Selected papers


Books

  1. W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, K. Szczypiorski - Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures, IEEE Press Series on Information and Communication Networks Security, IEEE Press-Wiley, April 2016, ISBN-10: 1118861698 [ORDER]
  2. Z. Yan, R. Molva, W. Mazurczyk, R. Kantola (Eds.) - Network and System Security, 11th International Conference on Networ and System Security Proceedings (NSS 2017), Helsinki, Finland, August 21-23, 2017, DOI: 10.1007/978-3-319-64701-2 [NEW]
  3. E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk - Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications, Institution of Engineering and Technology (IET) (in preparation)

Work in progress or submitted

  1. P. Laka, W. Mazurczyk - User Perspective and Security of a New Mobile Authentication (submitted)
  2. W. Mazurczyk, S. Wendzel, M. Chourib, J. Keller - You Shall Not Pass: Countering Network Covert Channels with Dynamic Wardens (submitted)
  3. K. Opasiak, W. Mazurczyk - (In)Secure Android Debugging (submitted)
  4. E. Rzeszutko, W. Mazurczyk - Nature-inspired analogies and metaphors for cyber security (submitted)

Journal papers - accepted or published

    (in Thomson Reuters Master Journal List)
  1. K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander - The New Threats of Information Hiding: the Road Ahead, IEEE IT Professional, May/June 2018 (accepted) [NEW]
  2. W. Mazurczyk, S. Wendzel - Information Hiding: Challenges for Forensic Experts - Communications of the ACM, 01.2018, DOI:10.1145/3158416 (accepted) [NEW]
  3. K. Cabaj, M. Gregorczyk, W. Mazurczyk - Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics, Computers and Electrical Engineering, ISSN: 0045-7906, DOI: 10.1016/j.compeleceng.2017.10.012 [NEW]
  4. W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 10 - 11, Nov./Dec. 2017 [NEW]
  5. L. Caviglione, S. Wendzel, W. Mazurczyk - The Future of Digital Forensics: Challenges and the Road Ahead - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 12 - 17, Nov./Dec. 2017, DOI: 10.1109/MSP.2017.4251117 [NEW]
  6. L. Caviglione, M. Podolski, W. Mazurczyk, M. Ianigro - Covert Channels in Personal Cloud Storage Services: the case of Dropbox, IEEE Transactions on Industrial Informatics, Vol. 13, Iss. 4, pp. 1921-1931, 2017 DOI: 10.1109/TII.2016.2627503
  7. W. Mazurczyk, M. Korczynski, K. Nakao, E. Kirda, C. Hesselman, K. Yoshioka - Traffic Measurements for Cyber Security - IEEE Communication Magazine, Vol. 55, Iss. 7, pp. 12-13, DOI: 10.1109/MCOM.2017.7981517, 2017
  8. S. Wendzel, W. Mazurczyk, S. Zander - A Unified Description for Network Information Hiding Methods, Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 22, No. 11, 2016, pp. 1456-1486
  9. K. Cabaj, W. Mazurczyk - Using Software-Defined Networking for Ransomware Mitigation: the Case of CryptoWall, IEEE Network, November/December 2016, DOI: 10.1109/MNET.2016.1600110NM, pp. 14-20
  10. T. Andrysiak, L. Saganowski, W. Mazurczyk - Network Anomaly Detection for Railway Critical Infrastructure based on Autoregressive Fractional Integrated Moving Average, EURASIP Journal on Wireless Communications and Networking, 2016, 2016(1), pp. 1-14, DOI: 10.1186/s13638-016-0744-8
  11. W. Mazurczyk, K. Szczypiorski, Z. Duric, D. Ye - Cyber Crime - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2861-2863, 2016, DOI: 10.1002/sec.1603
  12. W. Mazurczyk, S. Moore, E. W. Fulp, H. Wada, K. Leibnitz - Bio-inspired Cyber Security for Communications and Networking - IEEE Communication Magazine, pp. 120-121, June 2016
  13. M. Urbanski, W. Mazurczyk, J-F. Lalande, L. Caviglione - Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones - International Journal of Computer Systems Science and Engineering, Vol. 32 No. 2, March 2017
  14. L. Caviglione, M. Gaggero, J-F. Lalande, M. Urbanski, W. Mazurczyk - Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence - IEEE Transactions on Information Forensics and Security, Vol. 11, No. 4, pp. 799-810, April 2016
  15. M. Naumann, S. Wendzel, W. Mazurczyk, J. Keller - Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2972-2985, 2016, DOI: 10.1002/sec.1500
  16. W. Mazurczyk, T. Holt, K. Szczypiorski - Guest Editors' Introduction: Special Issue on Cyber Crime - IEEE Transactions on Dependable and Secure Computing, Vol. 13, Iss. 2, March/April 2016, pp. 146-147, DOI: 10.1109/TDSC.2015.2502407
  17. W. Mazurczyk, K. Szczypiorski, A. Janicki, H. Tian - Trends in modern Information Hiding: techniques, applications, and detection - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1469, Vol. 9, Iss. 8, pp. 703-704, 2016
  18. W. Mazurczyk, M. Karas, K. Szczypiorski, A. Janicki - YouSkyde: Information Hiding for Skype Video Traffic - Multimedia Tools and Applications, 75(21), pp. 13521-13540, 2016, DOI: 10.1007/s11042-015-2740-0
  19. A. Janicki, W. Mazurczyk, K. Szczypiorski - On the Undetectability of Transcoding Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1301
  20. W. Mazurczyk, L. Caviglione - Information Hiding as a Challenge for Malware Detection - IEEE Security and Privacy Magazine, Issue 2, March/April 2015, pp. 89-93
  21. E. Rzeszutko, W. Mazurczyk - Insights from Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2: 82-87
  22. L. Caviglione, W. Mazurczyk - Understanding Information Hiding in iOS - IEEE Computer Magazine, January 2015, Vol. 48, Iss. 1, pp. 62 - 65
  23. W. Mazurczyk, E. Rzeszutko - Security - a perpetual war: lessons from nature - IEEE IT Professional, vol. 17, no. 1, pp. 16-22, January/February 2015
