Selected papers


Books

  1. A. Abd El-Latif, M. Adel Hammad, Y. Maleh, B. Gupta, W. Mazurczyk (Eds.) - Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications, IET, DOI: 10.1049/PBSE020E, 2023 [ORDER]
  2. D. Megias, W. Mazurczyk, M. Kuribayashi (Eds.) - Data Hiding and Its Applications: Digital Watermarking and Steganography, MDPI, https://doi.org/10.3390/books978-3-0365-2937-0, January 2022 [ORDER]
  3. A. Abd El-Latif, B. Abd-El-Atty, S. Venegas-Andraca, W. Mazurczyk, B. Gupta - Security and Privacy Preserving for IoT and 5G Networks, Springer International Publishing, DOI: 10.1007/978-3-030-85428-7, 2022 [ORDER]
  4. E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk - Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications, Institution of Engineering and Technology (IET), March 2019, ISBN: 978-1-78561-638-9 [ORDER]
  5. W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, K. Szczypiorski - Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures, IEEE Press Series on Information and Communication Networks Security, IEEE Press-Wiley, April 2016, ISBN-10: 1118861698 [ORDER]
  6. Z. Yan, R. Molva, W. Mazurczyk, R. Kantola (Eds.) - Network and System Security, 11th International Conference on Network and System Security Proceedings (NSS 2017), Helsinki, Finland, August 21-23, 2017, DOI: 10.1007/978-3-319-64701-2

Work in progress or submitted

  1. A. Brodzik, W. Mazurczyk - Assessing the Threat of Neural Network Enhanced Obfuscation in Malware (submitted)
  2. M. T. Ahvanooey, W. Mazurczyk, D. Lee - Science, Deepfake Socio-Economic Threats, and the Role of Cyber-Wellness Education (submitted)
  3. D. Kolasa, K. Pilch, W. Mazurczyk - Detecting Malicious Clients in Federated Learning Using Weights Comparison (submitted)
  4. S. Wendzel, L. Caviglione, A. Houmansadr, W. Mazurczyk - We Belong Together: Concealment and Circumvention Research Share Common Ground (submitted)
  5. M. T. Ahvanooey, W. Mazurczyk, L. Caviglione, K. R. Choo - Blockchain-based Authentication Schemes for IoT Environment: Cybersecurity Challenges and Opportunities (submitted)

