A. Abd El-Latif, M. Adel Hammad, Y. Maleh, B. Gupta, W. Mazurczyk (Eds.) - Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications, IET, DOI: 10.1049/PBSE020E, 2023 [ORDER]
D. Megias, W. Mazurczyk, M. Kuribayashi (Eds.) - Data Hiding and Its Applications: Digital Watermarking and Steganography, MDPI, https://doi.org/10.3390/books978-3-0365-2937-0, January 2022 [ORDER]
A. Abd El-Latif, B. Abd-El-Atty, S. Venegas-Andraca, W. Mazurczyk, B. Gupta - Security and Privacy Preserving for IoT and 5G Networks, Springer International Publishing, DOI: 10.1007/978-3-030-85428-7, 2022 [ORDER]
E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk - Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications, Institution of Engineering and Technology (IET), March 2019, ISBN: 978-1-78561-638-9 [ORDER]
W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, K. Szczypiorski - Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures, IEEE Press Series on Information and Communication Networks Security, IEEE Press-Wiley, April 2016, ISBN-10: 1118861698 [ORDER]
Z. Yan, R. Molva, W. Mazurczyk, R. Kantola (Eds.) - Network and System Security, 11th International Conference on Network and System Security Proceedings (NSS 2017), Helsinki, Finland, August 21-23, 2017, DOI: 10.1007/978-3-319-64701-2
Work in progress or submitted
D. Nastaj, W. Mazurczyk - Methodology for Systematic Security Testing of LLM-based Applications(submitted)
P. Szary, W. Mazurczyk, L. Caviglione - A Survey on Cybersecurity Threats in Industrial and Information Technology Environments: Advancements and Resilience Through Network Steganographic Techniques(submitted)
P. Rajba, J. Keller, W. Mazurczyk - Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios(submitted)
A. Brodzik, W. Mazurczyk - Assessing the Threat of Neural Network Enhanced Obfuscation in Malware(submitted)
P. Rajba, J. Keller, W. Mazurczyk - Double Proof-of-Work Scheme for Key Transfer in Steganographic Communication(submitted)
A. Malanowska, A. Rosales, M. Kowalczyk, D. Blanche-Tarrago, K. Cabaj, D. Megias, M. Kuribayashi, T. Koohpayeh Araghi, W. Mazurczyk - Cultural perspectives in UX design: Investigating user understanding in a fake news detection platform(submitted)
M. T. Ahvanooey, W. Mazurczyk, D. Lee - Science, Deepfake Socio-Economic Threats, and the Role of Cyber-Wellness Education(submitted)
S. Wendzel, L. Caviglione, A. Houmansadr, W. Mazurczyk - We Belong Together: Concealment and Circumvention Research Share Common Ground(submitted)
M. T. Ahvanooey, W. Mazurczyk, L. Caviglione, K. R. Choo - Blockchain-based Authentication Schemes for IoT Environment: Cybersecurity Challenges and Opportunities(submitted)
M. T. Ahvanooey, X. Zhu, S. Ou, H. D. Mazraeh, W. Mazurczyk, K. R. Choo, C. Li - AFPr-AM: A Novel Fuzzy-AHP based Privacy Risk Assessment Model For Strategic Information Management of Social Media Platforms, Computers & Security, Vol. 130, July 2023, 103263
H. Tian, Y. Qiu, W. Mazurczyk, H. Li, Z. Qian - STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Voice-over-IP Streams, IEEE/ACM Transactions on Audio, Speech and Language Processing, 2022, DOI: 10.1109/TASLP.2022.3224295
M. T. Ahvanooey, X. Zhu, W. Mazurczyk, Q. Li, M. Kilger, K. R. Choo, M. Conti - CovertSYS: A Systematic Covert Communication Approach for Providing Perfectly Secure End-to-End Conversation via Social Networks, Journal of Information Security and Applications, Vol. 71, 2022, DOI: https://doi.org/10.1016/j.jisa.2022.103368
C. Sun, H. Tian, W. Mazurczyk, C. Chang, Y. Cai, Y. Chen Towards blind detection of steganography in low-bit-rate speech streams - International Journal of Intelligent Systems, Wiley, 2022, 1- 28. DOI:10.1002/int.23077
L. Caviglione, W. Mazurczyk - Never Mind The Malware, Here's The Stegomalware - IEEE S&P magazine, Volume 20, Issue 5, 2022, DOI: 10.1109/MSEC.2022.3178205
Y. Qiu, H. Tian, L. Tang, W. Mazurczyk, C. Chang, Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords, Journal of Information Security and Applications, Vol. 68, August 2022, 103250, DOI: 10.1016/j.jisa.2022.103250