  24. A. Janicki, W. Mazurczyk, K. Szczypiorski - Evaluation of Efficiency of Transcoding Steganography - Journal of Homeland Security and Emergency Management, 2015, DOI: 10.1515/jhsem-2014-0028
  25. W. Mazurczyk, L. Caviglione - Steganography in Modern Smartphones and Mitigation Techniques - IEEE Communications Surveys & Tutorials, Vol. 17, Iss. 1, pp. 334 - 357, 2014, DOI: 10.1109/COMST.2014.2350994
  26. W. Mazurczyk, S. Wendzel, I. Azagra Villares, K. Szczypiorski - On Importance of Steganographic Cost For Network Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, DOI: 10.1002/sec.1085, 2016; Vol. 9, Iss. 8, pp. 781-790
  27. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography, IEEE Communication Magazine, vol. 52, no. 5, May 2014
  28. E. Zielinska, W. Mazurczyk, K. Szczypiorski - Trends in Steganography - Communications of the ACM, vol 57, No.2, March 2014, pp. 86-95
  29. W. Mazurczyk, K. Szczypiorski, J. Lubacz - The Spy Who Skyped Me - Four New Ways to Smuggle Messages Across the Internet, IEEE Spectrum, November 2013, p. 40-43
  30. W. Mazurczyk, K. Szczypiorski - Advances in digital media security and right management - Multimedia Systems Journal, DOI 10.1007/s00530-013-0339-8
  31. A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 449-460, DOI: 10.1007/s12243-013-0385-4
  32. W. Mazurczyk, K. Szczypiorski, H. Tian - Network forensics and challenges for cybersecurity - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 345-346, DOI: 10.1007/s12243-014-0434-7
  33. W. Mazurczyk, P. Kopiczko - Understanding BitTorrent Through Real Measurements - China Communications, 2013 10 (11): 107-118, ISSN: 1673-5447
  34. W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony - Multimedia Tools and Applications, Volume 70, Issue 3, pp. 2139-2165, DOI: 10.1007/s11042-012-1224-8, June 2014
  35. W. Mazurczyk, M. Karas, K. Szczypiorski - SkyDe: a Skype-based Steganographic Method - International Journal of Computers, Communications & Control (IJCCC), ISSN: 1841- 9836, 8(3), June 2013, pp. 389-400
  36. W. Mazurczyk - VoIP Steganography and Its Detection - A Survey - ACM Computing Surveys, vol. 46, Issue. 2, November 2013
  37. A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography - Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 59, Iss. 3, pp. 305-3315, DOI 10.1007/s11235-014-9937-9, 2015
  38. W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography: Improving Hidden Communication in Networks - Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 18, No. 14, 2012, pp. 1967-1986
  39. W. Mazurczyk, K. Szczypiorski - Toward Effective and Reliable Digital Forensics - Computer Journal, Vol. 55, Iss. 6, Oxford University Press, June 2012, pp. 651-652
  40. W. Mazurczyk - Lost Audio Packets Steganography: A First Practical Evaluation - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Vol. 5, Iss. 12, pp. 1394-1403, December 2012
  41. W. Frączek, W. Mazurczyk, K. Szczypiorski - Hiding Information in Stream Control Transmission Protocol - Computer Communication Journal (ComCom), Elsevier, ISSN: 0140-3664, January 2012, 35 (2), pg. 159-169
  42. W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets - International Journal of Security and Communication Networks, John Wiley & Sons, doi: 10.1002/sec.388, ISSN: 1939-0114
  43. K. Szczypiorski, W. Mazurczyk - Steganography in IEEE 802.11 OFDM Symbols - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Vol. 3:1-12, 2011
  44. B. Jankowski, W. Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 52, Issue 2, 2013, pp. 1101-1111, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  45. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - On Information Hiding in Retransmissions - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 52, Issue 2, 2013, pp. 1113-1121, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  46. W. Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays? - In: Multimedia Tools and Applications (published online 22.04.2010), ISSN: 1380-7501 (print version), ISSN: 1573-7721 (electronic version), Springer US, Journal no. 11042, Vol. 57, Issue 1, pp. 109-126, 2012
  47. W. Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method - In: Telecommunication Systems: Modelling, Analysis, Design and Management, 2010, Volume 45, Numbers 2-3, Pages 153-163, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  48. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Vice over IP (invited paper) In: IEEE Spectrum, ISSN: 0018-9235, February 2010, pp. 40-45
  49. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography and Its Detection In: Soft Computing, ISSN: 1432-7643 (print version) ISSN: 1433-7479 (electronic version), Journal no. 500 Springer, Vol. 15, Issue 3, p. 505-515, 2011
  50. W. Mazurczyk, K. Szczypiorski - Evaluation of Steganographic Methods for Oversized IP Packets In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 49, Issue 2 (2012), Page 207-217, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  51. K. Szczypiorski, W. Mazurczyk - Toward network steganography detection - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 49, Issue 2 (2012), Page 161-162, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  52. T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 51: Issue 4, December 2012, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  53. G.F. Marias, J. Barros, M. Fiedler, R. Herkenhoener, A. Grillo, A. Lentini, L. Lima, C.Lorentzen, W. Mazurczyk, H. de Meer, P. Oliveira, G.C. Polyzos, E. Pujol, K.Szczypiorski, J.P. Vilela, T. Vinhoza - Security and Privacy Issues for the Network of the Future, International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Volume 5, Issue 9, pages 987 1005, September 2012