Journal papers - accepted or published

    (in JCR list)
  1. A. Malanowska, W. Mazurczyk, T. Araghi, D. Megias, M. Kuribayashi - Digital watermarking - a meta-survey and techniques for fake news detection, IEEE Access, 2024, pp. 1-35, DOI: 10.1109/ACCESS.2024.3374201 [NEW]
  2. K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk - Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security applications in IoT environments, Computer Networks, Volume 242, April 2024, 110252, DOI: 10.1016/j.comnet.2024.110252 [NEW]
  3. W. Mazurczyk, D. Lee, A. Vlachos - Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective, Communications of the ACM, Volume 67, Issue 3, pp 36-39, DOI: 10.1145/3624721, March 2024 [NEW]
  4. L. Caviglione, W. Mazurczyk - You Can't Do That On Protocols Anymore: Analysis of Covert Channels in IETF Standards, IEEE Network, 2024, DOI: 10.1109/MNET.2024.3352411 [NEW]
  5. R. Kozik, W. Mazurczyk, K. Cabaj, A. Pawlicka, M. Pawlicki, M. Choras - Deep Learning for Combating Misinformation in Multicategorical Text Content, Sensors 2023, 23, 9666, DOI: 10.3390/s23249666
  6. A. Kuzdralinski, M. Miskiewicz, H. Szczerba, W. Mazurczyk, J. Nivala, B. Ksiezopolski - Unlocking the Potential of DNA-Based Tagging: Current Market Solutions and Expanding Horizons, Nature Communications, volume 14, Article number: 6052, 2023
  7. P. Zorawski, L. Caviglione, W. Mazurczyk - A Long-term Perspective of the Internet Traffic Vulnerability to Covert Channels, IEEE Communications, Volume: 61, Issue: 10, October 2023, DOI: 10.1109/MCOM.011.2200744
  8. R. Kozik, A. Pawlicka, M. Pawlicki, M. Choras, W. Mazurczyk, K. Cabaj- A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods", IEEE Transactions on Computational Social Systems, DOI: 10.1109/TCSS.2023.3296627
  9. C. Sun, H. Tian, W. Mazurczyk, C. Chang, H. Quan, Y. Chen - Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning, Computers and Electrical Engineering, Volume 111, Part A, 2023, https://doi.org/10.1016/j.compeleceng.2023.108909
  10. H. Tian, H. Wang, H. Quan, W. Mazurczyk, C. Chang - FedSpy: A Secure Collaborative Speech Steganalysis Framework Based on Federated Learning, Electronics 2023, 12, 2854. https://doi.org/10.3390/electronics12132854
  11. M. Kowalski, W.Mazurczyk - Toward the mutual routing security in wide area networks a scoping review of current threats and countermeasures, Computer Networks, Vol. 230, July 2023, 109778
  12. M. T. Ahvanooey, X. Zhu, S. Ou, H. D. Mazraeh, W. Mazurczyk, K. R. Choo, C. Li - AFPr-AM: A Novel Fuzzy-AHP based Privacy Risk Assessment Model For Strategic Information Management of Social Media Platforms, Computers & Security, Vol. 130, July 2023, 103263
  13. S. Wendzel, L. Caviglione, W. Mazurczyk - Avoiding Research Tribal Wars Using Taxonomies, IEEE Computer magazine, Vol. 56(1), 2022
  14. H. Tian, Y. Qiu, W. Mazurczyk, H. Li, Z. Qian - STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Voice-over-IP Streams, IEEE/ACM Transactions on Audio, Speech and Language Processing, 2022, DOI: 10.1109/TASLP.2022.3224295
  15. M. T. Ahvanooey, X. Zhu, W. Mazurczyk, Q. Li, M. Kilger, K. R. Choo, M. Conti - CovertSYS: A Systematic Covert Communication Approach for Providing Perfectly Secure End-to-End Conversation via Social Networks, Journal of Information Security and Applications, Vol. 71, 2022, DOI: https://doi.org/10.1016/j.jisa.2022.103368
  16. C. Sun, H. Tian, W. Mazurczyk, C. Chang, Y. Cai, Y. Chen Towards blind detection of steganography in low-bit-rate speech streams - International Journal of Intelligent Systems, Wiley, 2022, 1- 28. DOI:10.1002/int.23077
  17. L. Caviglione, W. Mazurczyk - Never Mind The Malware, Here's The Stegomalware - IEEE S&P magazine, Volume 20, Issue 5, 2022, DOI: 10.1109/MSEC.2022.3178205
  18. Y. Qiu, H. Tian, L. Tang, W. Mazurczyk, C. Chang, Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords, Journal of Information Security and Applications, Vol. 68, August 2022, 103250, DOI: 10.1016/j.jisa.2022.103250
  19. A. Schaffhauser, W. Mazurczyk, M. Zuppelli, L. Caviglione, J-H. Castro - Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images, Security and Communication Networks, 2022
  20. M. Zuppelli, M. Repetto, A. Schaffhauser, W. Mazurczyk, L. Caviglione - Code Layering for the Detection of Network Covert Channels in Agentless Systems, IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2022.3176752, 2022
  21. P. Szary, W. Mazurczyk, S. Wendzel, L. Caviglione - Analysis of Reversible Network Covert Channels - IEEE Access, 2022, DOI: 10.1109/ACCESS.2022.3168018
  22. D. Megias, M. Kuribayashi, A. Rosales, K. Cabaj, W. Mazurczyk - Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 13, Number 1, pp. 33-55, March 2022, DOI:10.22667/JOWUA.2022.03.31.033
  23. L. Caviglione, A. Schaffhauser, M. Zuppelli, W. Mazurczyk - IPv6CC: IPv6 Covert Channels for Testing Networks Against Stegomalware and Data Exfiltration, SoftwareX journal, Elsevier, Volume 17, January 2022, no. 100975, DOI: 10.1016/j.softx.2022.100975
  24. M. T. Ahvanooey, X. Zhu, Q. Li, W. Mazurczyk, K. R. Choo, B. B. Gupta, M. Conti - Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey, IEEE Internet of Things Journal, 2022, DOI: 10.1109/JIOT.2021.3138073
  25. M. T. Ahvanooey, X. Zhu, W. Mazurczyk, M. Bendechache - Information Hiding in Digital Textual Contents: Techniques, and Current Challenges, IEEE Computer magazine, vol. 55, no. 6, pp. 56-65, June 2022, DOI: 10.1109/MC.2021.3113922.
  26. M. T. Ahvanooey, X. Zhu, W. Mazurczyk, K. R. Choo, M. Conti, J. Zhang - Misinformation Detection on Social Media: Challenges and The Road Ahead, IEEE IT Professional Magazine, Volume: 24, Issue: 1, Jan.-Feb. 1 2022, pp. 34-40, DOI: 10.1109/MITP.2021.3120876
  27. P. Rajba, W. Mazurczyk- Information Hiding using Minification, IEEE Access, vol. 9, pp. 66436 - 66449, 2021, doi: 10.1109/ACCESS.2021.3077197
  28. S. Nowaczewski, W. Mazurczyk - Improving Security of Future Networks Using Enhanced Customer Edge Switching and Risk-Based Analysis, Electronics, MDPI, 10(9), 1107; https://doi.org/10.3390/electronics10091107, 2021
  29. G. Siewruk, W. Mazurczyk - Context-Aware Software Vulnerabilities Classification using Machine Learning, IEEE Access, vol. 9, pp. 88852 - 88867, 2021, DOI: 10.1109/ACCESS.2021.3075385
  30. P. Bialczak, W. Mazurczyk - Fingerprinting malware HTTP communication, Entropy 2021, 23(5), 507; https://doi.org/10.3390/e23050507
  31. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 12, Number 1, March 2021 , pp. 44-63, DOI:10.22667/JOWUA.2021.03.31.044
  32. L. Caviglione, W. Mazurczyk, M. Repetto, A. Schaffhauser, M. Zuppelli - Kernel-level Tracing for Detecting Stegomalware and Covert Channels, Computer Networks, https://doi.org/10.1016/j.comnet.2021.108010, 2021
  33. W. Mazurczyk, L. Caviglione - Cyber Reconnaissance Techniques - Communications of the ACM, March 2021, Vol. 64 No. 3, Pages 86-95, DOI: 10.1145/3418293
  34. D. Shi, X. Zhang, L. Shi, A. Vladimirescu, W. Mazurczyk, K. Cabaj, B. Meunier, K. Ali, J. Cosmas, H. Zhang, Y. Zhang - On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method, MDPI, Sensors 2021, 21(4), 1515; https://doi.org/10.3390/s21041515, 2021
  35. A. Velinov, A. Mileva, L. Hartmann, S. Wendzel, W. Mazurczyk - Comprehensive Analysis of MQTT 5.0 Susceptibility to Network Covert Channels, Computers & Security, Elsevier, Volume 104, May 2021, DOI: https://doi.org/10.1016/j.cose.2021.102207
  36. L. Caviglione, M. Choras, I. Corona, A.Janicki, W. Mazurczyk, M. Pawlicki, K. Wasilewska - Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection, IEEE Access, vol. 9, pp. 5371-5396, 2021, doi: 10.1109/ACCESS.2020.3048319
  37. K. Cabaj, P. Zorawski, P. Nowakowski, M. Purski, W. Mazurczyk - Efficient Distributed Network Covert Channels for Internet of Things Environments, Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa018, https://doi.org/10.1093/cybsec/tyaa018
  38. S. Nowaczewski, W. Mazurczyk - Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), September 2020, DOI: DOI:10.22667/JOWUA.2020.09.30.087
  39. P. Bialczak, W. Mazurczyk - Characterizing Anomalies in Malware-generated HTTP Traffic, Security and Communication Networks, vol. 2020, Article ID 8848863, 26 pages, 2020. https://doi.org/10.1155/2020/8848863
  40. M. Gregorczyk, P. Zorawski, P. Nowakowski, K. Cabaj, W. Mazurczyk - Sniffing Detection Based on Traffic Probing and Machine Learning, IEEE Access, 2020, DOI: 10.1109/ACCESS.2020.3016076
  41. P. Laka, Z. Korzeb, W. Mazurczyk - Novel user authentication method based on body composition analysis - Annals of Telecommunications, 2020, https://doi.org/10.1007/s12243-020-00779-y
  42. W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, K. Cabaj - Challenges and Novel Solutions for 5G Network Security, Privacy and Trust - IEEE Wireless Communications, vol. 27, no. 4, pp. 6-7, August 2020, doi: 10.1109/MWC.2020.9170261
  43. A. El-Latif, B. Abd-El-Atty, S. Venegas-Andraca, H. Elwahsh, MD. Jalil Piran, A. K. Bashir, O. Song, W. Mazurczyk - Providing End-to-End Security Using Quantum Walks in IoT Networks, IEEE Access, Vol. 8, 2020, pp. 92687-92696, DOI: 10.1109/ACCESS.2020.2992820
  44. J. Saenger, W. Mazurczyk, J. Keller, L. Caviglione - VoIP network covert channels to enhance privacy and information sharing, Future Generation Computer Systems, Vol. 111, October 2020, pp. 96-106, DOI: 10.1016/j.future.2020.04.032
  45. A. EL-Latif, B. Abd-El-Attya, W. Mazurczyk, C. Fung, S. Venegas-Andraca - Secure data encryption based on quantum walks for 5G Internet of Things scenario, IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2020.2969863, Vol. 17 , Iss.: 1, March 2020, pp. 118-131
  46. W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, K. Cabaj - Special issue on Advancements in 5G Networks Security - Future Generation Computer Systems, September 2020, Vol. 110, pp. 314-316, DOI:10.1016/j.future.2020.04.043
  47. M. Skowron, A. Janicki, W. Mazurczyk - Traffic Fingerprinting Attacks on the Internet of Things using Machine Learning, IEEE Access, Vol. 8, 2020, pp. 20386-20400, DOI: 10.1109/ACCESS.2020.2969015
  48. S. Wendzel, F. Link, D. Eller, W. Mazurczyk - Detection of Size Modulation Covert Channels, Journal of Universal Computer Science, Volume 25 / Issue 11, p. 1396-1416, 2019
  49. J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec - Cyberattack Detection and Response, Journal of Universal Computer Science, Volume 25 / Issue 11, p. 1394-1395, 2019
  50. A. Velinov, A. Mileva, S. Wendzel, W. Mazurczyk - Covert Channels in MQTT-based Internet of Things, IEEE Access, 2019, DOI: 10.1109/ACCESS.2019.2951425
  51. Z. Lv, W. Mazurczyk, S. Wendzel, H. Song, Recent Advances in Cyber-Physical Security in Industrial Environments, IEEE Transactions on Industrial Informatics, 2019, DOI: 10.1109/TII.2019.2945971
  52. A. EL-Latif, B. Abd-El-Attya, S. Venegas-Andraca, W. Mazurczyk - Efficient quantum-based security protocols for information sharing and data protection in 5G Networks, Future Generation Computer Systems, Vol. 100, November 2019, pp. 893-906, DOI: https://doi.org/10.1016/j.future.2019.05.053
  53. A. Janicki, W. Mazurczyk, X. Luo, D. Ye, Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes - Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 25, No. 9, 2019, pp. 1039-1043
  54. N. Jawad, M. Salih, K. Ali, B. Meunier, Y. Zhang, X. Zhang, R. Zetik, C. Zarakovitis, H. Koumaras, M. Kourtis, L. Shi, W. Mazurczyk, J. Cosmas - Smart Television Services using NFV/SDN Network Management, IEEE Transactions on Broadcasting, 2019, DOI: 10.1109/TBC.2019.2898159
