Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
Steffen Wendzel
Worms University of Applied Sciences
Worms, Germany
 

Steffen Wendzel studied computer science at the University of Applied Sciences in Kempten (BS, Hons., 2009) and Augsburg (MS, 2011), Germany. He received his PhD degree in Computer Science from the Department of Mathematics and Computer Science at the University of Hagen, Germany, in 2013. Between 2013 and 2016, he led a research team focusing on the security of smart buildings at the Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE), Germany. He joined Worms University of Applied Sciences as a professor of information security and computer networks in 2016. Steffen has written five books and his research focuses on information hiding and security in the Internet of Things. He is a member of the editorial board of the Journal of Universal Computer Science and of the Journal of Cyber Security and Mobility.

Steffen’s primary research domain is network information hiding. In particular, he has published work on network covert channel patterns, terminology and taxonomy of information hiding, scientific methodology in network steganography, and detection and limitation of illegitimate data transfers. His papers have been published in several key journals and conferences including Communications of the ACM, ACMComputing Surveys, IEEE Security & Privacy, Security & Communication Networks, and IEEE Local Computer Networks. He also serves as a reviewer for several ranked journals and conferences.

Steffen is a member of the steering committee of the Europol-supported initiative Criminal Use of Information Hiding (CUIng). In addition to his professorship position, he is deputy scientific head of the Centre for Technology and Transfer (ZTT) and head of the Network Security Research Group (NSRG), both at Worms University of Applied Sciences.


     

Future automation: changes to lives and to businesses
Carone T., World Scientific Publishing Co, Inc., Hackensack, NJ, 2019. 230 pp.  Type: Book

Timothy Carone provides a visionary outlook on what will probably be called our digitized future. The book is split into 11 chapters. First, the author introduces autonomous systems (ASs). ASs are (in addition to the Internet of Things...

 

Man-in-the-middle attacks on secure simple pairing in Bluetooth standard V5.0 and its countermeasure
Sun D., Mu Y., Susilo W. Personal and Ubiquitous Computing 22(1): 55-67, 2018.  Type: Article

Sun et al. describe a vulnerability in the Bluetooth protocol. In particular, they show that a part of the so-called secure simple pairing (SSP) process can be attacked in a man-in-the-middle scenario. SSP is used by newer Bluetooth de...

 

Darkweb cyber threat intelligence mining
Robertson J., Diab A., Marin E., Nunes E., Paliath V., Shakarian J., Shakarian P., Cambridge University Press, New York, NY, 2017.  Type: Book (978-1-107185-77-7)

Darkweb cyber threat intelligence mining, by seven authors from Arizona State University, deals with the question of how data can be extracted from the darknet and then later used to provide more advanced threat intelligence for...

 

Out-of-band covert channels--a survey
Carrara B., Adams C. ACM Computing Surveys 49(2): 1-36, 2016.  Type: Article

In recent years, covert channels were shifted back into the focus of research. These channels can be used to communicate in a stealthy way not recognizable by third parties. Typical application scenarios for covert channels are to hide...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy