal Computer Science (J.UCS), Vol. 21(12), pp. 1684-1705, 2015.
  10. Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin:
    Pattern-Based Survey and Categorization of Network Covert Channel TechniquesACM DL Author-ize service,
    Computing Surveys (CSUR), Vol. 47(3), ACM, 2015.
    Impact factor: 4.04.
  11. Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
    “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography,
    Journal of Communications (JCM), reprint of an ICNIT 2015 paper, Vol. 10(10), pp. 747-752, 2015.
  12. Steffen Wendzel, Jörg Keller:
    Hidden and Under Control:  A Survey and Outlook on Covert Channel-internal Control Protocols,
    Annals of Telecommunications (ANTE), Vol. 69, Issue 7, pp. 417-430, Springer Paris, 2014.
  13. Steffen Wendzel, Jörg Keller:
    IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten,
    Controlling (Zeitschrift für erfolgsorientierte Unternehmenssteuerung), vol. 26, no 14/6, pp. 304-308, Beck, 2014.
  14. Steffen Wendzel, Jörg Keller:
    Preventing Protocol Switching Covert Channels,
    International Journal On Advances in Security, vol. 5 no. 3&4, pp. 81-93, IARIA, 2012.
  15. Steffen Wendzel, Jörg Keller:
    Einführung in die Forschungsthematik der verdeckten Kanäle,
    Magdeburger Journal zur Sicherheitsforschung, Bd. 2, pp. 115-124, 2011. 