Other journal papers

  1. S. Wendzel, W. Mazurczyk, G. Haas - Steganography for Cyber Physical Systems, Journal of Cyber Security and Mobility (JCSM), Vol. 6(2), pp. 105-126, River Publishers, 2017
  2. S. Wendzel, L. Caviglione, W. Mazurczyk, J-F. Lalande - Network Information Hiding and Science 2.0: Can it be a Match?, International Journal of Electronics and Telecommunications, Vol. 63, No. 2, 2017, pp. 217-222
  3. W. Mazurczyk - Nature as an inspiration for the next-generation network defences, Journal of Cyber Security and Mobility, December 2016, DOI: 10.13052/popcas013
  4. W. Mazurczyk, P. Amann, L. Caviglione, S. Wendzel - CUIng: Criminal Use of Information Hiding Initiative, European CIIP Newsletter (ECN 25), Vol. 10, No. 3, November 16 - February 17, December 2016, pp. 31-32
  5. P. Łąka, D. Flaga, W. Mazurczyk - Bezpieczne uwierzytelnianie z wykorzystaniem urządzeń mobilnych - XXXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2016, Gliwice, September 2016, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2016
  6. B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - Journal of Advances in Computer Networks, Vol. 3, No. 2, June 2015, DOI: 10.7763/JACN.2015.V3.155
  7. W. Mazurczyk, K. Szczypiorski, J. Lubacz, A. Janicki, E. Rzeszutko - Ukrywanie informacji w ruchu telefonii IP - Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 2-3/2015
  8. P. Białczak, W. Mazurczyk - Multipleksacja kanału ukrytego jako sposob niejawnej transmisji grupowej - XXX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2014, Poznan, September 2014, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2014
  9. B. Lipiński, W. Mazurczyk, K. Szczypiorski - Steganografia w srodowisku chmury obliczeniowej - XXIX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2013, Gdansk, 4-6 September 2013, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2013
  10. M. Gregorczyk, W. Mazurczyk, K. Szczypiorski - Wpływ steganografii sieciowej na opóznienia w telefonii IP - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 797-808
  11. W. Frączek, W. Mazurczyk, K. Szczypiorski - Sposoby głębokiego ukrywania w sieciach - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 849-858
  12. W. Frączek, W. Mazurczyk, K. Szczypiorski - Zastosowania steganografii wielopoziomowej - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 783-788
  13. P. Białczak, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w Google Suggest - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 789-794
  14. K. Szczypiorski, W. Mazurczyk - Ukrywanie danych w symbolach OFDM w sieciach IEEE 802.11 - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wrocław, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1055-1064
  15. B. Jankowski, W. Mazurczyk, K. Szczypiorski - System steganograficzny oparty na niepoprawnym dopełnianiu ramek - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1035-1044
  16. W. Frączek, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w protokole SCTP - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1045-1054
  17. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganografia sieciowa, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 4/2010, ISSN 1230-3496, April 2010, nr 4/2010, str. 134-135
  18. M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznych (paper accepted to KSTiT 2009, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 8-9/2009 pp. 819-823, ISSN 1230-3496, September 2009 (in Polish)
  19. K. Szczypiorski, I. Margasiński, W. Mazurczyk - Steganographic Routing in Multi Agent System Environment - Journal of Information Assurance and Security (JIAS), 04/2007, Dynamic Publishers Inc., USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010
  20. W. Mazurczyk, Z. Kotulski - Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security - Journal of Information Assurance and Security (JIAS), 04/2007, Dynamic Publishers Inc., USA, Volume 2, Issue 3, September 2007, pp. 226-234, ISSN 1554-1010
  21. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Bezpieczeństwo usługi VoIP opartej na systemie Asterisk, (paper accepted to KSTiT 2007), Przegląd Telekomunikacyjny 8-9/2007 pp. 646-655, ISSN 1230-3496, September 2007 (in Polish)
  22. W. Mazurczyk, Z. Kotulski - Lightweight security mechanism for PSTN-IP Telephony convergence - IJCSNS International Journal of Computer Science and Network Security, Communication Network & Security, vol.7, No.5, ISSN 1738-7906, May 2007

