Prof. Wojciech Mazurczyk
Prof. Wojciech Mazurczyk
Warsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)
Email yang diverifikasi di pw.edu.pl - Beranda
Dikutip oleh
Dikutip oleh
Trends in Steganography
E Zielińska, W Mazurczyk, K Szczypiorski
Communications of the ACM 57 (3), 86-95, 2014
Steganography of VoIP streams
W Mazurczyk, K Szczypiorski
OTM Confederated International Conferences" On the Move to Meaningful …, 2008
Using software-defined networking for ransomware mitigation: the case of cryptowall
K Cabaj, W Mazurczyk
Ieee Network 30 (6), 14-20, 2016
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
K Cabaj, M Gregorczyk, W Mazurczyk
Computers & Electrical Engineering 66, 353-368, 2018
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
Using transcoding for hidden communication in IP telephony
W Mazurczyk, P Szaga, K Szczypiorski
Multimedia Tools and Applications 70 (3), 2139-2165, 2014
Retransmission steganography and its detection
W Mazurczyk, M Smolarczyk, K Szczypiorski
Soft Computing 15 (3), 505-515, 2011
Principles and overview of network steganography
J Lubacz, W Mazurczyk, K Szczypiorski
IEEE Communications Magazine 52 (5), 225-229, 2014
VoIP steganography and its detection—a survey
W Mazurczyk
ACM Computing Surveys (CSUR) 46 (2), 1-21, 2013
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
LACK—a VoIP steganographic method
W Mazurczyk, J Lubacz
Telecommunication Systems 45 (2), 153-163, 2010
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
arXiv preprint arXiv:1504.04867, 2015
Secure data encryption based on quantum walks for 5G Internet of Things scenario
AA Abd El-Latif, B Abd-El-Atty, W Mazurczyk, C Fung, ...
IEEE Transactions on Network and Service Management 17 (1), 118-131, 2020
The new threats of information hiding: The road ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT professional 20 (3), 31-39, 2018
New security and control protocol for VoIP based on steganography and digital watermarking
W Mazurczyk, Z Kotulski
arXiv preprint cs/0602042, 2006
Covert Channels in SIP for VoIP signalling
W Mazurczyk, K Szczypiorski
International Conference on Global e-Security, 65-72, 2008
Efficient quantum-based security protocols for information sharing and data protection in 5G networks
AA Abd EL-Latif, B Abd-El-Atty, SE Venegas-Andraca, W Mazurczyk
Future Generation Computer Systems 100, 893-906, 2019
Multi-segment green light optimal speed advisory
M Seredynski, W Mazurczyk, D Khadraoui
2013 IEEE International Symposium on Parallel & Distributed Processing …, 2013
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20