A. Schaffhauser, W. Mazurczyk, M. Zuppelli, L. Caviglione, J-H. Castro - Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images, Security and Communication Networks, 2022
M. Zuppelli, M. Repetto, A. Schaffhauser, W. Mazurczyk, L. Caviglione - Code Layering for the Detection of Network Covert Channels in Agentless Systems, IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2022.3176752, 2022
M. T. Ahvanooey, X. Zhu, Q. Li, W. Mazurczyk, K. R. Choo, B. B. Gupta, M. Conti - Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey, IEEE Internet of Things Journal, 2022, DOI: 10.1109/JIOT.2021.3138073
M. T. Ahvanooey, X. Zhu, W. Mazurczyk, M. Bendechache - Information Hiding in Digital Textual Contents: Techniques, and Current Challenges, IEEE Computer magazine, vol. 55, no. 6, pp. 56-65, June 2022, DOI: 10.1109/MC.2021.3113922.
M. T. Ahvanooey, X. Zhu, W. Mazurczyk, K. R. Choo, M. Conti, J. Zhang - Misinformation Detection on Social Media: Challenges and The Road Ahead, IEEE IT Professional Magazine, Volume: 24, Issue: 1, Jan.-Feb. 1 2022, pp. 34-40, DOI: 10.1109/MITP.2021.3120876
P. Rajba, W. Mazurczyk- Information Hiding using Minification, IEEE Access, vol. 9, pp. 66436 - 66449, 2021, doi: 10.1109/ACCESS.2021.3077197
W. Mazurczyk, L. Caviglione - Cyber Reconnaissance Techniques - Communications of the ACM, March 2021, Vol. 64 No. 3, Pages 86-95, DOI: 10.1145/3418293
W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, K. Cabaj - Challenges and Novel Solutions for 5G Network Security, Privacy and Trust - IEEE Wireless Communications, vol. 27, no. 4, pp. 6-7, August 2020, doi: 10.1109/MWC.2020.9170261
J. Saenger, W. Mazurczyk, J. Keller, L. Caviglione - VoIP network covert channels to enhance privacy and information sharing, Future Generation Computer Systems, Vol. 111, October 2020, pp. 96-106, DOI: 10.1016/j.future.2020.04.032
A. EL-Latif, B. Abd-El-Attya, W. Mazurczyk, C. Fung, S. Venegas-Andraca - Secure data encryption based on quantum walks for 5G Internet of Things scenario, IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2020.2969863, Vol. 17 , Iss.: 1, March 2020, pp. 118-131
W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, K. Cabaj - Special issue on Advancements in 5G Networks Security - Future Generation Computer Systems, September 2020, Vol. 110, pp. 314-316, DOI:10.1016/j.future.2020.04.043
J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec - Cyberattack Detection and Response, Journal of Universal Computer Science, Volume 25 / Issue 11, p. 1394-1395, 2019
Z. Lv, W. Mazurczyk, S. Wendzel, H. Song, Recent Advances in Cyber-Physical Security in Industrial Environments, IEEE Transactions on Industrial Informatics, 2019, DOI: 10.1109/TII.2019.2945971
A. EL-Latif, B. Abd-El-Attya, S. Venegas-Andraca, W. Mazurczyk - Efficient quantum-based security protocols for information sharing and data protection in 5G Networks, Future Generation Computer Systems, Vol. 100, November 2019, pp. 893-906, DOI: https://doi.org/10.1016/j.future.2019.05.053
A. Janicki, W. Mazurczyk, X. Luo, D. Ye, Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes - Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 25, No. 9, 2019, pp. 1039-1043
N. Jawad, M. Salih, K. Ali, B. Meunier, Y. Zhang, X. Zhang, R. Zetik, C. Zarakovitis, H. Koumaras, M. Kourtis, L. Shi, W. Mazurczyk, J. Cosmas - Smart Television Services using NFV/SDN Network Management, IEEE Transactions on Broadcasting, 2019, DOI: 10.1109/TBC.2019.2898159
W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics, part 2 - IEEE S&P magazine, Vol.: 17, Iss.: 1, Jan.-Feb. 2019, DOI: 10.1109/MSEC.2019.2896857
K. Opasiak, W. Mazurczyk - (In)Secure Android Debugging, Computers & Security, Elsevier, Vol. 82, May 2019, pp. 80-98, DOI: 10.1016/j.cose.2018.12.010
W. Mazurczyk, S. Wendzel, M. Chourib, J. Keller - Countering Network Covert Channels with Dynamic Wardens, Future Generation Computer Systems, 2019, DOI: 10.1016/j.future.2018.12.047
S. Schmidt, W. Mazurczyk, R. Kulesza, J. Keller, L. Caviglione - Exploiting IP Telephony with Silence Suppression for Hidden Data Transfers, Computers & Security, Elsevier, Volume 79, November 2018, Pages 17-32