Book chapters

  1. L. Caviglione, M. Gaggero, J-F Lalande, W. Mazurczyk - Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data, M. Migliardi, A. Merlo, B. S. Al-Haj (Eds.), Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, August 2017, ISBN: 9780128046036 [NEW]
  2. W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology, B. Akhgar and B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism, Advanced Sciences and Technologies for Security Applications, Springer, DOI: 10.1007/978-3-319-38930-1, June 2016, pp. 17-37
  3. W. Mazurczyk, L. Caviglione - Chapter 4 - Network Steganograpy In: S. Kaztenbeisser and F. Petitcolas (Eds.): Information Hiding - Techniques for Steganography and Digital Watermarking, Artech House, Edition 2, 2015
  4. L. Caviglione, J.-F. Lalande, W. Mazurczyk, S. Wendzel - Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, USA, Lecture Notes in Computer Science (LNCS), Springer, Vol. 9190, pp. 165-177, July 2015
  5. W. Mazurczyk, K. Szczypiorski - Steganography of VoIP Streams In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1001-1018
  6. K. Szczypiorski, I. Margasiński, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1019-1035
  7. W. Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Hamid Jahankhani, Kenneth Revett, and Dominic Palmer-Brown (Eds.): ICGeS 2008 - Communications in Computer and Information Science (CCIS) 12, Springer Verlag Berlin Heidelberg, Proc. of 4th International Conference on Global E-security 2008, London, United Kingdom, 23-25 June 2008, pp. 65-72
  8. T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System, 7th International Conference on Computer Science - Research and Applications (IBIZA 2008), Poland, Kazimierz Dolny 31.01 - 2.02 2008, Published in Annales UMCS, Informatica, AI 8 (2008), pp. 186-201
  9. W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security (extended version), In: Jerzy Pejas, Khalid Saeed (Eds.) - Advances in Information Processing and Protection, Science+Business Media Inc. Springer, ISBN: 978-0-387-73136-0, August 2007
  10. W. Mazurczyk, Z. Kotulski - New VoIP traffic security scheme with digital watermarking - In Proceedings of The 25-th International Conference on Computer Safety, Reliability and Security SafeComp 2006, Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer-Verlag, Heidelberg 2006, ISBN 978-3-540-45762-6
  11. W. Mazurczyk, Z. Kotulski - New security and control protocol for VoIP based on steganography and digital watermarking - 5th International Conference on Computer Science - Research and Applications (IBIZA 2006), Poland, Kazimierz Dolny 9-11 February 2006, Published in Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360

Conference papers

  1. F. Lehner, W. Mazurczyk, J. Keller, S. Wendzel - Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach - In Proc. of 42nd IEEE Conference on Local Computer Networks (LCN), October 9-12, 2017, Singapore, pp. 78-85 [NEW]
  2. S. Schmidt, W. Mazurczyk, J. Keller, L. Caviglione - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2017 conference [NEW]
  3. A. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Information Hiding in RGB Images Using an Improved Matrix Pattern Approach - In Proc. of the The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2017), Honolulu, Hawaii, July 21, 2017 [NEW]
  4. S. Wendzel, W. Mazurczyk, G. Haas - Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings - In Proc. of the Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2017) co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, USA, May 25, 2017 [NEW]
  5. S. Wendzel, W. Mazurczyk - An Educational Network Protocol for Covert Channel Analysis Using Patterns - In Proc. of ACM Conference on Computer and Communications Security (ACM CCS 2016), October 24-28, 2016, Vienna, Austria, pp. 1739-1741
  6. B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - In Proc. of 5th International Conference on Networking and Information Technology (ICNIT 2014), November 21-23, 2014, Singapore
  7. S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier - Hidden and Uncontrolled On the Emergence of Network Steganography - In Proc. of ISSE 2014 Securing Electronic Business Processes, pp. 123-133, Springer Vieweg, 2014
  8. B. Lipinski, W. Mazurczyk, K. Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment - In Proc. of 3rd International Workshop on Cyber Crime (IWCC 2014) co-located with the 35th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Jose, USA, May 18
  9. M. Seredynski, R. Aggoune, W. Mazurczyk, K. Szczypiorski, D. Khadraoui - Vehicular Ad Hoc Networks for Join Traffic and Mobility Management - International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2013), Almaty, Kazakhstan, September 10-13, 2013
  10. P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In Proc. of 2nd International Workshop on Cyber Crime (IWCC 2013) co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Francisco, USA, May 24, 2013, pp. 151-157
  11. M. Seredynski, W. Mazurczyk, D. Khadraoui - Multi-Segment Green Light Optimal Speed Advisory - In Proc. of 16th International Workshop on Nature Inspired Distributed Computing (NIDISC 2013), May 20-24, 2013, Boston, Massachusetts USA
  12. W. Mazurczyk, K. Szczypiorski, B. Jankowski - Towards Steganography Detection Through Network Traffic Visualisation - In Proc. of First International Workshop on Cyber Crime (IWCC 2012) co-located with International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012), October 3-5, 2012, St. Petersburg, Russia
  13. W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof?, In Proc. of: The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
  14. W. Frączek, W. Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In Proc. of: First International Workshop on Digital Forensics (IWDF 2011) co-located with The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
  15. P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 121-131, Prague, Czech Republic, 26-28.05.2011
  16. W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography Applied to Networks - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 90-96, Prague, Czech Republic, 26-28.05.2011
  17. B. Jankowski, W. Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding - 14th International Telecommunications Network Strategy and Planning Symposium (Networks 2010), 27-30.09.2010, Warsaw, Poland
  18. W. Frączek, W. Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  19. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  20. K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  21. W. Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In Proc. of: First International Workshop on Network Steganography (IWNS'09), Wuhan, Hubei, China, 18-20 November, 2009 - co-located with 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009), Vol. I, pp. 569-572
  22. T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, 2nd Euro-NF Workshop - Future Internet Architectures: New Trends in Service Architectures Future 2009, 10-12 June 2009, Santander, Spain
  23. W. Mazurczyk, J. Lubacz, K. Szczypiorski - Steganography for Real-time Services in IP Networks, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  24. K. Szczypiorski, J. Lubacz, W. Mazurczyk - Hiding Data in Wireless LANs, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  25. K. Szczypiorski, W. Mazurczyk, K. Cabaj, P. Radziszewski - Towards the Steganographic Routing, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  26. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Hiding Data in VoIP In Proc of: The 26th Army Science Conference (ASC 2008), Orlando, Florida, USA, December 1-4, 2008
  27. W. Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls, In Proc. of the PGTS '08 - the Fifth Polish-German Teletraffic Symposium (A. Feldmann, P. Kuhn, M. Pioro, A. Wolisz [Eds.]), Berlin, Germany, ISBN 978-3-8325-2047-2, Logos Verlag Berlin, pp. 119-128, October 6-8, 2008
  28. Ch.Eliasson, M.Fiedler, T.Ciszkowski, Z.Kotulski, W.Mazurczyk - Parameterisation of a reputation system for VoIP in P2P networks for improved communication quality and security, EuroFGI, IA.7.6 Workshop on Socio-Economic Aspects of Future Generation Internet, Karlskrona, Sweden, 27-29 May, 2008
  29. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo bezprzewodowych sieci WiMAX - Materiały: XI Krajowa Konferencja Zastosowań Kryptografii Enigma 2007, 23-25 maja 2007, Warszawa
  30. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Zarzadzanie kluczami w sieciach WiMAX - Materiały: XI Krajowa Konferencja Zastosowań Kryptografii Enigma 2007, 23-25 maja 2007, Warszawa
  31. W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security In Proceedings of The 13th International Multi-Conference on Advanced Computer Systems ACS 2006, Vol. 1, pp. 361-370, Międzyzdroje 18-20 October 2006, ISBN 83-87362-75-1
  32. W. Mazurczyk - Aspekty bezpieczeństwa sieci P2P na przykładzie Skype - In Proceedings of XXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2006, Bydgoszcz, 13-15 September 2006
  33. W. Mazurczyk - Możliwości wykorzystania watermarkingu do zabezpieczenia telefonii IP - IX Krajowa Konferencja Zastosowań Kryptografii Enigma 2005, Warszawa, maj/czerwiec 2005
  34. W. Mazurczyk - Bezpieczeństwo protokołów sygnalizacyjnych VoIP: koncepcja bezpiecznej współpracy protokołów SIP i H.323 - VIII Krajowa Konferencja Zastosowań Kryptografii Enigma 2004, Warszawa, maj 2004
  35. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - XIX Krajowe Sympozjum Telekomunikacji KST 2003, Bydgoszcz, wrzesień 2003
  36. W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj 2003

