Search filters

List of works by Wojciech Mazurczyk

(In)Secure Android Debugging: Security analysis and lessons learned

scientific article published in 2019

5G Internet of radio light services for Musée de la Carte à Jouer

5G Internet of radio light services for supermarkets

A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods

Advances in digital media security and right management

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments

Challenges and Novel Solutions for 5G Network Security, Privacy and Trust

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

scientific article published in 2021

Context-Aware Software Vulnerability Classification Using Machine Learning

scientific article published in 2021

Cybersecurity: trends, issues, and challenges

Disinformation detection and source tracking using semi-fragile watermarking and blockchain

scientific article published on 04 June 2024

Distributed packet inspection for network security purposes in software-defined networking environments

Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images

scientific article published in 2022

Efficient distributed network covert channels for Internet of things environments†

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

scientific article published in 2019

Emerging and Unconventional: New Attacks and Innovative Detection Techniques

Exploiting IP telephony with silence suppression for hidden data transfers

Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability

Guest editorial: Information security methodology and replication studies

scientific article published in 2022

Influence of speech codecs selection on transcoding steganography

Information Hiding as a Challenge for Malware Detection

Information Security Methodology, Replication Studies and Information Security Education

scientific article published in 2020

Information hiding

article published in 2017

Insights from nature for cybersecurity

scientific article

Investigating HTTP Covert Channels Through Fuzz Testing

scientific article published on 25 July 2024

Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System

scientific article published on 21 February 2019

Network and Application Layer Services for High Performance Communications in Buildings

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average

Network covert channels detection using data mining and hierarchical organisation of frequent sets

Network forensics and challenges for cybersecurity

On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method

Proof-of-work based new encoding scheme for information hiding purposes

scientific article published on 09 August 2023

Recent Advancements in Digital Forensics

scientific article published in 2017

Recent Advancements in Digital Forensics, Part 2

scientific article published in 2019

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System

Securing Modern Network Architectures with Software Defined Networking

Security Architecture in the SILVANUS project

scientific article published on 09 August 2023

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

scholarly article by Luca Caviglione et al published April 2016 in IEEE Transactions on Information Forensics and Security

Sniffing Detection Based on Network Traffic Probing and Machine Learning

Sniffing Detection within the Network

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics

Special issue on Advancements in 5G Networks Security

scientific article published in 2020

Steganalysis of transcoding steganography

scientific article

Steganography in Modern Smartphones and Mitigation Techniques

Teaching Cyber Security Through Distance Learning with International Students

The Future of Digital Forensics: Challenges and the Road Ahead

scientific article published in 2017

The New Threats of Information Hiding: The Road Ahead

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach

Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach

Towards Effective Security Framework for Vehicular Ad-Hoc Networks

scientific article published in 2015

Towards a Systematic View on Cybersecurity Ecology

scientific article

TrustMAS: Trusted Communication Platform for Multi-Agent Systems

Understanding Information Hiding in iOS

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

What are suspicious VoIP delays?

YouSkyde: information hiding for Skype video traffic