Conference and Workshop Papers/Posters

  1. Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
    Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings,
    IEEE Security & Privacy BioSTAR Workshop. San José, in press.
    Presentation slides [PDF], Video [Youtube]
  2. Jörg Keller, Gabriele Spenger, Steffen Wendzel:
    Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators,
    IEEE Security & Privacy BioSTAR Workshop. San José, in press.
  3. Alexandra Kobekova, Lennart Bültermann, Jernej Tonejc, Steffen Wendzel:
    Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT,
    15. Deutscher IT-Sicherheitskonress des BSI, pp. 515-526, SecuMedia Verlags-GmbH, 2017.
  4. Steffen Wendzel, Wojciech Mazurczyk:
    Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns,
    23rd Conference on Computer and Communications Security (CCS), pp. 1739-1741, Vienna, ACM, 2016. [you can also download the related poster (PDF)]
  5. Jaspreet Kaur, Steffen Wendzel, Michael Meier:
    Countermeasures for Covert Channel-internal Control Protocols,
    4th Int. Workshop on Cyber Crime (IWCC) held together with the 10th ARES, pp. 422-428, Toulouse, IEEE, 2015.
    Paper received a Best Paper Award.
  6. Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier:
    Securing BACnet's Pitfalls,
    30th International Information Security and Privacy Conference (IFIP SEC), IFIP AICT 455, pp. 616-629, Hamburg, Springer, 2015.
    (acceptance rate: 19.8%)
  7. Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel:
    Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making,
    3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), LNCS 9190, Springer, Los Angeles, 2015.
  8. Luca Caviglione, Jean-Francois Lalande, Wojciech Mazurczyk, Steffen Wendzel:
    Analysis of Human Awareness of Security and Privacy Threats in Smart Environments,
    3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), LNCS 9190, Springer, Los Angeles, 2015.
  9. Eva Maria Anhaus, Steffen Wendzel:
    BACtag: Data Leakage Protection für Gebäude
    in Proc. D-A-CH Security, St. Augistin, 2015.
  10. Jaspreet Kaur, Christian Herdin, Jernej Tonejc, Steffen Wendzel, Michael Meier, Sebastian Szlósarczyk:
    Novel Approaches for Security in Building Automation Systems,
    in Proc. 14. Sicherheitskongress des BSI, pp. 145-158, 2015.
  11. Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
    “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography,
    ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, 2015.
  12. Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
    Hidden and Uncontrolled - On the Emergence of Network Steganography,
    Information Security Solutions Europe (ISSE'14), in: Securing Electronic Business Processes, pp. 123-133, Brussels, Springer-Vieweg, 2014.
  13. Steffen Wendzel, Christian Herdin, Roman Wirth, Masood Masoodian, Santonio Luz, Jaspreet Kaur:
    Mosaic-chart based Visualization in Building Automation Systems,
    9th Future Security (Security Research Conference), pp. 687-690, Fraunhofer Verlag/MEV Verlag, Berlin, 2014.
  14. Steffen Wendzel, Viviane Zwanger, Michael Meier, Sebastian Szlósarczyk:
    Envisioning Smart Building Botnets,
    GI Sicherheit 2014, LNI 228, pp. 319-329, GI, Vienna, 2014.
  15. Sebastian Szlósarczyk, Steffen Wendzel, Jaspreet Kaur, Michael Meier, Frank Schubert:
    Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet,
    Sicherheit 2014, LNI 228, pp. 407-418, GI, Vienna, 2014.
  16. Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk, Steffen Wendzel:
    A Cost-Efficient Building Automation Security Testbed for Educational Purposes,
    poster at SECURWARE 2014, Lisbon, 2014.
  17. Jaspreet Kaur, Steffen Wendzel:
    Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose,
    CSCUB, Bonn, 2014.
  18. Jean-François Lalande, Steffen Wendzel:
    Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
    ECTCM Workshop @ ARES'13, pp. 701-710, Regensburg, 2013. (slides [pdf], download paper via IEEE Xplore)
  19. Jean-François Lalande, Steffen Wendzel:
    Attacking Smartphone Privacy Using Local Covert Channels
    , short talk at the Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'2013), 2013.
  20. Benjamin Kahler, Steffen Wendzel:
    How to own a Building? Wardriving gegen die Gebäude-Automation,
    20. DFN Workshop „Sicherheit in vernetzten Systemen“, pp. H1-H13, 2013.
  21. Steffen Wendzel, Sebastian Zander:
    Detecting Protocol Switching Covert Channels,
    37th IEEE Conf. on Local Computer Networks (LCN), pp. 280-283, Clearwater, Florida, 2012. (download via IEEE Xplore)
  22. Steffen Wendzel, Jörg Keller:
    Systematic Engineering of Control Protocols for Covert Channels,
    13th Conference on Communications and Multimedia Security (CMS 2012), LNCS 7394, pp. 131-144, Kent (Great Britain), 2012.
  23. Peter Backs, Steffen Wendzel, Jörg Keller:
    Dynamic Routing in Covert Channel Overlays Based on Control Protocols,
    ISTP'12 Workshop @ ICITST'12, IEEE, pp. 32-39, London, 2012.
  24. Steffen Wendzel, Benjamin Kahler, Thomas Rist:
    Covert Channels and their Prevention in Building Automation Protocols - A Prototype Exemplified Using BACnet,
    2nd Workshop on Security of Systems and Software Resiliency @ CPSCom'12, pp. 731-736, Besançon, France, IEEE, 2012. (download via IEEE Xplore)
  25. Steffen Wendzel:
    Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden,
    SFCS'12 Workshop @ IEEE ICC'12, Ottawa, Canada, pp. 6753-6758, 2012.
  26. Thomas Rist, Steffen Wendzel, Masood Masoodian, Elisabeth André:
    Next-Generation Home Automation Systems,
    Techniken für Menschen im nächsten Jahrzehnt -- Beiträge zum Usability Day X, Pabst Science Publishers, pp. 80-87, Dornbirn, AT, 2012.
  27. Steffen Wendzel, Jörg Keller:
    Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels,
    7th International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 1-6, IARIA, Stuttgart, Germany, 2012.
    (full paper acceptance rate: 24%)
    Paper received a Best Paper Award.
  28. Steffen Wendzel:
    The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase,
    Sicherheit 2012 (6. Jahrestagung des Fachbereichs Sicherheit), LNI vol. 195, pp. 149-161, Gesellschaft für Informatik, Darmstadt, Germany, 2012.
  29. Steffen Wendzel:
    Control Protocols for Network Covert Channels,
    7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01, page 24, Berlin, 2012.
  30. Steffen Wendzel, Jörg Keller:
    Low-attention forwarding for mobile network covert channels,
    12th Conference on Communications and Multimedia Security (CMS 2011), LNCS vol. 7025, pp. 122-133, Springer, Ghent, Belgium, 2011.
    (full paper acceptance rate: 21%)
  31. Steffen Wendzel, Thomas Rist, Elisabeth André, Masood Masoodian:
    A secure interoperable architecture for building automation applications,
    ISABEL'11, ACM, pp. 8:1-8:5, Barcelona, 2011. (download via ACM DL)
  32. Steffen Wendzel:
    Mikroprotokolle in verdeckten Netzwerkkanälen,
    Informatik Ruhr: Doktorandenkolleg 2011, Oct 6-7, Meinerzhagen Valbert, p. 35, Germany, 2011.
  33. Thomas Rist, Steffen Wendzel, Masood Masoodian, Paul Monigatti, Elisabeth André:
    Creating Awareness for Efficient Energy Use in Smart Homes,
    Intelligent Wohnen. Zusammenfassung der Beiträge zum Usability Day IX, Feuerstein Gerhild, Ritter Walter (Hrsg.), pp. 162-168, Dornbirn, AT, 2011.