Other articles

  1. T. Hoßfeld, D. Collange, M. Fiedler, T. Ciszkowski, Z. Kotulski, W. Mazurczyk - QoEWeb: Quality of Experience and User Behaviour Modelling for Web Traffic, 1st Euro-NF Socio-Economics Workshop, Greece, October 16-17 2008
  2. W. Mazurczyk, K. Szczypiorski - Steganography Harnesses VoIP Networks published in: SC Magazine, Haymarket Media, UK, July 2008
  3. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Luki w VoIP - miesięcznik Hakin9, pazdziernik 2007
  4. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Mechanizmy zabezpieczeń w sieciach WiMAX - dwumiesięcznik Zabezpieczenia, ISSN: 1505-2419, 4/2007
  5. W. Mazurczyk - Rozmowa kontrolowana - miesięcznik CHIP, kwiecień 2006
  6. W. Mazurczyk - Bezpieczeństwo VoIP fakt czy mit? - dwumiesięcznik Zabezpieczenia, 2003
  7. W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo VoIP opartego na SIP - IV Sympozjum AFCEA - Bezpieczeństwo systemów informacyjnych BSI 2003, Warszawa, maj 2003

Patent Applications

  1. Wojciech Mazurczyk, Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesyłania danych w sieci telekomunikacyjnej dla usług multimedialnych - Zgłoszenie wynalazku nr P-396615. Politechnika Warszawska. Data zgłoszenia: 12 pazdziernik 2011