  55. W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics, part 2 - IEEE S&P magazine, Vol.: 17, Iss.: 1, Jan.-Feb. 2019, DOI: 10.1109/MSEC.2019.2896857
  56. K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - Network threats mitigation using Software-Defined Networking for the 5G Internet of Radio Light system, Security and Communication Networks, John Wiley & Sons, 2019, Vol. 2019, Article ID 4930908, 22 pages, DOI: 10.1155/2019/4930908
  57. K. Opasiak, W. Mazurczyk - (In)Secure Android Debugging, Computers & Security, Elsevier, Vol. 82, May 2019, pp. 80-98, DOI: 10.1016/j.cose.2018.12.010
  58. W. Mazurczyk, S. Wendzel, M. Chourib, J. Keller - Countering Network Covert Channels with Dynamic Wardens, Future Generation Computer Systems, 2019, DOI: 10.1016/j.future.2018.12.047
  59. S. Schmidt, W. Mazurczyk, R. Kulesza, J. Keller, L. Caviglione - Exploiting IP Telephony with Silence Suppression for Hidden Data Transfers, Computers & Security, Elsevier, Volume 79, November 2018, Pages 17-32
  60. J. Keller, I. Bernik, W. Mazurczyk - Technical and Social Aspects of Critical Infrastructure Security, Journal of Universal Computer Science (J. UCS), vol. 24, no. 5 (2018), 554-555, ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM
  61. P. Laka, W. Mazurczyk - User Perspective and Security of a New Mobile Authentication, Telecommunication Systems, November 2018, Volume 69, Issue 3, pp 365-379, DOI: 10.1007/s11235-018-0437-1
  62. K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander - The New Threats of Information Hiding: the Road Ahead, IEEE IT Professional, May/June 2018
  63. L. Caviglione, W. Mazurczyk, S. Wendzel, S. Zander - Emerging and Unconventional: New Attacks and Innovative Detection Techniques, Security and Communication Networks, Article ID 9672523, 2018, DOI:10.1155/2018/9672523
  64. W. Mazurczyk, S. Wendzel - Information Hiding: Challenges for Forensic Experts - Communications of the ACM, Vol. 61 No. 1, Pages 86-94, DOI: 10.1145/3158416
  65. K. Cabaj, M. Gregorczyk, W. Mazurczyk - Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics, Computers and Electrical Engineering, Vol. 66, pp. 353-368, DOI: 10.1016/j.compeleceng.2017.10.012, February 2018
  66. W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 10 - 11, Nov./Dec. 2017
  67. L. Caviglione, S. Wendzel, W. Mazurczyk - The Future of Digital Forensics: Challenges and the Road Ahead - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 12 - 17, Nov./Dec. 2017, DOI: 10.1109/MSP.2017.4251117
  68. L. Caviglione, M. Podolski, W. Mazurczyk, M. Ianigro - Covert Channels in Personal Cloud Storage Services: the case of Dropbox, IEEE Transactions on Industrial Informatics, Vol. 13, Iss. 4, pp. 1921-1931, 2017 DOI: 10.1109/TII.2016.2627503
  69. W. Mazurczyk, M. Korczynski, K. Nakao, E. Kirda, C. Hesselman, K. Yoshioka - Traffic Measurements for Cyber Security - IEEE Communication Magazine, Vol. 55, Iss. 7, pp. 12-13, DOI: 10.1109/MCOM.2017.7981517, 2017
  70. S. Wendzel, W. Mazurczyk, S. Zander - A Unified Description for Network Information Hiding Methods, Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 22, No. 11, 2016, pp. 1456-1486
  71. K. Cabaj, W. Mazurczyk - Using Software-Defined Networking for Ransomware Mitigation: the Case of CryptoWall, IEEE Network, November/December 2016, DOI: 10.1109/MNET.2016.1600110NM, pp. 14-20
  72. T. Andrysiak, L. Saganowski, W. Mazurczyk - Network Anomaly Detection for Railway Critical Infrastructure based on Autoregressive Fractional Integrated Moving Average, EURASIP Journal on Wireless Communications and Networking, 2016, 2016(1), pp. 1-14, DOI: 10.1186/s13638-016-0744-8
  73. W. Mazurczyk, K. Szczypiorski, Z. Duric, D. Ye - Cyber Crime - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2861-2863, 2016, DOI: 10.1002/sec.1603
  74. W. Mazurczyk, S. Moore, E. W. Fulp, H. Wada, K. Leibnitz - Bio-inspired Cyber Security for Communications and Networking - IEEE Communication Magazine, pp. 120-121, June 2016
  75. M. Urbanski, W. Mazurczyk, J-F. Lalande, L. Caviglione - Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones - International Journal of Computer Systems Science and Engineering, Vol. 32 No. 2, March 2017
  76. L. Caviglione, M. Gaggero, J-F. Lalande, M. Urbanski, W. Mazurczyk - Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence - IEEE Transactions on Information Forensics and Security, Vol. 11, No. 4, pp. 799-810, April 2016
  77. M. Naumann, S. Wendzel, W. Mazurczyk, J. Keller - Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2972-2985, 2016, DOI: 10.1002/sec.1500
  78. W. Mazurczyk, T. Holt, K. Szczypiorski - Guest Editors' Introduction: Special Issue on Cyber Crime - IEEE Transactions on Dependable and Secure Computing, Vol. 13, Iss. 2, March/April 2016, pp. 146-147, DOI: 10.1109/TDSC.2015.2502407
  79. W. Mazurczyk, K. Szczypiorski, A. Janicki, H. Tian - Trends in modern Information Hiding: techniques, applications, and detection - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1469, Vol. 9, Iss. 8, pp. 703-704, 2016
  80. W. Mazurczyk, M. Karas, K. Szczypiorski, A. Janicki - YouSkyde: Information Hiding for Skype Video Traffic - Multimedia Tools and Applications, 75(21), pp. 13521-13540, 2016, DOI: 10.1007/s11042-015-2740-0
  81. A. Janicki, W. Mazurczyk, K. Szczypiorski - On the Undetectability of Transcoding Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1301
  82. W. Mazurczyk, L. Caviglione - Information Hiding as a Challenge for Malware Detection - IEEE Security and Privacy Magazine, Issue 2, March/April 2015, pp. 89-93
  83. E. Rzeszutko, W. Mazurczyk - Insights from Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2: 82-87
  84. L. Caviglione, W. Mazurczyk - Understanding Information Hiding in iOS - IEEE Computer Magazine, January 2015, Vol. 48, Iss. 1, pp. 62 - 65
  85. W. Mazurczyk, E. Rzeszutko - Security - a perpetual war: lessons from nature - IEEE IT Professional, vol. 17, no. 1, pp. 16-22, January/February 2015
  86. A. Janicki, W. Mazurczyk, K. Szczypiorski - Evaluation of Efficiency of Transcoding Steganography - Journal of Homeland Security and Emergency Management, 2015, DOI: 10.1515/jhsem-2014-0028
  87. W. Mazurczyk, L. Caviglione - Steganography in Modern Smartphones and Mitigation Techniques - IEEE Communications Surveys & Tutorials, Vol. 17, Iss. 1, pp. 334 - 357, 2014, DOI: 10.1109/COMST.2014.2350994
  88. W. Mazurczyk, S. Wendzel, I. Azagra Villares, K. Szczypiorski - On Importance of Steganographic Cost For Network Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, DOI: 10.1002/sec.1085, 2016; Vol. 9, Iss. 8, pp. 781-790
  89. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography, IEEE Communication Magazine, vol. 52, no. 5, May 2014
  90. E. Zielinska, W. Mazurczyk, K. Szczypiorski - Trends in Steganography - Communications of the ACM, vol 57, No.2, March 2014, pp. 86-95
  91. W. Mazurczyk, K. Szczypiorski, J. Lubacz - The Spy Who Skyped Me - Four New Ways to Smuggle Messages Across the Internet, IEEE Spectrum, November 2013, p. 40-43
  92. W. Mazurczyk, K. Szczypiorski - Advances in digital media security and right management - Multimedia Systems Journal, DOI 10.1007/s00530-013-0339-8
  93. A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 449-460, DOI: 10.1007/s12243-013-0385-4
  94. W. Mazurczyk, K. Szczypiorski, H. Tian - Network forensics and challenges for cybersecurity - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 345-346, DOI: 10.1007/s12243-014-0434-7
  95. W. Mazurczyk, P. Kopiczko - Understanding BitTorrent Through Real Measurements - China Communications, 2013 10 (11): 107-118, ISSN: 1673-5447
  96. W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony - Multimedia Tools and Applications, Volume 70, Issue 3, pp. 2139-2165, DOI: 10.1007/s11042-012-1224-8, June 2014
  97. W. Mazurczyk, M. Karas, K. Szczypiorski - SkyDe: a Skype-based Steganographic Method - International Journal of Computers, Communications & Control (IJCCC), ISSN: 1841- 9836, 8(3), June 2013, pp. 389-400
  98. W. Mazurczyk - VoIP Steganography and Its Detection - A Survey - ACM Computing Surveys, vol. 46, Issue. 2, November 2013
  99. A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography - Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 59, Iss. 3, pp. 305-3315, DOI 10.1007/s11235-014-9937-9, 2015
  100. W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography: Improving Hidden Communication in Networks - Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 18, No. 14, 2012, pp. 1967-1986
  101. W. Mazurczyk, K. Szczypiorski - Toward Effective and Reliable Digital Forensics - Computer Journal, Vol. 55, Iss. 6, Oxford University Press, June 2012, pp. 651-652
  102. W. Mazurczyk - Lost Audio Packets Steganography: A First Practical Evaluation - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Vol. 5, Iss. 12, pp. 1394-1403, December 2012
  103. W. Frączek, W. Mazurczyk, K. Szczypiorski - Hiding Information in Stream Control Transmission Protocol - Computer Communication Journal (ComCom), Elsevier, ISSN: 0140-3664, January 2012, 35 (2), pg. 159-169
  104. W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets - International Journal of Security and Communication Networks, John Wiley & Sons, doi: 10.1002/sec.388, ISSN: 1939-0114
  105. K. Szczypiorski, W. Mazurczyk - Steganography in IEEE 802.11 OFDM Symbols - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Vol. 3:1-12, 2011
  106. B. Jankowski, W. Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 52, Issue 2, 2013, pp. 1101-1111, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  107. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - On Information Hiding in Retransmissions - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 52, Issue 2, 2013, pp. 1113-1121, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  108. W. Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays? - In: Multimedia Tools and Applications (published online 22.04.2010), ISSN: 1380-7501 (print version), ISSN: 1573-7721 (electronic version), Springer US, Journal no. 11042, Vol. 57, Issue 1, pp. 109-126, 2012
  109. W. Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method - In: Telecommunication Systems: Modelling, Analysis, Design and Management, 2010, Volume 45, Numbers 2-3, Pages 153-163, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  110. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Vice over IP (invited paper) In: IEEE Spectrum, ISSN: 0018-9235, February 2010, pp. 40-45
  111. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography and Its Detection In: Soft Computing, ISSN: 1432-7643 (print version) ISSN: 1433-7479 (electronic version), Journal no. 500 Springer, Vol. 15, Issue 3, p. 505-515, 2011
  112. W. Mazurczyk, K. Szczypiorski - Evaluation of Steganographic Methods for Oversized IP Packets In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 49, Issue 2 (2012), Page 207-217, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  113. K. Szczypiorski, W. Mazurczyk - Toward network steganography detection - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 49, Issue 2 (2012), Page 161-162, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  114. T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 51: Issue 4, December 2012, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  115. G.F. Marias, J. Barros, M. Fiedler, R. Herkenhoener, A. Grillo, A. Lentini, L. Lima, C.Lorentzen, W. Mazurczyk, H. de Meer, P. Oliveira, G.C. Polyzos, E. Pujol, K.Szczypiorski, J.P. Vilela, T. Vinhoza - Security and Privacy Issues for the Network of the Future, International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Volume 5, Issue 9, pages 987 1005, September 2012