  1. Steffen Wendzel:
    Novel Approaches for Network Covert Storage Channels,
    PhD thesis, University of Hagen, submitted: Jan-2013, defended: May-2013.
  2. Steffen Wendzel:
    Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle,
    Master's thesis, Augsburg University of Applied Sciences, Jun-2011.
  3. Steffen Wendzel:
    Protokollwechsel zur Realisierung von Covert Channels und Header-Strukturveränderungen zur Vermeidung von Covert Channels,
    Diplomarbeit, Kempten University of Applied Sciences, May-2009.

Non-scientific Publications for Professional Magazines

  1. Steffen Wendzel:
    Tatort Smart Building - die Gebäudeautomation muss sicherer werden,
    cci Zeitung, issue 08/2016, pp. 16, 2016.
  2. Alexandra Kobekova, Steffen Wendzel, Jernej Tonejc:
    Smart Building - Sicherheitslücken schließen,
    PROTECTOR, 4/16, pp. 42-43, 2016.
  3. Steffen Wendzel, Michael Meier, Jernej Tonejc:
    Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation,
    BusSysteme Magazin, 22. Jahrgang, Heft 4, p. 257, 2015. 
  4. Matthias Wübbeling, Steffen Wendzel:
    in: Cyber Security Report 2015, Mittler-Report, pp. 19-21, 2015.
  5. Kirsten Messer-Schmidt, Dirk Rösler, Christopher Ruppricht, Heinrich Seebauer, Steffen Wendzel:
    Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik),
    digitalbusiness CLOUD, 8/14, pp. 40-41, 2014. 
  6. Steffen Wendzel:
    Exfiltration vertrauenswürdiger Daten - Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher,
    digitalbusiness CLOUD, 2/14, p. 37, 2014. 
  7. Steffen Wendzel:
    Gefahrenpotential der Netzwerksteganografie,
    IT-SICHERHEIT, 6/2013, pp. 58-59, 2013.
  8. Steffen Wendzel:
    Sicherheitsaspekte in der Gebäude-Automation. Perspektiven der Personenüberwachung,
    IT-SICHERHEIT 3/2013, pp. 70-72, 2013. 
  9. Steffen Wendzel:
    Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme,
    BusSysteme Magazin, 03/2012, pp. 182-183, 2012.
  10. Steffen Wendzel, Thomas Rist, Roman Wirth, Elisabeth André, Masood Masoodian:
    Sicherheit beim Energiesparen durch Abstraktion,
    BusSysteme Magazin 2/2012, pp. 124-125, 2012.
  11. Roland Koch, Steffen Wendzel:
    Social Network Security, pt. 2,
    Hakin9 (en), 1/12, 2012.
  12. Steffen Wendzel, Roland Koch:
    Social Network Security, pt. 1,
    Hakin9 (en), 1/12, 2012.
  13. Steffen Wendzel:
    Bewusstsein für Sicherheit im Bereich der Gebäudeautomatisierung,
    Hakin9 (de), 3/2011, pp. 11-12, 2011. 
  14. Steffen Wendzel:
    Protocol Channels,
    Hakin9 (en) 06/2009.
  15. Steffen Wendzel:
    Intrusion Detection über Benutzerprofile,
    Hakin9 05/2008.
  16. Steffen Wendzel:
    Protocol Hopping Covert Channels,
    Hakin9 03/2008.
  17. Steffen Wendzel:
    Forensik nach Angriffen auf Linux-Systeme,
    Hakin9 06/2007.
  18. Steffen Wendzel:
    Abhärtung von Linux/BSD Systemen. Eine Einführung,
    Hakin9 04/2007.
  19. Steffen Wendzel:
    Hostbasierte Intrusion Detection. Ein Einblick,
    Hakin9 02/2007.
  20. Steffen Wendzel:
    Firewalls umgehen mit Protokoll-Tunneling,
    Hakin9 01/2007.
  21. Johannes Plötner, Steffen Wendzel:
    Linux-User 10/06.
  22. Johannes Plötner, Steffen Wendzel:
    Auszüge aus 'Linux. Das umfassende Handbuch',
    Linux Magazin 04/06.
  23. Steffen Wendzel:
    FreeX 5/05.
  24. Steffen Wendzel:
    Das Allround-Genie Z-Shell,
    FreeX 6/03.
  25. Steffen Wendzel:
    sysctl in OpenBSD,
    FreeX 5/03.