J. Keller, I. Bernik, W. Mazurczyk - Technical and Social Aspects of Critical Infrastructure Security, Journal of Universal Computer Science (J. UCS), vol. 24, no. 5 (2018), 554-555, ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM
K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander - The New Threats of Information Hiding: the Road Ahead, IEEE IT Professional, May/June 2018
L. Caviglione, W. Mazurczyk, S. Wendzel, S. Zander - Emerging and Unconventional: New Attacks and Innovative Detection Techniques, Security and Communication Networks, Article ID 9672523, 2018, DOI:10.1155/2018/9672523
K. Cabaj, M. Gregorczyk, W. Mazurczyk - Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics, Computers and Electrical Engineering, Vol. 66, pp. 353-368, DOI: 10.1016/j.compeleceng.2017.10.012, February 2018
W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 10 - 11, Nov./Dec. 2017
L. Caviglione, S. Wendzel, W. Mazurczyk - The Future of Digital Forensics: Challenges and the Road Ahead - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 12 - 17, Nov./Dec. 2017, DOI: 10.1109/MSP.2017.4251117
W. Mazurczyk, M. Korczynski, K. Nakao, E. Kirda, C. Hesselman, K. Yoshioka - Traffic Measurements for Cyber Security - IEEE Communication Magazine, Vol. 55, Iss. 7, pp. 12-13, DOI: 10.1109/MCOM.2017.7981517, 2017
S. Wendzel, W. Mazurczyk, S. Zander - A Unified Description for Network Information Hiding Methods, Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 22, No. 11, 2016, pp. 1456-1486
W. Mazurczyk, K. Szczypiorski, Z. Duric, D. Ye - Cyber Crime - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2861-2863, 2016, DOI: 10.1002/sec.1603
W. Mazurczyk, S. Moore, E. W. Fulp, H. Wada, K. Leibnitz - Bio-inspired Cyber Security for Communications and Networking - IEEE Communication Magazine, pp. 120-121, June 2016
M. Urbanski, W. Mazurczyk, J-F. Lalande, L. Caviglione - Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones - International Journal of Computer Systems Science and Engineering, Vol. 32 No. 2, March 2017
W. Mazurczyk, T. Holt, K. Szczypiorski - Guest Editors' Introduction: Special Issue on Cyber Crime - IEEE Transactions on Dependable and Secure Computing, Vol. 13, Iss. 2, March/April 2016, pp. 146-147, DOI: 10.1109/TDSC.2015.2502407
W. Mazurczyk, K. Szczypiorski, A. Janicki, H. Tian - Trends in modern Information Hiding: techniques, applications, and detection - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1469, Vol. 9, Iss. 8, pp. 703-704, 2016
A. Janicki, W. Mazurczyk, K. Szczypiorski - On the Undetectability of Transcoding Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1301
E. Rzeszutko, W. Mazurczyk - Insights from Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2: 82-87
A. Janicki, W. Mazurczyk, K. Szczypiorski - Evaluation of Efficiency of Transcoding Steganography - Journal of Homeland Security and Emergency Management, 2015, DOI: 10.1515/jhsem-2014-0028
W. Mazurczyk, S. Wendzel, I. Azagra Villares, K. Szczypiorski - On Importance of Steganographic Cost For Network Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, DOI: 10.1002/sec.1085, 2016; Vol. 9, Iss. 8, pp. 781-790
W. Mazurczyk, K. Szczypiorski - Advances in digital media security and right management - Multimedia Systems Journal, DOI 10.1007/s00530-013-0339-8
A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 449-460, DOI: 10.1007/s12243-013-0385-4
W. Mazurczyk, K. Szczypiorski, H. Tian - Network forensics and challenges for cybersecurity - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 345-346, DOI: 10.1007/s12243-014-0434-7
W. Mazurczyk, K. Szczypiorski - Toward Effective and Reliable Digital Forensics - Computer Journal, Vol. 55, Iss. 6, Oxford University Press, June 2012, pp. 651-652
T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 51: Issue 4, December 2012, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
