Prof. Wojciech Mazurczyk
Prof. Wojciech Mazurczyk
Warsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)
Verified email at - Homepage
Cited by
Cited by
Trends in Steganography
E Zielińska, W Mazurczyk, K Szczypiorski
Communications of the ACM 57 (3), 86-95, 2014
Secure data encryption based on quantum walks for 5G Internet of Things scenario
AA Abd El-Latif, B Abd-El-Atty, W Mazurczyk, C Fung, ...
IEEE Transactions on Network and Service Management 17 (1), 118-131, 2020
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
K Cabaj, M Gregorczyk, W Mazurczyk
Computers & Electrical Engineering 66, 353-368, 2018
Using software-defined networking for ransomware mitigation: the case of cryptowall
K Cabaj, W Mazurczyk
Ieee Network 30 (6), 14-20, 2016
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
Steganography of VoIP streams
W Mazurczyk, K Szczypiorski
On the Move to Meaningful Internet Systems: OTM 2008: OTM 2008 Confederated …, 2008
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
arXiv preprint arXiv:1504.04867, 2015
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
Principles and overview of network steganography
J Lubacz, W Mazurczyk, K Szczypiorski
IEEE Communications Magazine 52 (5), 225-229, 2014
The new threats of information hiding: The road ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT professional 20 (3), 31-39, 2018
Retransmission steganography and its detection
W Mazurczyk, M Smolarczyk, K Szczypiorski
Soft Computing 15, 505-515, 2011
Using transcoding for hidden communication in IP telephony
W Mazurczyk, P Szaga, K Szczypiorski
Multimedia Tools and Applications 70, 2139-2165, 2014
Efficient quantum-based security protocols for information sharing and data protection in 5G networks
AA Abd EL-Latif, B Abd-El-Atty, SE Venegas-Andraca, W Mazurczyk
Future generation computer systems 100, 893-906, 2019
VoIP steganography and its detection—a survey
W Mazurczyk
ACM Computing Surveys (CSUR) 46 (2), 1-21, 2013
LACK—a VoIP steganographic method
W Mazurczyk, J Lubacz
Telecommunication Systems 45, 153-163, 2010
Tight arms race: Overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access 9, 5371-5396, 2020
New security and control protocol for VoIP based on steganography and digital watermarking
W Mazurczyk, Z Kotulski
arXiv preprint cs/0602042, 2006
Providing end-to-end security using quantum walks in IoT networks
AA Abd El-Latif, B Abd-El-Atty, SE Venegas-Andraca, H Elwahsh, ...
IEEE Access 8, 92687-92696, 2020
The system can't perform the operation now. Try again later.
Articles 1–20