Other journal papers

  1. K. Kaminski, W. Mazurczyk - RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook, International Journal of Electronics and Telecommunications, Vol. 69, No. 4, pp. 803-810, 2023, DOI: 10.24425/ijet.2023.147704 [NEW]
  2. A. Nilizadeh, S. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Adaptive Matrix Pattern Steganography on RGB Images, Journal of Cyber Security and Mobility (JCSM), Vol. 11, Iss. 1, River Publishers, 2022
  3. G. Siewruk, W. Mazurczyk, A. Karpinski - Security Assurance in DevOps Methodologies and Related Environments, International Journal of Electronics and Telecommunications, Vol. 65, NO. 2, PP. 211-216, 2019
  4. S. Wendzel, W. Mazurczyk, G. Haas - Steganography for Cyber Physical Systems, Journal of Cyber Security and Mobility (JCSM), Vol. 6(2), pp. 105-126, River Publishers, 2017
  5. S. Wendzel, L. Caviglione, W. Mazurczyk, J-F. Lalande - Network Information Hiding and Science 2.0: Can it be a Match?, International Journal of Electronics and Telecommunications, Vol. 63, No. 2, 2017, pp. 217-222
  6. W. Mazurczyk - Nature as an inspiration for the next-generation network defences, Journal of Cyber Security and Mobility, December 2016, DOI: 10.13052/popcas013
  7. W. Mazurczyk, P. Amann, L. Caviglione, S. Wendzel - CUIng: Criminal Use of Information Hiding Initiative, European CIIP Newsletter (ECN 25), Vol. 10, No. 3, November 16 - February 17, December 2016, pp. 31-32
  8. P. Łąka, D. Flaga, W. Mazurczyk - Bezpieczne uwierzytelnianie z wykorzystaniem urządzeń mobilnych - XXXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2016, Gliwice, September 2016, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2016
  9. B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - Journal of Advances in Computer Networks, Vol. 3, No. 2, June 2015, DOI: 10.7763/JACN.2015.V3.155
  10. W. Mazurczyk, K. Szczypiorski, J. Lubacz, A. Janicki, E. Rzeszutko - Ukrywanie informacji w ruchu telefonii IP - Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 2-3/2015
  11. P. Białczak, W. Mazurczyk - Multipleksacja kanału ukrytego jako sposob niejawnej transmisji grupowej - XXX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2014, Poznan, September 2014, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2014
  12. B. Lipiński, W. Mazurczyk, K. Szczypiorski - Steganografia w srodowisku chmury obliczeniowej - XXIX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2013, Gdansk, 4-6 September 2013, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2013
  13. M. Gregorczyk, W. Mazurczyk, K. Szczypiorski - Wpływ steganografii sieciowej na opóznienia w telefonii IP - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 797-808
  14. W. Frączek, W. Mazurczyk, K. Szczypiorski - Sposoby głębokiego ukrywania w sieciach - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 849-858
  15. W. Frączek, W. Mazurczyk, K. Szczypiorski - Zastosowania steganografii wielopoziomowej - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 783-788
  16. P. Białczak, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w Google Suggest - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 789-794
  17. K. Szczypiorski, W. Mazurczyk - Ukrywanie danych w symbolach OFDM w sieciach IEEE 802.11 - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wrocław, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1055-1064
  18. B. Jankowski, W. Mazurczyk, K. Szczypiorski - System steganograficzny oparty na niepoprawnym dopełnianiu ramek - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1035-1044
  19. W. Frączek, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w protokole SCTP - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1045-1054
  20. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganografia sieciowa, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 4/2010, ISSN 1230-3496, April 2010, nr 4/2010, str. 134-135
  21. M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznych (paper accepted to KSTiT 2009, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 8-9/2009 pp. 819-823, ISSN 1230-3496, September 2009 (in Polish)
  22. K. Szczypiorski, I. Margasiński, W. Mazurczyk - Steganographic Routing in Multi Agent System Environment - Journal of Information Assurance and Security (JIAS), 04/2007, Dynamic Publishers Inc., USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010
  23. W. Mazurczyk, Z. Kotulski - Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security - Journal of Information Assurance and Security (JIAS), 04/2007, Dynamic Publishers Inc., USA, Volume 2, Issue 3, September 2007, pp. 226-234, ISSN 1554-1010
  24. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Bezpieczeństwo usługi VoIP opartej na systemie Asterisk, (paper accepted to KSTiT 2007), Przegląd Telekomunikacyjny 8-9/2007 pp. 646-655, ISSN 1230-3496, September 2007 (in Polish)
  25. W. Mazurczyk, Z. Kotulski - Lightweight security mechanism for PSTN-IP Telephony convergence - IJCSNS International Journal of Computer Science and Network Security, Communication Network & Security, vol.7, No.5, ISSN 1738-7906, May 2007

Book chapters

  1. K. Cabaj, L. Caviglione, J. Keller, W. Mazurczyk, A. Schaffhauser - Teaching Cyber Security through Distance Learning with International Students, "Innovation in Cybersecurity Education", Springer Nature, Editors: Kevin Daimi and Guillermo Francia, 2020 [NEW]
  2. L. Caviglione, W. Mazurczyk, S. Wendzel - Advanced Information Hiding Techniques for Modern Botnets, in: G. Kambourakis et al. (Eds.): Botnets: Architectures, Countermeasures, and Challenges, CRC Series in Security, Privacy and Trust, Taylor & Francis, October 2019
  3. E. Rzeszutko, W. Mazurczyk - Nature-inspired analogies and metaphors for cyber security, In: Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications<, E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk (Eds.), Institution of Engineering and Technology (IET), March 2019
  4. L. Caviglione, M. Gaggero, J-F Lalande, W. Mazurczyk - Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data, M. Migliardi, A. Merlo, B. S. Al-Haj (Eds.), Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, August 2017, ISBN: 9780128046036
  5. W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology, B. Akhgar and B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism, Advanced Sciences and Technologies for Security Applications, Springer, DOI: 10.1007/978-3-319-38930-1, June 2016, pp. 17-37
  6. W. Mazurczyk, L. Caviglione - Chapter 4 - Network Steganograpy In: S. Kaztenbeisser and F. Petitcolas (Eds.): Information Hiding - Techniques for Steganography and Digital Watermarking, Artech House, Edition 2, 2015
  7. L. Caviglione, J.-F. Lalande, W. Mazurczyk, S. Wendzel - Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, USA, Lecture Notes in Computer Science (LNCS), Springer, Vol. 9190, pp. 165-177, July 2015
  8. W. Mazurczyk, K. Szczypiorski - Steganography of VoIP Streams In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1001-1018
  9. K. Szczypiorski, I. Margasiński, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1019-1035
  10. W. Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Hamid Jahankhani, Kenneth Revett, and Dominic Palmer-Brown (Eds.): ICGeS 2008 - Communications in Computer and Information Science (CCIS) 12, Springer Verlag Berlin Heidelberg, Proc. of 4th International Conference on Global E-security 2008, London, United Kingdom, 23-25 June 2008, pp. 65-72
  11. T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System, 7th International Conference on Computer Science - Research and Applications (IBIZA 2008), Poland, Kazimierz Dolny 31.01 - 2.02 2008, Published in Annales UMCS, Informatica, AI 8 (2008), pp. 186-201
  12. W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security (extended version), In: Jerzy Pejas, Khalid Saeed (Eds.) - Advances in Information Processing and Protection, Science+Business Media Inc. Springer, ISBN: 978-0-387-73136-0, August 2007
  13. W. Mazurczyk, Z. Kotulski - New VoIP traffic security scheme with digital watermarking - In Proceedings of The 25-th International Conference on Computer Safety, Reliability and Security SafeComp 2006, Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer-Verlag, Heidelberg 2006, ISBN 978-3-540-45762-6
  14. W. Mazurczyk, Z. Kotulski - New security and control protocol for VoIP based on steganography and digital watermarking - 5th International Conference on Computer Science - Research and Applications (IBIZA 2006), Poland, Kazimierz Dolny 9-11 February 2006, Published in Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360