G.F. Marias, J. Barros, M. Fiedler, R. Herkenhoener, A. Grillo, A. Lentini, L. Lima, C.Lorentzen, W. Mazurczyk, H. de Meer, P. Oliveira, G.C. Polyzos, E. Pujol, K.Szczypiorski, J.P. Vilela, T. Vinhoza - Security and Privacy Issues for the Network of the Future, International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Volume 5, Issue 9, pages 987 1005, September 2012
A. Nilizadeh, S. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Adaptive Matrix Pattern Steganography on RGB Images, Journal of Cyber Security and Mobility (JCSM), Vol. 11, Iss. 1, River Publishers, 2022
S. Wendzel, W. Mazurczyk, G. Haas - Steganography for Cyber Physical Systems, Journal of Cyber Security and Mobility (JCSM), Vol. 6(2), pp. 105-126, River Publishers, 2017
W. Mazurczyk - Nature as an inspiration for the next-generation network defences, Journal of Cyber Security and Mobility, December 2016, DOI: 10.13052/popcas013
W. Mazurczyk, P. Amann, L. Caviglione, S. Wendzel - CUIng: Criminal Use of Information Hiding Initiative, European CIIP Newsletter (ECN 25), Vol. 10, No. 3, November 16 - February 17, December 2016, pp. 31-32
P. Łąka, D. Flaga, W. Mazurczyk - Bezpieczne uwierzytelnianie z wykorzystaniem urządzeń mobilnych - XXXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2016, Gliwice, September 2016, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2016
B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - Journal of Advances in Computer Networks, Vol. 3, No. 2, June 2015, DOI: 10.7763/JACN.2015.V3.155
W. Mazurczyk, K. Szczypiorski, J. Lubacz, A. Janicki, E. Rzeszutko - Ukrywanie informacji w ruchu telefonii IP - Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 2-3/2015
P. Białczak, W. Mazurczyk - Multipleksacja kanału ukrytego jako sposob niejawnej transmisji grupowej - XXX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2014, Poznan, September 2014, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2014
B. Lipiński, W. Mazurczyk, K. Szczypiorski - Steganografia w srodowisku chmury obliczeniowej - XXIX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2013, Gdansk, 4-6 September 2013, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2013
M. Gregorczyk, W. Mazurczyk, K. Szczypiorski - Wpływ steganografii sieciowej na opóznienia w telefonii IP - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 797-808
W. Frączek, W. Mazurczyk, K. Szczypiorski - Sposoby głębokiego ukrywania w sieciach - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 849-858
W. Frączek, W. Mazurczyk, K. Szczypiorski - Zastosowania steganografii wielopoziomowej - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 783-788
P. Białczak, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w Google Suggest - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 789-794
K. Szczypiorski, W. Mazurczyk - Ukrywanie danych w symbolach OFDM w sieciach IEEE 802.11 - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wrocław, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1055-1064
B. Jankowski, W. Mazurczyk, K. Szczypiorski - System steganograficzny oparty na niepoprawnym dopełnianiu ramek - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010,
Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i
Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1035-1044
W. Frączek, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w protokole SCTP - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010,
Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i
Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1045-1054
J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganografia sieciowa,
published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne
4/2010, ISSN 1230-3496, April 2010, nr 4/2010, str. 134-135
M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznych (paper accepted to KSTiT 2009, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 8-9/2009 pp. 819-823, ISSN 1230-3496, September 2009 (in Polish)
K. Cabaj, L. Caviglione, J. Keller, W. Mazurczyk, A. Schaffhauser - Teaching Cyber Security through Distance Learning with International Students, "Innovation in Cybersecurity Education", Springer Nature, Editors: Kevin Daimi and Guillermo Francia, 2020