EU-related Documents

  1. Wojciech Mazurczyk, Philipp Amann, Luca Caviglione, Steffen Wendzel:
    CUIng: Criminal Use of Information Hiding Initiative [newsletter website],
    European CIIP Newsletter, Issue 25 (Vol. 10, No. 3), pp. 31-32, 2016.
  2. Contibutor of ENISA's Security and Resilience of Smart Home Environments: Good Practices and Recommendations, 2015.
  3. Contributor of the Network and Information Security (NIS) Platform's Strategic Research Agenda (SRA) as announced in the Cybersecurity Strategy of the European Union, 2015.
  4. Contributor of the Network and Information Security (NIS) Platform's State of the Art of the Secure ICT Landscape Deliverable v2, 2015.

Technical Reports

  1. Steffen Wendzel:
    Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography(published exclusively on ArXiV).
  2. Steffen Wendzel, Alexandra Kobekova, Jernej Tonejc, Jaspreet Kaur:
  3. IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt,
    Technical Report published internally by Smart Home Summit 2016 event.
  4. Thomas Rist, Steffen Wendzel:
    Internationale Forschungskooperation IT4SE,
    Jahresbericht der Hochschule Augsburg, p. 116, 2012.
  5. Steffen Wendzel:
    Novel Developments in the Area of Network Covert Channels,
    Forschungsbericht der Hochschule Augsburg, pp. 108-112, 2012.
  6. Roland Koch, Steffen Wendzel:
    Social Network Security Project,
    Forschungsbericht der Hochschule Augsburg, pp. 158-162, 2012.
  7. Steffen Wendzel:
    Sichere Middleware für Gebäude-Automation,
    Forschungsbericht der Hochschule Augsburg, pp. 155, 2012.
  8. Thomas Rist, Steffen Wendzel, Elisabeth André, Masood Masoodian:
    IT4SE – IT for smart renewable energy generation and use. News from a German - New Zealand Research Cooperation within the BMBF-funded APRA Initiative,
    Forschungsbericht der Hochschule Augsburg, pp. 59-66, October 2011.
  9. Steffen Wendzel:
    Protocol Channels,
    Kempten University of Applied Sciences, technical report, July 2009.

Published Reviews

  1. A Review of `Out-of-band Covert Channels--A Survey`
    ACM Computing Reviews.

Project Deliverables

  1. Alexandra Kobekova, Steffen Wendzel, Pascua Theus, Sebastian Szlósarczyk:
    Analyse der BACnet-Schichten 1-7 zur Vorbereitung einer potenziellen Anomalieerkennung und Verkehrsnormalisierung,
    BARNI project deliverable 1-a and 1-b, 2015.
  2. Alexandra Kobekova, Steffen Wendzel, Jernej Tonejc:
    Beschreibung der Funktionsmuster für den BARNI-Analyzer, den BARNI-Normalizer und den BARNI-Visualizer,
    BARNI project deliverable 2-a, 2-b and 2-c, 2015.
  3. Alexandra Kobekova, Steffen Wendzel, Jernej Tonejc:
    Einführung in das BARNI-Beratungskonzept,
    BARNI project deliverable 6-a, 2015.