E-prints

  1. B. Lipinski, W. Mazurczyk, K. Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment - In: Computing Research Repository (CoRR), abs/1402.0239, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 February 2014
  2. P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In: Computing Research Repository (CoRR), abs/1303.4264, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 18 March 2013
  3. W. Mazurczyk, M. Kara , K. Szczypiorski - SkyDe: a Skype-based Steganographic Method - In: Computing Research Repository (CoRR), abs/1301.3632, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 16 January 2013
  4. A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - In: Computing Research Repository (CoRR), abs/1210.5888, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 22 October 2012
  5. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography - In: Computing Research Repository (CoRR), abs/1207.0917, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 July 2012
  6. W. Mazurczyk - VoIP Steganography and Its Detection - A Survey - In: Computing Research Repository (CoRR), abs/1203.4374, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 March 2012
  7. E. Zielinska, W. Mazurczyk, K. Szczypiorski - The Advent of Steganography in Computing Environments - In: Computing Research Repository (CoRR), abs/1202.5289, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 23 February 2012
  8. A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography - In: Computing Research Repository (CoRR), abs/1201.6218, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 30 January 2012
  9. W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony - In: Computing Research Repository (CoRR), abs/1111.1250, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 4 November 2011
  10. W. Mazurczyk, P. Kopiczko - What more can be learnt about BitTorrent from meta-data files and uTorrent logs? - In: Computing Research Repository (CoRR), abs/1110.6265, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 28 October 2011
  11. W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof? - In: Computing Research Repository (CoRR), abs/1107.4077, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  12. W. Mazurczyk - Lost Audio Packets Steganography: The First Practical Evaluation - In: Computing Research Repository (CoRR), abs/1107.4076, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  13. W. Frączek, W.Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In: Computing Research Repository (CoRR), abs/1107.4065, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  14. P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In: Computing Research Repository (CoRR), abs/1107.4062, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  15. W. Frączek, W.Mazurczyk, K. Szczypiorski - Hiding Information in a Stream Control Transmission Protocol - In: Computing Research Repository (CoRR), abs/1104.3333, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 17 April 2011
  16. B. Jankowski, W.Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Computing Research Repository (CoRR), abs/1104.0422, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 3 April 2011
  17. W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets In: Computing Research Repository (CoRR), abs/1102.0023, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 31 January 2011
  18. W. Frączek, W.Mazurczyk, K. Szczypiorski - Multi-Level Steganography: Improving Hidden Communication in Networks - In: Computing Research Repository (CoRR), abs/1101.4789, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 25 January 2011
  19. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied In: Computing Research Repository (CoRR), abs/1007.0767, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 July 2010
  20. K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks In: Computing Research Repository (CoRR), abs/1006.0495, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 June 2010
  21. W. Frączek, W.Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In: Computing Research Repository (CoRR), abs/1006.0247, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 1 June 2010
  22. B. Jankowski, W.Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding - In: Computing Research Repository (CoRR), abs/1005.1925, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 12 May 2010
  23. W.Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays? - In: Computing Research Repository (CoRR), abs/1002.4303, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 24 February 2010
  24. W.Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In: Computing Research Repository (CoRR), abs/0907.0313, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 July 2009
  25. W.Mazurczyk, M. Smolarczyk, K. Szczypiorski - Hiding Information in Retransmissions - In: Computing Research Repository (CoRR), abs/0905.0363, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 May 2009
  26. W.Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method - In: Computing Research Repository (CoRR), abs/0811.4138, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 26 November 2008
  27. K. Szczypiorski, I. Margasinski, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: Computing Research Repository (CoRR), abs/0808.4060, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 1 September 2008>
  28. W.Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls - In: Computing Research Repository (CoRR), abs/0806.1034, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 7 June 2008
  29. K. Szczypiorski, I. Margasinski, W.Mazurczyk - Steganographic Routing in Multi Agent System Environment - In: Computing Research Repository (CoRR), abs/0806.0576, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 4 June 2008
  30. W.Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Computing Research Repository (CoRR), abs/0805.3538, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 26 May 2008
  31. W.Mazurczyk, K. Szczypiorski - Steganography of VoIP streams - In: Computing Research Repository (CoRR), abs/0805.2938, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 21 May 2008
  32. T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System - arXiv.org e-Print archive, April 2008
  33. W. Mazurczyk, Z. Kotulski - Lightweight security mechanism for PSTN-VoIP cooperation - arXiv.org e-Print archive, December 2006
  34. W. Mazurczyk, Z. Kotulski - New security and control protocol for VoIP based on steganography and digital watermarking - arXiv.org e-Print archive, February 2006
  35. W. Mazurczyk, Z. Kotulski - Alternative security architecture for IP Telephony based on digital watermarking - arXiv.org e-Print archive, June 2005

Reports

  1. W. Mazurczyk - Deliverable No: D.WP.JRA.6.3.7 - Security considerations for Next Generation Internet - EuroNGI NoE, participation at the authors team, November 2006
  2. W. Mazurczyk - Deliverable No: D.WP.JRA.6.3.5 - Protection of stored data by system level encryption schemes - EuroNGI NoE, participation at the authors team, May 2005

