Prof. Wojciech Mazurczyk
Prof. Wojciech Mazurczyk
Warsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)
Verified email at - Homepage
Cited by
Cited by
Trends in Steganography
E Zielińska, W Mazurczyk, K Szczypiorski
Communications of the ACM 57 (3), 86-95, 2014
Steganography of VoIP streams
W Mazurczyk, K Szczypiorski
On the Move to Meaningful Internet Systems: OTM 2008: OTM 2008 Confederated …, 2008
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
K Cabaj, M Gregorczyk, W Mazurczyk
Computers & Electrical Engineering 66, 353-368, 2018
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
Using software-defined networking for ransomware mitigation: the case of cryptowall
K Cabaj, W Mazurczyk
Ieee Network 30 (6), 14-20, 2016
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
Secure data encryption based on quantum walks for 5G Internet of Things scenario
AA Abd El-Latif, B Abd-El-Atty, W Mazurczyk, C Fung, ...
IEEE Transactions on Network and Service Management 17 (1), 118-131, 2020
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
Principles and overview of network steganography
J Lubacz, W Mazurczyk, K Szczypiorski
IEEE Communications Magazine 52 (5), 225-229, 2014
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
arXiv preprint arXiv:1504.04867, 2015
Using transcoding for hidden communication in IP telephony
W Mazurczyk, P Szaga, K Szczypiorski
Multimedia Tools and Applications 70, 2139-2165, 2014
VoIP steganography and its detection—a survey
W Mazurczyk
ACM Computing Surveys (CSUR) 46 (2), 1-21, 2013
Retransmission steganography and its detection
W Mazurczyk, M Smolarczyk, K Szczypiorski
Soft Computing 15, 505-515, 2011
LACK—a VoIP steganographic method
W Mazurczyk, J Lubacz
Telecommunication Systems 45, 153-163, 2010
The new threats of information hiding: The road ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT professional 20 (3), 31-39, 2018
Efficient quantum-based security protocols for information sharing and data protection in 5G networks
AA Abd EL-Latif, B Abd-El-Atty, SE Venegas-Andraca, W Mazurczyk
Future Generation Computer Systems 100, 893-906, 2019
New security and control protocol for VoIP based on steganography and digital watermarking
W Mazurczyk, Z Kotulski
arXiv preprint cs/0602042, 2006
Covert Channels in SIP for VoIP signalling
W Mazurczyk, K Szczypiorski
Global E-Security: 4th International Conference, ICGeS 2008, London, UK …, 2008
PadSteg: Introducing inter-protocol steganography
B Jankowski, W Mazurczyk, K Szczypiorski
Telecommunication Systems 52, 1101-1111, 2013
The system can't perform the operation now. Try again later.
Articles 1–20