L. Caviglione, W. Mazurczyk, S. Wendzel - Advanced Information Hiding Techniques for Modern Botnets, in: G. Kambourakis et al. (Eds.): Botnets: Architectures, Countermeasures, and Challenges, CRC Series in Security, Privacy and Trust, Taylor & Francis, October 2019
E. Rzeszutko, W. Mazurczyk - Nature-inspired analogies and metaphors for cyber security, In: Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications<, E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk (Eds.), Institution of Engineering and Technology (IET), March 2019
L. Caviglione, M. Gaggero, J-F Lalande, W. Mazurczyk - Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data, M. Migliardi, A. Merlo, B. S. Al-Haj (Eds.), Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, August 2017, ISBN: 9780128046036
W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology, B. Akhgar and B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism, Advanced Sciences and Technologies for Security Applications, Springer, DOI: 10.1007/978-3-319-38930-1, June 2016, pp. 17-37
W. Mazurczyk, L. Caviglione - Chapter 4 - Network Steganograpy In: S. Kaztenbeisser and F. Petitcolas (Eds.): Information Hiding - Techniques for Steganography and Digital Watermarking, Artech House, Edition 2, 2015
L. Caviglione, J.-F. Lalande, W. Mazurczyk, S. Wendzel - Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, USA, Lecture Notes in Computer Science (LNCS), Springer, Vol. 9190, pp. 165-177, July 2015
W. Mazurczyk, K. Szczypiorski - Steganography of VoIP Streams In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1001-1018
K. Szczypiorski, I. Margasiński, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1019-1035
W. Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Hamid Jahankhani, Kenneth Revett, and Dominic Palmer-Brown (Eds.): ICGeS 2008 - Communications in Computer and Information Science (CCIS) 12, Springer Verlag Berlin Heidelberg, Proc. of 4th International Conference on Global E-security 2008, London, United Kingdom, 23-25 June 2008, pp. 65-72
T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System, 7th International Conference on Computer Science - Research and Applications (IBIZA 2008), Poland, Kazimierz Dolny 31.01 - 2.02 2008, Published in Annales UMCS, Informatica, AI 8 (2008), pp. 186-201
W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security (extended version), In: Jerzy Pejas, Khalid Saeed (Eds.) - Advances in Information Processing and Protection, Science+Business Media Inc. Springer, ISBN: 978-0-387-73136-0, August 2007
R. Seo, M. Kuribayashi, A. Ura, A. Mallet, R. Cogranne, W. Mazurczyk, D. Megias - Toward Universal Detector for Synthesized Images by Estimating Generative AI Models, Proc. of APSIPA ASC 2024, Macau, China, December 3-6 2024 [NEW]
K. Hoelk, W. Mazurczyk, M. Zuppelli, W. Mazurczyk - Investigating HTTP Covert Channels Through Fuzz Testing, Proc. of the 19th International Conference on Availability, Reliability and Security (ARES 2024), July 2024 [NEW]
A. Rosales, A. Malanowska, T. K. Araghi, M. Kuribayashi, M. Kowalczyk, D. Blanche-Tarrago, W. Mazurczyk, D. Megias - Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation, Proc. of the 19th International Conference on Availability, Reliability and Security (ARES 2024), July 2024 [NEW]
K. Cabaj, M. Kowalczyk, M. Gregorczyk, M. Choras, R. Kozik, W. Mazurczyk - Strategies to Use Harvesters in Trustworthy Fake News Detection Systems, In Proc. of 16th International Conference on Computational Collective Intelligence (ICCCI 2024), 9-11 September 2024, Leipzig, Germany [NEW]
K. Kamieniarz, W. Mazurczyk - A Comparative Study on the Security of Kubernetes Deployments, In Proc. of 20th International Wireless Communications & Mobile Computing Conference (IWCMC 2024), Ayia Napa, Cyprus, 27-31 May 2024
L. Pietraszek, W. Mazurczyk - A Research Environment for Evaluating File-based Cryptojacking Detection Techniques, In Proc. of 20th International Wireless Communications & Mobile Computing Conference (IWCMC 2024), Ayia Napa, Cyprus, 27-31 May 2024