Conference papers

  1. K. Kamieniarz, W. Mazurczyk - A Comparative Study on the Security of Kubernetes Deployments, In Proc. of 20th International Wireless Communications & Mobile Computing Conference (IWCMC 2024), Ayia Napa, Cyprus, 27-31 May 2024 [NEW]
  2. L. Pietraszek, W. Mazurczyk - A Research Environment for Evaluating File-based Cryptojacking Detection Techniques, In Proc. of 20th International Wireless Communications & Mobile Computing Conference (IWCMC 2024), Ayia Napa, Cyprus, 27-31 May 2024 [NEW]
  3. T. Koohpayeh Araghi, D. Megias, V. Garcia-Font, M. Kuribayashi, W. Mazurczyk - Disinformation detection and source tracking using semi-fragile watermarking and blockchain, In Proc. of In Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2024), Xanthi, Greece, 5-6 June 2024 [NEW]
  4. P. Bialczak, W. Mazurczyk - Malware classification using Open Set Recognition and HTTP protocol requests, In Proc. of 28th European Symposium on Research in Computer Security (ESORICS 2023), Lecture Notes in Computer Science, vol. 14345, Springer, DOI: 10.1007/978-3-031-51476-0_12, The Hague, The Netherlands, 25-29 September 2023 [NEW]
  5. R. Kozik, W. Mazurczyk, K. Cabaj, A. Pawlicka, M. Pawlicki, M. Choras - Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models, In Proc. of 10th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2023), Thessaloniki, Greece, 9-13 October 2023, DOI: 10.1109/DSAA60987.2023.10302543 [NEW]
  6. N. Orzechowski, K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk, N. Leligou, M. Przybyszewski, R. Kozik, M. Choras - Security Architecture in the SILVANUS project, In Proc. of Emerging Network Security (ENS) Workshop, Proc. of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August - 1 September 2023 [NEW]
  7. P. Rajba, J. Keller, W. Mazurczyk - Proof-of-work based new encoding scheme for information hiding purposes, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August - 1 September 2023 [NEW]
  8. K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk - Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  9. P. Rajba, W. Mazurczyk - Limitations of Web Cryptojacking Detection: A Practical Evaluation, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  10. L. Caviglione, M. Grabowski, K. Gutberlet, A. Marzecki, M. Zuppelli, A. Schaffhauser, W. Mazurczyk - Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  11. M. Kowalczyk, A. Malanowska, W. Mazurczyk, K. Cabaj - Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  12. M. T. Ahvanooey, M. X. Zhu, W. Mazurczyk, M. Kilger, K-K. R. Choo - Do Dark Web and Cryptocurrencies Empower Cybercriminals?, In: Gladyshev, P., Goel, S., James, J., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 441. Springer, Cham. https://doi.org/10.1007/978-3-031-06365-7_17, December 7-9, 2021, Singapore
  13. J. Hospital, D. Megias, W. Mazurczyk - Retransmission steganography in real-world scenarios: a practical study, In Proc. of European Interdisciplinary Cybersecurity Conference (EICC), Virtual, November 2021, pp. 60-65, DOI: 10.1145/3487405.3487659
  14. M. Chourib, S. Wendzel, W. Mazurczyk - Adaptive Warden Strategy for Countering Network Covert Storage Channels, In Proc. of 46nd IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021
  15. S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann, C. Kraetzer, K. Lamshoeft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert - A Revised Taxonomy of Steganography Embedding Patterns - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  16. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  17. P. Rajba, W. Mazurczyk - Data Hiding Using Code Obfuscation - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  18. D. Megias, M. Kuribayashi, A. Rosales, W. Mazurczyk - DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  19. M. Gregorczyk, W. Mazurczyk - Inferring Flow Table State through Active Fingerprinting in SDN Environments, 18th International Conference on Security and Cryptography (SECRYPT 2021), July 2021
  20. L. Caviglione, M. Zuppelli, W. Mazurczyk, A. Schaffhauser, M. Repetto - Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label - In Proc. of the 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), June 2021
  21. C. Heinz, W. Mazurczyk, L. Caviglione - Covert Channels in Transport Layer Security - In Proc. of European Interdisciplinary Cybersecurity Conference (EICC 2020), Rennes, France, November 2020
  22. P. Rajba, W.Mazurczyk - Exploiting Minification for Data Hiding Purposes - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  23. P. Nowakowski, P. Zorawski, K. Cabaj, M. Gregorczyk, M. Purski, W. Mazurczyk - Distributed Packet Inspection for Network Security Purposes in Software-Defined Networking Environments - In Proc. of 5G Networks security (5G-NS) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  24. P. Szary, W. Mazurczyk, S. Wendzel, L. Caviglione - Design and Performance Evaluation of Reversible Network Covert Channels - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  25. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Network Covert Channels Detection using Data Mining and Hierarchical Organisation of Frequent Sets: an Initial Study - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  26. J. Cosmas, M. Gregorczyk, W. Mazurczyk, K. Cabaj, et al. - Network and Application Layer Services for High Performance Communications in Buildings, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB 2020), Paris, France, June 2-5 2020
  27. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Securing Modern Network Architectures with Software Defined Networking, In Proc. of 2019 International Conference on Computational Science and Computational Intelligence, December 05-07, 2019, Las Vegas, USA
  28. W. Mazurczyk, K. Powojski, L. Caviglione - IPv6 Covert Channels in the Wild - In Proc. of Central European Cybersecurity Conference (CECC 2019), Munich, Germany, November 2019
  29. W. Mazurczyk, P. Szary, S. Wendzel, L. Caviglione - Towards Reversible Storage Network Covert Channels - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
  30. K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches, - In Proc. of 5G Network Security (5G-NS 2019) workshop, ARES 2019 Proceedings of the 14th International Conference on Availability, Reliability and Security, August 2019
  31. K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
  32. T. Schmidbauer, S. Wendzel, A. Mileva, W. Mazurczyk - Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
  33. M. Skwarek, M. Korczynski, W. Mazurczyk, A. Duda - Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning - In Proc. of 4th Workshop on Traffic Measurements in Cybersecurity (WTMC 2019) co-located with 40th IEEE Security & Privacy 2019 (IEEE S&P) conference, May 2019, San Diego, USA
  34. U. Rauf, M. Mohsin, W. Mazurczyk - Cyber Regulatory Networks: Towards A Bio-inspired Auto-resilient Framework for Cyber-Defense - In Proc. of 11th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT 2019), March 13-14, 2019, Pittsburgh, United States
  35. J-F Lalande, V. Viet Triem Tong, P. Graux, G. Hiet, W. Mazurczyk, H. Chaoui, P. Berthome - Teaching Android Mobile Security - In Proc. of 50th ACM Technical Symposium on Computer Science Education, February 27 - March 2, 2019, Minneapolis, USA
  36. S. Wendzel, D. Eller, W. Mazurczyk - One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels - In Proc. of Central European Cybersecurity Conference (CECC 2018), Ljubljana, Slovenia, 15-16 November 2018
  37. K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System - In Proc. of 5G Network Security (5G-NS 2018) workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  38. A. Tundis, W. Mazurczyk, M. Muehlhaeuser - A Review of Network Vulnerabilities Scanning Tools: Types, Capabilities and Functioning - In Proc. of International Workshop on Organized Cybercrime, Cybersecurity and Terrorist Networks (IWOCCTN 2018), ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  39. K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  40. D. Geisler, W. Mazurczyk, J. Keller - Towards Utilization of Covert Channels as a Green Networking Technique - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2018 conference
  41. W. Mazurczyk, S. Wendzel, K. Cabaj - Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  42. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - A 5G Radio-Light SDN Architecture for Wireless and Mobile Network Access in Buildings - In Proc. of IEEE 5G World Forum, Santa Clara, California, USA, 9-11 July
  43. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - A Scaleable and License Free 5G Internet of Radio Light Architecture for Services in Train Stations - In Proc. of 24th European Wireless (EW 2018), Catania, Italy, 2-4 May 2018
  44. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - 5G Internet of Radio Light Services for Musee de la Carte a Jouer - In Proc. of 1st Global LiFi Congress, Paris, France, 8-9 February, 2018
  45. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - 5G Internet of Radio Light Services for Supermarkets, 14th China International Forum on Solid State Lighting: International Forum on Wide Bandgap Semiconductors China (SSLChina: IFWS), Beijing, China, 2017, pp. 69-73, DOI: 10.1109/IFWS.2017.8245977
  46. F. Lehner, W. Mazurczyk, J. Keller, S. Wendzel - Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach - In Proc. of 42nd IEEE Conference on Local Computer Networks (LCN), October 9-12, 2017, Singapore, pp. 78-85
  47. S. Schmidt, W. Mazurczyk, J. Keller, L. Caviglione - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2017 conference
  48. A. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Information Hiding in RGB Images Using an Improved Matrix Pattern Approach - In Proc. of the Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2017), Honolulu, Hawaii, July 21, 2017
  49. S. Wendzel, W. Mazurczyk, G. Haas - Don't You Touch My Nuts: Information Hiding In Cyber-Physical Systems Using Smart Buildings - In Proc. of the Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2017) co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, USA, May 25, 2017
  50. S. Wendzel, W. Mazurczyk - An Educational Network Protocol for Covert Channel Analysis Using Patterns - In Proc. of ACM Conference on Computer and Communications Security (ACM CCS 2016), October 24-28, 2016, Vienna, Austria, pp. 1739-1741
  51. B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - In Proc. of 5th International Conference on Networking and Information Technology (ICNIT 2014), November 21-23, 2014, Singapore
  52. S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier - Hidden and Uncontrolled On the Emergence of Network Steganography - In Proc. of ISSE 2014 Securing Electronic Business Processes, pp. 123-133, Springer Vieweg, 2014
  53. B. Lipinski, W. Mazurczyk, K. Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment - In Proc. of 3rd International Workshop on Cyber Crime (IWCC 2014) co-located with the 35th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Jose, USA, May 18
  54. M. Seredynski, R. Aggoune, W. Mazurczyk, K. Szczypiorski, D. Khadraoui - Vehicular Ad Hoc Networks for Join Traffic and Mobility Management - International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2013), Almaty, Kazakhstan, September 10-13, 2013
  55. P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In Proc. of 2nd International Workshop on Cyber Crime (IWCC 2013) co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Francisco, USA, May 24, 2013, pp. 151-157
  56. M. Seredynski, W. Mazurczyk, D. Khadraoui - Multi-Segment Green Light Optimal Speed Advisory - In Proc. of 16th International Workshop on Nature Inspired Distributed Computing (NIDISC 2013), May 20-24, 2013, Boston, Massachusetts USA
  57. W. Mazurczyk, K. Szczypiorski, B. Jankowski - Towards Steganography Detection Through Network Traffic Visualisation - In Proc. of First International Workshop on Cyber Crime (IWCC 2012) co-located with International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012), October 3-5, 2012, St. Petersburg, Russia
  58. W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof?, In Proc. of: The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
  59. W. Frączek, W. Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In Proc. of: First International Workshop on Digital Forensics (IWDF 2011) co-located with The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
  60. P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 121-131, Prague, Czech Republic, 26-28.05.2011
  61. W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography Applied to Networks - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 90-96, Prague, Czech Republic, 26-28.05.2011
  62. B. Jankowski, W. Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding - 14th International Telecommunications Network Strategy and Planning Symposium (Networks 2010), 27-30.09.2010, Warsaw, Poland
  63. W. Frączek, W. Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  64. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  65. K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  66. W. Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In Proc. of: First International Workshop on Network Steganography (IWNS'09), Wuhan, Hubei, China, 18-20 November, 2009 - co-located with 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009), Vol. I, pp. 569-572
  67. T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, 2nd Euro-NF Workshop - Future Internet Architectures: New Trends in Service Architectures Future 2009, 10-12 June 2009, Santander, Spain
  68. W. Mazurczyk, J. Lubacz, K. Szczypiorski - Steganography for Real-time Services in IP Networks, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  69. K. Szczypiorski, J. Lubacz, W. Mazurczyk - Hiding Data in Wireless LANs, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  70. K. Szczypiorski, W. Mazurczyk, K. Cabaj, P. Radziszewski - Towards the Steganographic Routing, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  71. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Hiding Data in VoIP In Proc of: The 26th Army Science Conference (ASC 2008), Orlando, Florida, USA, December 1-4, 2008
  72. W. Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls, In Proc. of the PGTS '08 - the Fifth Polish-German Teletraffic Symposium (A. Feldmann, P. Kuhn, M. Pioro, A. Wolisz [Eds.]), Berlin, Germany, ISBN 978-3-8325-2047-2, Logos Verlag Berlin, pp. 119-128, October 6-8, 2008
  73. Ch.Eliasson, M.Fiedler, T.Ciszkowski, Z.Kotulski, W.Mazurczyk - Parameterisation of a reputation system for VoIP in P2P networks for improved communication quality and security, EuroFGI, IA.7.6 Workshop on Socio-Economic Aspects of Future Generation Internet, Karlskrona, Sweden, 27-29 May, 2008
  74. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo bezprzewodowych sieci WiMAX - Materiały: XI Krajowa Konferencja Zastosowań Kryptografii Enigma 2007, 23-25 maja 2007, Warszawa
  75. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Zarzadzanie kluczami w sieciach WiMAX - Materiały: XI Krajowa Konferencja Zastosowań Kryptografii Enigma 2007, 23-25 maja 2007, Warszawa
  76. W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security In Proceedings of The 13th International Multi-Conference on Advanced Computer Systems ACS 2006, Vol. 1, pp. 361-370, Międzyzdroje 18-20 October 2006, ISBN 83-87362-75-1
  77. W. Mazurczyk - Aspekty bezpieczeństwa sieci P2P na przykładzie Skype - In Proceedings of XXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2006, Bydgoszcz, 13-15 September 2006
  78. W. Mazurczyk - Możliwości wykorzystania watermarkingu do zabezpieczenia telefonii IP - IX Krajowa Konferencja Zastosowań Kryptografii Enigma 2005, Warszawa, maj/czerwiec 2005
  79. W. Mazurczyk - Bezpieczeństwo protokołów sygnalizacyjnych VoIP: koncepcja bezpiecznej współpracy protokołów SIP i H.323 - VIII Krajowa Konferencja Zastosowań Kryptografii Enigma 2004, Warszawa, maj 2004
  80. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - XIX Krajowe Sympozjum Telekomunikacji KST 2003, Bydgoszcz, wrzesień 2003
  81. W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj 2003