Conference presentations and invited talks

  1. W. Mazurczyk - Challenges of network steganography detection, TAKEDOWN workshop co-located with ARES 2017, August 29 2017, Reggio Calabria, Italy (invited talk)
  2. W. Mazurczyk - Criminal Use of Information Hiding (CUIng) initiative: past, present and future, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (keynote)
  3. W. Mazurczyk - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (paper presentation)
  4. W. Mazurczyk - Criminal Use of Information Hiding Initiative: the First Year, 3rd EC3 Academic Advisory Network Meeting (EC3 AAN), 20 April 2017, The Hague, Netherlands
  5. W. Mazurczyk - Sposoby wspolpracy jednostek badawczych z firmami, PLNOG 2017, 6-7 March 2016, Warsaw, Poland
  6. W. Mazurczyk, K. Cabaj - Information hiding techniques and how modern malware uses them / Techniki ukrywania informacji i sposoby ich wykorzystania przez zlosliwe oprogramowanie, Secure 2016, 25-26 October 2016, Warsaw, Poland
  7. K. Cabaj, W. Mazurczyk - Ransomware infrastructure identification using dynamic analysis based on CryptoWall and Locky families examples / Identyfikacja infrastruktury ransomware z wykorzystaniem analizy dynamicznej na przykladzie rodzin CryptoWall i Locky, Secure 2016, 25-26 October 2016, Warsaw, Poland
  8. W. Mazurczyk - On-going Cybersecurity Research Projects, 2nd EC3 Academic Advisory Network Meeting (EC3 AAN), 6-7 April 2016, The Hague, Netherlands
  9. W. Mazurczyk - Inspirations for innovative cybersecurity technologies, The COURAGE - CAMINO - CyberROAD joint conference on "Emerging and Current Challenges in Cybercrime and Cyberterrorism", 10-11 March 2016, The Hague, Netherlands
  10. K. Cabaj, W. Mazurczyk - Dynamic analysis of CryptoWall network activity, Europol EC3 meeting, 9 March 2016, The Hague, Netherlands
  11. W. Mazurczyk - Influence of modern information hiding techniques on digital forensics, "Secure Europe without borders" conference organized by Lodz Regional Police Headquarters, Poland, February 2016 (invited talk)
  12. W. Mazurczyk - Innovative cyber security methods for NGI (Next Generation Infrastructures), CIPRNet training lecture, May 2015, University of Technology and Life Sciences, Bydgoszcz, Poland
  13. K. Szczypiorski, W. Mazurczyk, E. Rzeszutko - Hiding information in Skype, Materiały: The 5th Annual WUT-KNU Joint Workshop on ICT Programme, 13-14 November 2014, Warsaw, Poland
  14. W. Mazurczyk, K. Szczypiorski, E. Zielińska - Studia realistycznych przypadków steganografii sieciowej, Materiały: Secure 2012, XVI Konferencja na temat bezpieczeństwa teleinformatycznego, 22-24 November 2012, Warsaw, Poland
  15. W. Mazurczyk, K. Szczypiorski - O ukrywaniu informacji w sieciach - XXVII Jesienne Spotkania PTI, Jachranka, 17-20 pazdziernika 2011
  16. W. Mazurczyk - Nowe sposoby ukrywania informacji w sieciach telekomunikacyjnych - Jesienne Warsztaty CSZ, Madralin, 14-16 pazdziernik 2011
  17. W. Mazurczyk, K. Szczypiorski - Information Hiding in Communication Protocols: Network Steganography - 1st Luxembourg-Polish Workshop on Security & Trust (LPWST 2010), May 6-7, 2010, Castle of Bourglinster, Luxembourg
  18. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Ukrywanie informacji w retransmisjach, Materiały: Secure 2009, XIII Konferencja na temat bezpieczeństwa teleinformatycznego, 20-21 October 2009, Warszawa
  19. W. Mazurczyk, K. Cabaj, K. Szczypiorski - Presentation of selected steganographic tools, Seminar: Information hiding in data communication networks organized by TP S.A., Warsaw, 16 October 2009
  20. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganographic methods to secretly transmit data in communication networks, Seminar: Information hiding in data communication networks organized by TP S.A., Warsaw, 16 October 2009
  21. M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznej, XXV Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2009, Warszawa, 16-18 September 2009
  22. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Fundamentals of Networks Steganography - A seminar presentation. FEIT Skopje (Macedonia), 26 June 2009
  23. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganologia sieciowa - czyli o wyrafinowanych sposobach ukrytego przekazywania informacji - A seminar presentation. Polish Information Processing Society, 12 May 2009
  24. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Metody steganografii sieciowej - A seminar presentation. Research and Academic Computer Network, Warsaw, 18 March 2009
  25. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganofonia: ukrywanie informacji w telefonii internetowej - Materiały: Secure 2008, XII Konferencja na temat bezpieczeństwa teleinformatycznego, 2-3 pazdziernika 2008, Warszawa
  26. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Nowe metody steganografii w sieciach - Posiedzenie Sekcji Telekomunikacji Polskiej Akademii Nauki (PAN) podczas XXIII Krajowego Sympozjum Telekomunikacji i Teleinformatyki 2008, 11 wrzesnia 2008, Bydgoszcz
  27. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Bezpieczeństwo usługi VoIP opartej na systemie Asterisk, XXIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2007, Bydgoszcz, 12-14 September 2007
  28. W. Mazurczyk - Covert channel for improving VoIP security The 13th International Multi-Conference on Advanced Computer Systems - ACS 2006, 18-20 October 2006, Miedzyzdroje
  29. W. Mazurczyk - New VoIP traffic security scheme with digital watermarking The 25-th International Conference on Computer Safety, Reliability and Security - SafeComp 2006, 26-29 September 2006, Gdansk
  30. W. Mazurczyk - Bezpieczeństwo VoIP - Materiały: V Konferencja Infrastruktura Telekomunikacyjna dla Biznesu: VoIP - telefonia internetowa: Modele biznesowe i taryfy, 26 stycznia 2006, Warszawa
  31. W. Mazurczyk - Możliwości wykorzystania watermarkingu do zabezpieczenia telefonii IP - IX Krajowa Konferencja Zastosowań Kryptografii Enigma 2005, Warszawa, maj/czerwiec 2005
  32. W. Mazurczyk - Bezpieczeństwo VoIP - Materiały: III Krajowa Konferencja Bezpieczeństwa Biznesu, 22-23 listopada 2004, Warszawa
  33. W. Mazurczyk - Bezpieczeństwo protokołów sygnalizacyjnych VoIP: koncepcja bezpiecznej współpracy protokołów SIP i H.323 - VIII Krajowa Konferencja Zastosowań Kryptografii Enigma 2004, Warszawa, maj 2004
  34. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - XIX Krajowe Sympozjum Telekomunikacji KST 2003, Bydgoszcz, wrzesień 2003
  35. W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo VoIP bazujacego na SIP - IV Sympozjum AFCEA - Bezpieczeństwo systemów informacyjnych "BSI 2003", Warszawa, maj 2003
  36. W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj 2003

Theses

  1. W. Mazurczyk - Information hiding in IP telephony traffic / Ukrywanie informacji w ruchu telefonii IP - rozprawa habilitacyjna / habilitation thesis, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2014
  2. W. Mazurczyk - Steganografia w telefonii IP / Steganography in IP telephony - rozprawa doktorska / PhD thesis pod kierunkiem prof. Jozefa Lubacza, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Listopad 2009
  3. W. Mazurczyk - Bezpieczeństwo i współpraca protokołów sygnalizacyjnych VoIP - praca dyplomowa magisterska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Czerwiec 2004
  4. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - praca dyplomowa inżynierska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2003