T. Koohpayeh Araghi, D. Megias, V. Garcia-Font, M. Kuribayashi, W. Mazurczyk - Disinformation detection and source tracking using semi-fragile watermarking and blockchain, In Proc. of In Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2024), Xanthi, Greece, 5-6 June 2024
P. Bialczak, W. Mazurczyk - Malware classification using Open Set Recognition and HTTP protocol requests, In Proc. of 28th European Symposium on Research in Computer Security (ESORICS 2023), Lecture Notes in Computer Science, vol. 14345, Springer, DOI: 10.1007/978-3-031-51476-0_12, The Hague, The Netherlands, 25-29 September 2023
R. Kozik, W. Mazurczyk, K. Cabaj, A. Pawlicka, M. Pawlicki, M. Choras - Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models, In Proc. of 10th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2023), Thessaloniki, Greece, 9-13 October 2023, DOI: 10.1109/DSAA60987.2023.10302543
N. Orzechowski, K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk, N. Leligou, M. Przybyszewski, R. Kozik, M. Choras - Security Architecture in the SILVANUS project, In Proc. of Emerging Network Security (ENS) Workshop, Proc. of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August - 1 September 2023
P. Rajba, J. Keller, W. Mazurczyk - Proof-of-work based new encoding scheme for information hiding purposes, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August - 1 September 2023
K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk - Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
P. Rajba, W. Mazurczyk - Limitations of Web Cryptojacking Detection: A Practical Evaluation, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
L. Caviglione, M. Grabowski, K. Gutberlet, A. Marzecki, M. Zuppelli, A. Schaffhauser, W. Mazurczyk - Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
M. Kowalczyk, A. Malanowska, W. Mazurczyk, K. Cabaj - Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
M. T. Ahvanooey, M. X. Zhu, W. Mazurczyk, M. Kilger, K-K. R. Choo - Do Dark Web and Cryptocurrencies Empower Cybercriminals?, In: Gladyshev, P., Goel, S., James, J., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 441. Springer, Cham. https://doi.org/10.1007/978-3-031-06365-7_17, December 7-9, 2021, Singapore
J. Hospital, D. Megias, W. Mazurczyk - Retransmission steganography in real-world scenarios: a practical study, In Proc. of European Interdisciplinary Cybersecurity Conference (EICC), Virtual, November 2021, pp. 60-65, DOI: 10.1145/3487405.3487659
M. Chourib, S. Wendzel, W. Mazurczyk - Adaptive Warden Strategy for Countering Network Covert Storage Channels, In Proc. of 46nd IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021
S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann, C. Kraetzer, K. Lamshoeft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert - A Revised Taxonomy of Steganography Embedding Patterns - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
P. Rajba, W. Mazurczyk - Data Hiding Using Code Obfuscation - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
D. Megias, M. Kuribayashi, A. Rosales, W. Mazurczyk - DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
M. Gregorczyk, W. Mazurczyk - Inferring Flow Table State through Active Fingerprinting in SDN Environments, 18th International Conference on Security and Cryptography (SECRYPT 2021), July 2021
L. Caviglione, M. Zuppelli, W. Mazurczyk, A. Schaffhauser, M. Repetto - Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label - In Proc. of the 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), June 2021
C. Heinz, W. Mazurczyk, L. Caviglione - Covert Channels in Transport Layer Security - In Proc. of European Interdisciplinary Cybersecurity Conference (EICC 2020), Rennes, France, November 2020
P. Rajba, W.Mazurczyk - Exploiting Minification for Data Hiding Purposes - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
P. Nowakowski, P. Zorawski, K. Cabaj, M. Gregorczyk, M. Purski, W. Mazurczyk - Distributed Packet Inspection for Network Security Purposes in Software-Defined Networking Environments - In Proc. of 5G Networks security (5G-NS) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