Other articles

  1. T. Hoßfeld, D. Collange, M. Fiedler, T. Ciszkowski, Z. Kotulski, W. Mazurczyk - QoEWeb: Quality of Experience and User Behaviour Modelling for Web Traffic, 1st Euro-NF Socio-Economics Workshop, Greece, October 16-17 2008
  2. W. Mazurczyk, K. Szczypiorski - Steganography Harnesses VoIP Networks published in: SC Magazine, Haymarket Media, UK, July 2008
  3. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Luki w VoIP - miesięcznik Hakin9, pazdziernik 2007
  4. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Mechanizmy zabezpieczeń w sieciach WiMAX - dwumiesięcznik Zabezpieczenia, ISSN: 1505-2419, 4/2007
  5. W. Mazurczyk - Rozmowa kontrolowana - miesięcznik CHIP, kwiecień 2006
  6. W. Mazurczyk - Bezpieczeństwo VoIP fakt czy mit? - dwumiesięcznik Zabezpieczenia, 2003
  7. W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo VoIP opartego na SIP - IV Sympozjum AFCEA - Bezpieczeństwo systemów informacyjnych BSI 2003, Warszawa, maj 2003

Patent Applications

  1. Wojciech Mazurczyk, Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesyłania danych w sieci telekomunikacyjnej dla usług multimedialnych - Zgłoszenie wynalazku nr P-396615. Politechnika Warszawska. Data zgłoszenia: 12 pazdziernik 2011
  2. Wojciech Mazurczyk i Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesylania danych sieci telekomunikacyjnych - Zgloszenie wynalazku nr P-384940 na rzecz Politechniki Warszawskiej. Data zgloszenia: 15 kwietnia 2008

E-prints

  1. B. Lipinski, W. Mazurczyk, K. Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment - In: Computing Research Repository (CoRR), abs/1402.0239, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 February 2014
  2. P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In: Computing Research Repository (CoRR), abs/1303.4264, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 18 March 2013
  3. W. Mazurczyk, M. Kara , K. Szczypiorski - SkyDe: a Skype-based Steganographic Method - In: Computing Research Repository (CoRR), abs/1301.3632, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 16 January 2013
  4. A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - In: Computing Research Repository (CoRR), abs/1210.5888, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 22 October 2012
  5. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography - In: Computing Research Repository (CoRR), abs/1207.0917, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 July 2012
  6. W. Mazurczyk - VoIP Steganography and Its Detection - A Survey - In: Computing Research Repository (CoRR), abs/1203.4374, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 March 2012
  7. E. Zielinska, W. Mazurczyk, K. Szczypiorski - The Advent of Steganography in Computing Environments - In: Computing Research Repository (CoRR), abs/1202.5289, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 23 February 2012
  8. A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography - In: Computing Research Repository (CoRR), abs/1201.6218, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 30 January 2012
  9. W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony - In: Computing Research Repository (CoRR), abs/1111.1250, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 4 November 2011
  10. W. Mazurczyk, P. Kopiczko - What more can be learnt about BitTorrent from meta-data files and uTorrent logs? - In: Computing Research Repository (CoRR), abs/1110.6265, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 28 October 2011
  11. W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof? - In: Computing Research Repository (CoRR), abs/1107.4077, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  12. W. Mazurczyk - Lost Audio Packets Steganography: The First Practical Evaluation - In: Computing Research Repository (CoRR), abs/1107.4076, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  13. W. Frączek, W.Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In: Computing Research Repository (CoRR), abs/1107.4065, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  14. P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In: Computing Research Repository (CoRR), abs/1107.4062, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  15. W. Frączek, W.Mazurczyk, K. Szczypiorski - Hiding Information in a Stream Control Transmission Protocol - In: Computing Research Repository (CoRR), abs/1104.3333, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 17 April 2011
  16. B. Jankowski, W.Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Computing Research Repository (CoRR), abs/1104.0422, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 3 April 2011
  17. W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets In: Computing Research Repository (CoRR), abs/1102.0023, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 31 January 2011
  18. W. Frączek, W.Mazurczyk, K. Szczypiorski - Multi-Level Steganography: Improving Hidden Communication in Networks - In: Computing Research Repository (CoRR), abs/1101.4789, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 25 January 2011
  19. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied In: Computing Research Repository (CoRR), abs/1007.0767, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 July 2010
  20. K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks In: Computing Research Repository (CoRR), abs/1006.0495, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 June 2010
  21. W. Frączek, W.Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In: Computing Research Repository (CoRR), abs/1006.0247, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 1 June 2010
  22. B. Jankowski, W.Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding - In: Computing Research Repository (CoRR), abs/1005.1925, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 12 May 2010
  23. W.Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays? - In: Computing Research Repository (CoRR), abs/1002.4303, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 24 February 2010
  24. W.Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In: Computing Research Repository (CoRR), abs/0907.0313, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 July 2009
  25. W.Mazurczyk, M. Smolarczyk, K. Szczypiorski - Hiding Information in Retransmissions - In: Computing Research Repository (CoRR), abs/0905.0363, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 May 2009
  26. W.Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method - In: Computing Research Repository (CoRR), abs/0811.4138, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 26 November 2008
  27. K. Szczypiorski, I. Margasinski, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: Computing Research Repository (CoRR), abs/0808.4060, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 1 September 2008>
  28. W.Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls - In: Computing Research Repository (CoRR), abs/0806.1034, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 7 June 2008
  29. K. Szczypiorski, I. Margasinski, W.Mazurczyk - Steganographic Routing in Multi Agent System Environment - In: Computing Research Repository (CoRR), abs/0806.0576, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 4 June 2008
  30. W.Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Computing Research Repository (CoRR), abs/0805.3538, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 26 May 2008
  31. W.Mazurczyk, K. Szczypiorski - Steganography of VoIP streams - In: Computing Research Repository (CoRR), abs/0805.2938, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 21 May 2008
  32. T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System - arXiv.org e-Print archive, April 2008
  33. W. Mazurczyk, Z. Kotulski - Lightweight security mechanism for PSTN-VoIP cooperation - arXiv.org e-Print archive, December 2006
  34. W. Mazurczyk, Z. Kotulski - New security and control protocol for VoIP based on steganography and digital watermarking - arXiv.org e-Print archive, February 2006
  35. W. Mazurczyk, Z. Kotulski - Alternative security architecture for IP Telephony based on digital watermarking - arXiv.org e-Print archive, June 2005