Awards and scholarships

  1. W. Mazurczyk, K. Szczypiorski - First degree Rector's Award for Scientific Achievements for Research Team in 2012/2013 (10.2014), Warsaw University of Technology, Poland
  2. W. Mazurczyk - Researcher Travel Scholarship (06-07.2014), Center for Advanced Studies Warsaw University of Technology, December 2013, Poland
  3. W. Mazurczyk - Polish Minister Of Science and Higher Education Scholarship for Outstanding Young Researchers (2013-2015), November 2012, Warsaw, Poland
  4. W. Mazurczyk, K. Szczypiorski - First degree Rector's Award for Scientific Achievements for Research Team in 2009/2010 (10.2011), Warsaw University of Technology, Poland
  5. W. Mazurczyk - Polish Prime Minister's Award for PhD Thesis, November 2010, Warsaw, Poland
  6. W. Mazurczyk - Young Researcher Scholarship (2011-2012), Center for Advanced Studies Warsaw University of Technology, December 2010, Poland
  7. W. Mazurczyk, K. Szczypiorski - First degree Rector's Award for Scientific Achievements for Research Team in 2007/2008 (10.2009), Warsaw University of Technology, Poland
  8. W. Mazurczyk - ACM SIGCOMM Student Travel Grant (08.2009) - funded by supporting organizations of ACM SIGCOMM 2009, Barcelona, Spain
  9. W. Mazurczyk - Mazovia PhD Scholarship (2008-2009) - funded by Mazovia Voivodeship, Polish Goverment

Grants and projects

  1. K. Cabaj (kier.) - CoCoDe: Covert Communication Detection (2017-2020) - R&D project funded by US Air Force Office of Scientific Research, contract No. FA9550-17-1-0254 (role: co-PI at WUT)
  2. W. Mazurczyk (kier.) - IoRL (Internet of Radio Light) (2017-2020) - H2020 project funded by EU (role: Principal Investigator)
  3. J. Keller (kier.) - Detection and countermeasures against information hiding-based malware (DeCoIMa) (2017-2019) - project funded by German Ministry of Education and Research (BMBF) (role: Senior Researcher) [NEW]
  4. J. Keller (kier.) - International Virtual Lab on Information Security (IVLIS) (2017-2018) - project funded by FernUniversitaet within Foerderprogamm Innovative Lehre (FILeh) (role: Senior researcher)
  5. S. Wendzel (kier.), W. Mazurczyk - E2S2E: Energy Efficient and Secure Smart Environment (2016-2018) - project funded by German Ministry of Education and Research (BMBF) (role: PI at WUT)
  6. F. Solano (kier.), W. Mazurczyk - microMole: Sewage Monitoring System for Tracking Synthetic Drug Laboratories (2015-2018) - H2020 project funded by EU (role: Senior researcher)
  7. K. Szczypiorski (kier.), W. Mazurczyk - MobiTraff: Cooperative Way to Mobility and Traffic Efficiency (2013-2015) - funded by National Centre for Research (Poland) and Development and Fonds National de la Recherche (Luxembourg) - POLLUX programm (role: Senior researcher)
  8. W. Mazurczyk, K. Szczypiorski - New Network Anomaly Detection Method (12.2011-12.2014) - funded by National Science Centre (role: PI)
  9. W. Mazurczyk, K. Szczypiorski - Steganographic Methods for IP Networks (01.2012-01.2014) - funded by Polish Ministry of Science and Higher Education (role: PI)
  10. W. Mazurczyk - Methods for Information Hiding in Network Traffic: Analysis and Detection (2012) - funded by Warsaw University of Technology (role: PI)
  11. W. Mazurczyk, K. Szczypiorski - Methods for Network Steganography Detection in IP Networks (12.2010-12.2011) - funded by Polish Ministry of Science and Higher Education (role: PI)
  12. W. Mazurczyk - New Methods for Information Hiding in Telecommunnication Network (2011) - funded by Warsaw University of Technology (role: PI)
  13. J. Lubacz (kier.), K. Szczypiorski, W. Mazurczyk - Methods and Evaluation Environment of Network Steganography (2009-2011) - funded by Polish Ministry of Science and Higher Education (role: researcher)
  14. K. Szczypiorski (kier.), W. Mazurczyk - Prosense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers: Towards Pervasive Networking of WBC and the EU (2008-2010) funded by EU - FP7 (role: Researcher)
  15. K. Szczypiorski (kier.), M. Pioro, W. Mazurczyk - Detecting Frauds in 2G/3G Networks (2008-2009) - funded by Polska Telefonia Cyfrowa - PTC
  16. Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Quality of Experience and User Behaviour Modelling for Web Traffic (QoEWeb) - FP7 - EuroNF, Network of Excellence (2008-2009)
  17. J. Lubacz (kier.), W. Mazurczyk - Steganografia w telefonii IP - Supervisor (research) grant funded by Polish Goverment (2008-2009)
  18. Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Design and Evaluation of End-to-End Quality and Security (SecMon) - FP6 - EuroFGI - Design and Engineering of the Next Generation Internet, Network of Excellence (2007-2008)
  19. K. Szczypiorski(kier.), I. Margasiński, W. Mazurczyk - Trusted Communication Platform for Multi-Agent Systems (TrustMAS), (01.2007-12.2007) - Contract No. N62558-07-P-0042 funded by European Research Office of US Army (also supported by European Office of Aerospace Research and Development of US Air Force)
  20. K. Szczypiorski (kier.), W. Mazurczyk, K. Cabaj, S. Strzelak - Ochrona danych w sieciach WiMAX - Warszawa, listopad 2006, Instytut Telekomunikacji PW na zlecenie Instytutu Łacznosci w ramach Programu Wieloletniego - "Rozwój Telekomunikacji i Poczty w Dobie Społeczeństwa Informacyjnego", pazdziernik 2006
  21. W. Mazurczyk - Nowoczesne systemy komunikacji głosowej: VoIP, opracowanie na zlecenie NextiraOne, sierpień 2006
  22. Advanced network steganographic systems - stegano.net
  23. Bio-Inspired Cybersecurity Project -

WM