Wojciech Mazurczyk
Wojciech Mazurczyk
Associate Professor, Warsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)
Verified email at tele.pw.edu.pl - Homepage
TitleCited byYear
Trends in Steganography
E Zielińska, W Mazurczyk, K Szczypiorski
Communications of the ACM 57 (3), 86-95, 2014
186*2014
Steganography of VoIP streams
W Mazurczyk, K Szczypiorski
OTM Confederated International Conferences" On the Move to Meaningful …, 2008
1432008
Using transcoding for hidden communication in IP telephony
W Mazurczyk, P Szaga, K Szczypiorski
Multimedia Tools and Applications 70 (3), 2139-2165, 2014
882014
Using software-defined networking for ransomware mitigation: the case of cryptowall
K Cabaj, W Mazurczyk
Ieee Network 30 (6), 14-20, 2016
792016
LACK—a VoIP steganographic method
W Mazurczyk, J Lubacz
Telecommunication Systems 45 (2-3), 153-163, 2010
792010
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
762016
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
712014
VoIP steganography and its Detection—A survey
W Mazurczyk
ACM Computing Surveys (CSUR) 46 (2), 20, 2013
702013
Retransmission steganography and its detection
W Mazurczyk, M Smolarczyk, K Szczypiorski
Soft Computing 15 (3), 505-515, 2011
632011
New security and control protocol for VoIP based on steganography and digital watermarking
W Mazurczyk, Z Kotulski
arXiv preprint cs/0602042, 2006
632006
Covert Channels in SIP for VoIP signalling
W Mazurczyk, K Szczypiorski
International Conference on Global e-Security, 65-72, 2008
612008
Principles and overview of network steganography
J Lubacz, W Mazurczyk, K Szczypiorski
IEEE Communications Magazine 52 (5), 225-229, 2014
602014
Vice over IP
J Lubacz, W Mazurczyk, K Szczypiorski
IEEE Spectrum 47 (2), 42-47, 2010
552010
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
K Cabaj, M Gregorczyk, W Mazurczyk
Computers & Electrical Engineering 66, 353-368, 2018
542018
New VoIP traffic security scheme with digital watermarking
W Mazurczyk, Z Kotulski
Computer Safety, Reliability, and Security, 170-181, 2006
452006
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
arXiv preprint arXiv:1504.04867, 2015
442015
SkyDe: a Skype-based steganographic method
W Mazurczyk, M Karas, K Szczypiorski
arXiv preprint arXiv:1301.3632, 2013
432013
Information hiding using improper frame padding
B Jankowski, W Mazurczyk, K Szczypiorski
2010 14th International Telecommunications Network Strategy and Planning …, 2010
432010
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
422015
PadSteg: introducing inter-protocol steganography
B Jankowski, W Mazurczyk, K Szczypiorski
Telecommunication Systems 52 (2), 1101-1111, 2013
412013
The system can't perform the operation now. Try again later.
Articles 1–20