Reports

  1. W. Mazurczyk - Deliverable No: D.WP.JRA.6.3.7 - Security considerations for Next Generation Internet - EuroNGI NoE, participation at the authors team, November 2006
  2. W. Mazurczyk - Deliverable No: D.WP.JRA.6.3.5 - Protection of stored data by system level encryption schemes - EuroNGI NoE, participation at the authors team, May 2005

Conference presentations and invited talks

  1. W. Mazurczyk - Trends in stegomalware - utilization of data hiding techniques by malicious software, Samsung R&D Institute Poland, 11 December 2022, Warsaw, Poland
  2. W. Mazurczyk - Sposoby detekcji fake news w tresciach multimedialnych w projekcie DISSIMILAR - podejscie interdyscyplinarne, Seminarium Wybrane zastosowania inteligencji obliczeniowej, Komisja Informatyki i Automatyki PAN, 25 November, 2022, online
  3. W. Mazurczyk - Recent advances in stegomalware: development trends and detection opportunities, 21st International Workshop on Digital-forensics and Watermarking (IWDW 2022), 19-21 November 2022, Guilin, P.R. China (keynote)
  4. W. Mazurczyk - Adversarial Cyber Reconnaissance Techniques: Evolution, Countermeasures, and Challenges, NATO IST-190 Research Symposium (RSY) on Artificial Intelligence, Machine Learning and Big Data for Hybrid Military Operations (AI4HMO), 5-6 October, 2021, Koblenz, Germany (keynote)
  5. W. Mazurczyk - Trends in Stegomalware: Techniques and Countermeasures, 3rd International Conference on Frontiers in Cyber Security (FCS 2020), December 18 2020, Tinjan, China (keynote)
  6. W. Mazurczyk - Secure Intelligent Methods for Advanced Recognition of Malware and Stegomalware, IEEE Conference on Network Softwarization (IEEE NetSoft), July 2020 (virtual conference)
  7. W. Mazurczyk - Trends in Network Covert Channels: Design and Mitigation, Cyber Security Seminar, University of Kent, Canterbury, UK, January 2020
  8. P. Georgi, J. Keller, W. Mazurczyk - IVLIS - International Virtual Laboratory for Information Security, Erasmus+ Staff Week 2018, June 2018, Hagen, Germany
  9. W. Mazurczyk - Challenges of network steganography detection, TAKEDOWN workshop co-located with ARES 2017, August 29 2017, Reggio Calabria, Italy (invited talk)
  10. W. Mazurczyk - Criminal Use of Information Hiding (CUIng) initiative: past, present and future, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (keynote)
  11. W. Mazurczyk - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (paper presentation)
  12. W. Mazurczyk - Criminal Use of Information Hiding Initiative: the First Year, 3rd EC3 Academic Advisory Network Meeting (EC3 AAN), 20 April 2017, The Hague, Netherlands
  13. W. Mazurczyk - Sposoby wspolpracy jednostek badawczych z firmami, PLNOG 2017, 6-7 March 2016, Warsaw, Poland
  14. W. Mazurczyk, K. Cabaj - Information hiding techniques and how modern malware uses them / Techniki ukrywania informacji i sposoby ich wykorzystania przez zlosliwe oprogramowanie, Secure 2016, 25-26 October 2016, Warsaw, Poland
  15. K. Cabaj, W. Mazurczyk - Ransomware infrastructure identification using dynamic analysis based on CryptoWall and Locky families examples / Identyfikacja infrastruktury ransomware z wykorzystaniem analizy dynamicznej na przykladzie rodzin CryptoWall i Locky, Secure 2016, 25-26 October 2016, Warsaw, Poland
  16. W. Mazurczyk - On-going Cybersecurity Research Projects, 2nd EC3 Academic Advisory Network Meeting (EC3 AAN), 6-7 April 2016, The Hague, Netherlands
  17. W. Mazurczyk - Inspirations for innovative cybersecurity technologies, The COURAGE - CAMINO - CyberROAD joint conference on "Emerging and Current Challenges in Cybercrime and Cyberterrorism", 10-11 March 2016, The Hague, Netherlands
  18. K. Cabaj, W. Mazurczyk - Dynamic analysis of CryptoWall network activity, Europol EC3 meeting, 9 March 2016, The Hague, Netherlands
  19. W. Mazurczyk - Influence of modern information hiding techniques on digital forensics, "Secure Europe without borders" conference organized by Lodz Regional Police Headquarters, Poland, February 2016 (invited talk)
  20. W. Mazurczyk - Innovative cyber security methods for NGI (Next Generation Infrastructures), CIPRNet training lecture, May 2015, University of Technology and Life Sciences, Bydgoszcz, Poland
  21. K. Szczypiorski, W. Mazurczyk, E. Rzeszutko - Hiding information in Skype, Materiały: The 5th Annual WUT-KNU Joint Workshop on ICT Programme, 13-14 November 2014, Warsaw, Poland
  22. W. Mazurczyk, K. Szczypiorski, E. Zielińska - Studia realistycznych przypadków steganografii sieciowej, Materiały: Secure 2012, XVI Konferencja na temat bezpieczeństwa teleinformatycznego, 22-24 November 2012, Warsaw, Poland
  23. W. Mazurczyk, K. Szczypiorski - O ukrywaniu informacji w sieciach - XXVII Jesienne Spotkania PTI, Jachranka, 17-20 pazdziernika 2011
  24. W. Mazurczyk - Nowe sposoby ukrywania informacji w sieciach telekomunikacyjnych - Jesienne Warsztaty CSZ, Madralin, 14-16 pazdziernik 2011
  25. W. Mazurczyk, K. Szczypiorski - Information Hiding in Communication Protocols: Network Steganography - 1st Luxembourg-Polish Workshop on Security & Trust (LPWST 2010), May 6-7, 2010, Castle of Bourglinster, Luxembourg
  26. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Ukrywanie informacji w retransmisjach, Materiały: Secure 2009, XIII Konferencja na temat bezpieczeństwa teleinformatycznego, 20-21 October 2009, Warszawa
  27. W. Mazurczyk, K. Cabaj, K. Szczypiorski - Presentation of selected steganographic tools, Seminar: Information hiding in data communication networks organized by TP S.A., Warsaw, 16 October 2009
  28. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganographic methods to secretly transmit data in communication networks, Seminar: Information hiding in data communication networks organized by TP S.A., Warsaw, 16 October 2009
  29. M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznej, XXV Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2009, Warszawa, 16-18 September 2009
  30. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Fundamentals of Networks Steganography - A seminar presentation. FEIT Skopje (Macedonia), 26 June 2009
  31. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganologia sieciowa - czyli o wyrafinowanych sposobach ukrytego przekazywania informacji - A seminar presentation. Polish Information Processing Society, 12 May 2009
  32. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Metody steganografii sieciowej - A seminar presentation. Research and Academic Computer Network, Warsaw, 18 March 2009
  33. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganofonia: ukrywanie informacji w telefonii internetowej - Materiały: Secure 2008, XII Konferencja na temat bezpieczeństwa teleinformatycznego, 2-3 pazdziernika 2008, Warszawa
  34. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Nowe metody steganografii w sieciach - Posiedzenie Sekcji Telekomunikacji Polskiej Akademii Nauki (PAN) podczas XXIII Krajowego Sympozjum Telekomunikacji i Teleinformatyki 2008, 11 wrzesnia 2008, Bydgoszcz
  35. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Bezpieczeństwo usługi VoIP opartej na systemie Asterisk, XXIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2007, Bydgoszcz, 12-14 September 2007
  36. W. Mazurczyk - Covert channel for improving VoIP security The 13th International Multi-Conference on Advanced Computer Systems - ACS 2006, 18-20 October 2006, Miedzyzdroje
  37. W. Mazurczyk - New VoIP traffic security scheme with digital watermarking The 25-th International Conference on Computer Safety, Reliability and Security - SafeComp 2006, 26-29 September 2006, Gdansk
  38. W. Mazurczyk - Bezpieczeństwo VoIP - Materiały: V Konferencja Infrastruktura Telekomunikacyjna dla Biznesu: VoIP - telefonia internetowa: Modele biznesowe i taryfy, 26 stycznia 2006, Warszawa
  39. W. Mazurczyk - Możliwości wykorzystania watermarkingu do zabezpieczenia telefonii IP - IX Krajowa Konferencja Zastosowań Kryptografii Enigma 2005, Warszawa, maj/czerwiec 2005
  40. W. Mazurczyk - Bezpieczeństwo VoIP - Materiały: III Krajowa Konferencja Bezpieczeństwa Biznesu, 22-23 listopada 2004, Warszawa
  41. W. Mazurczyk - Bezpieczeństwo protokołów sygnalizacyjnych VoIP: koncepcja bezpiecznej współpracy protokołów SIP i H.323 - VIII Krajowa Konferencja Zastosowań Kryptografii Enigma 2004, Warszawa, maj 2004
  42. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - XIX Krajowe Sympozjum Telekomunikacji KST 2003, Bydgoszcz, wrzesień 2003
  43. W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo VoIP bazujacego na SIP - IV Sympozjum AFCEA - Bezpieczeństwo systemów informacyjnych "BSI 2003", Warszawa, maj 2003
  44. W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj 2003

Theses

  1. W. Mazurczyk - Information hiding in IP telephony traffic / Ukrywanie informacji w ruchu telefonii IP - rozprawa habilitacyjna / habilitation thesis, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2014
  2. W. Mazurczyk - Steganografia w telefonii IP / Steganography in IP telephony - rozprawa doktorska / PhD thesis pod kierunkiem prof. Jozefa Lubacza, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Listopad 2009
  3. W. Mazurczyk - Bezpieczeństwo i współpraca protokołów sygnalizacyjnych VoIP - praca dyplomowa magisterska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Czerwiec 2004
  4. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - praca dyplomowa inżynierska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2003

Awards and scholarships

  1. W. Mazurczyk, - Polish Prime Minister's Award for Scientific Achievements (12.2023), Warsaw, Poland
  2. W. Mazurczyk, K. Cabaj, M. Gregorczyk, P. Nowakowski, P. Zorawski - First degree Rector's Award for Scientific Achievements for Research Team in 2020/2021 (10.2022), Warsaw University of Technology, Poland
  3. W. Mazurczyk - Second-degree Individual Rector's Award for Scientific Achievements 2018/2019 (10.2020), Warsaw University of Technology, Poland
  4. Researcher Travel Scholarship in the Bekker Programme (06-09.2018), Polish National Agency for Academic Exchange (Narodowa Agencja Wymiany Akademickiej, NAWA), November 2018, Poland
  5. W. Mazurczyk - First-degree Individual Rector's Award for Scientific Achievements 2016/2017 (10.2018), Warsaw University of Technology, Poland
  6. W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2012/2013 (10.2014), Warsaw University of Technology, Poland
  7. W. Mazurczyk - Researcher Travel Scholarship (06-07.2014), Center for Advanced Studies Warsaw University of Technology, December 2013, Poland
  8. W. Mazurczyk - Polish Minister Of Science and Higher Education Scholarship for Outstanding Young Researchers (2013-2015), November 2012, Warsaw, Poland
  9. W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2009/2010 (10.2011), Warsaw University of Technology, Poland
  10. W. Mazurczyk - Polish Prime Minister's Award for PhD Thesis, November 2010, Warsaw, Poland
  11. W. Mazurczyk - Young Researcher Scholarship (2011-2012), Center for Advanced Studies Warsaw University of Technology, December 2010, Poland
  12. W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2007/2008 (10.2009), Warsaw University of Technology, Poland
  13. W. Mazurczyk - ACM SIGCOMM Student Travel Grant (08.2009) - funded by supporting organizations of ACM SIGCOMM 2009, Barcelona, Spain
  14. W. Mazurczyk - Mazovia PhD Scholarship (2008-2009) - funded by Mazovia Voivodeship, Polish Goverment

Grants and projects

  1. J. Keller (kier.) - Stego-Malware Communication Fingerprinting (StegoMaCoFi) (2023-2024) - a project funded by the German Ministry of Education and Research (BMBF) (role: Senior Researcher) [NEW]
  2. J. Keller (kier.) - Intelligent Monitoring and Countermeasures of Stego Malware and Ransomware (IMACOSAR) (2021-2022) - a project funded by the German Ministry of Education and Research (BMBF) (role: Senior Researcher)
  3. W. Mazurczyk (kier.) - Integrated Technological and Information Platform for wildfire Management (SILVANUS) (2021-2025) - funded by EU (role: Principal Investigator at WUT)
  4. W. Mazurczyk (kier.) - DISSIMILAR: Detection of fake newS on SocIal MedIa pLAtfoRms (2021-2024) - funded by National Centre for Research and Development under the EIG CONCERT-Japan Programme framework (role: Principal Investigator at WUT)
  5. M. Choras (kier.) - Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware (SIMARGL) (2019-2022) - funded by EU (role: Senior Researcher)
  6. W. Mazurczyk (kier.) - IoRL (Internet of Radio Light) (2017-2020) - H2020 project funded by EU (role: Principal Investigator)
  7. K. Cabaj (kier.) - CoCoDe: Covert Communication Detection (2017-2020) - R&D project funded by US Air Force Office of Scientific Research, contract No. FA9550-17-1-0254 (role: co-PI at WUT)
  8. J. Battala (kier.) - 5G@PL: Deployment of 5G network in Polish market (2018-2020) - funded by National Centre for Research and Development under the Gospostrateg Programme framework, Contract no. 1/383021/19/NCBR/2018 (role: Senior Researcher)
  9. J. Keller (kier.) - Detection and countermeasures against information hiding-based malware (DeCoIMa) (2017-2019) - a project funded by German Ministry of Education and Research (BMBF) (role: Senior Researcher)
  10. J. Keller (kier.) - International Virtual Lab on Information Security (IVLIS) (2017-2018) - a project funded by FernUniversitaet within Foerderprogamm Innovative Lehre (FILeh) (role: Senior researcher)
  11. S. Wendzel (kier.), W. Mazurczyk - E2S2E: Energy Efficient and Secure Smart Environment (2016-2018) - a project funded by German Ministry of Education and Research (BMBF) (role: PI at WUT)
  12. F. Solano (kier.), W. Mazurczyk - microMole: Sewage Monitoring System for Tracking Synthetic Drug Laboratories (2015-2018) - H2020 project funded by EU (role: Senior researcher)
  13. K. Szczypiorski (kier.), W. Mazurczyk - MobiTraff: Cooperative Way to Mobility and Traffic Efficiency (2013-2015) - funded by National Centre for Research (Poland) and Development and Fonds National de la Recherche (Luxembourg) - POLLUX programm (role: Senior researcher)
  14. W. Mazurczyk, K. Szczypiorski - New Network Anomaly Detection Method (12.2011-12.2014) - funded by National Science Centre (role: PI)
  15. W. Mazurczyk, K. Szczypiorski - Steganographic Methods for IP Networks (01.2012-01.2014) - funded by Polish Ministry of Science and Higher Education (role: PI)
  16. W. Mazurczyk - Methods for Information Hiding in Network Traffic: Analysis and Detection (2012) - funded by Warsaw University of Technology (role: PI)
  17. W. Mazurczyk, K. Szczypiorski - Methods for Network Steganography Detection in IP Networks (12.2010-12.2011) - funded by Polish Ministry of Science and Higher Education (role: PI)
  18. W. Mazurczyk - New Methods for Information Hiding in Telecommunication Network (2011) - funded by Warsaw University of Technology (role: PI)
  19. J. Lubacz (kier.), K. Szczypiorski, W. Mazurczyk - Methods and Evaluation Environment of Network Steganography (2009-2011) - funded by Polish Ministry of Science and Higher Education (role: researcher)
  20. K. Szczypiorski (kier.), W. Mazurczyk - Prosense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers: Towards Pervasive Networking of WBC and the EU (2008-2010) funded by EU - FP7 (role: Researcher)
  21. K. Szczypiorski (kier.), M. Pioro, W. Mazurczyk - Detecting Frauds in 2G/3G Networks (2008-2009) - funded by Polska Telefonia Cyfrowa - PTC
  22. Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Quality of Experience and User Behaviour Modelling for Web Traffic (QoEWeb) - FP7 - EuroNF, Network of Excellence (2008-2009)
  23. J. Lubacz (kier.), W. Mazurczyk - Steganografia w telefonii IP - Supervisor (research) grant funded by Polish Goverment (2008-2009)
  24. Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Design and Evaluation of End-to-End Quality and Security (SecMon) - FP6 - EuroFGI - Design and Engineering of the Next Generation Internet, Network of Excellence (2007-2008)
  25. K. Szczypiorski(kier.), I. Margasiński, W. Mazurczyk - Trusted Communication Platform for Multi-Agent Systems (TrustMAS), (01.2007-12.2007) - Contract No. N62558-07-P-0042 funded by European Research Office of US Army (also supported by European Office of Aerospace Research and Development of US Air Force)
  26. K. Szczypiorski (kier.), W. Mazurczyk, K. Cabaj, S. Strzelak - Ochrona danych w sieciach WiMAX - Warszawa, listopad 2006, Instytut Telekomunikacji PW na zlecenie Instytutu Łacznosci w ramach Programu Wieloletniego - "Rozwój Telekomunikacji i Poczty w Dobie Społeczeństwa Informacyjnego", pazdziernik 2006
  27. W. Mazurczyk - Nowoczesne systemy komunikacji głosowej: VoIP, opracowanie na zlecenie NextiraOne, sierpień 2006
  28. Advanced network steganographic systems - stegano.net
  29. Bio-Inspired Cybersecurity Project -

WM