P. Szary, W. Mazurczyk, S. Wendzel, L. Caviglione - Design and Performance Evaluation of Reversible Network Covert Channels - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Network Covert Channels Detection using Data Mining and Hierarchical Organisation of Frequent Sets: an Initial Study - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
J. Cosmas, M. Gregorczyk, W. Mazurczyk, K. Cabaj, et al. - Network and Application Layer Services for High Performance Communications in Buildings, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB 2020), Paris, France, June 2-5 2020
P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Securing Modern Network Architectures with Software Defined Networking, In Proc. of 2019 International Conference on Computational Science and Computational Intelligence, December 05-07, 2019, Las Vegas, USA
W. Mazurczyk, K. Powojski, L. Caviglione - IPv6 Covert Channels in the Wild - In Proc. of Central European Cybersecurity Conference (CECC 2019), Munich, Germany, November 2019
W. Mazurczyk, P. Szary, S. Wendzel, L. Caviglione - Towards Reversible Storage Network Covert Channels - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches, - In Proc. of 5G Network Security (5G-NS 2019) workshop, ARES 2019 Proceedings of the 14th International Conference on Availability, Reliability and Security, August 2019
K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
T. Schmidbauer, S. Wendzel, A. Mileva, W. Mazurczyk - Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
M. Skwarek, M. Korczynski, W. Mazurczyk, A. Duda - Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning - In Proc. of 4th Workshop on Traffic Measurements in Cybersecurity (WTMC 2019) co-located with 40th IEEE Security & Privacy 2019 (IEEE S&P) conference, May 2019, San Diego, USA
U. Rauf, M. Mohsin, W. Mazurczyk - Cyber Regulatory Networks: Towards A Bio-inspired Auto-resilient Framework for Cyber-Defense - In Proc. of 11th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT 2019), March 13-14, 2019, Pittsburgh, United States
J-F Lalande, V. Viet Triem Tong, P. Graux, G. Hiet, W. Mazurczyk, H. Chaoui, P. Berthome - Teaching Android Mobile Security - In Proc. of 50th ACM Technical Symposium on Computer Science Education, February 27 - March 2, 2019, Minneapolis, USA
S. Wendzel, D. Eller, W. Mazurczyk - One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels - In Proc. of Central European Cybersecurity Conference (CECC 2018), Ljubljana, Slovenia, 15-16 November 2018
K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System - In Proc. of 5G Network Security (5G-NS 2018) workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
A. Tundis, W. Mazurczyk, M. Muehlhaeuser - A Review of Network Vulnerabilities Scanning Tools: Types, Capabilities and Functioning - In Proc. of International Workshop on Organized Cybercrime, Cybersecurity and Terrorist Networks (IWOCCTN 2018), ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
D. Geisler, W. Mazurczyk, J. Keller - Towards Utilization of Covert Channels as a Green Networking Technique - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2018 conference
W. Mazurczyk, S. Wendzel, K. Cabaj - Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - A 5G Radio-Light SDN Architecture for Wireless and Mobile Network Access in Buildings - In Proc. of IEEE 5G World Forum, Santa Clara, California, USA, 9-11 July
J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - A Scaleable and License Free 5G Internet of Radio Light Architecture for Services in Train Stations - In Proc. of 24th European Wireless (EW 2018), Catania, Italy, 2-4 May 2018
J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - 5G Internet of Radio Light Services for Musee de la Carte a Jouer - In Proc. of 1st Global LiFi Congress, Paris, France, 8-9 February, 2018
J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - 5G Internet of Radio Light Services for Supermarkets, 14th China International Forum on Solid State Lighting: International Forum on Wide Bandgap Semiconductors China (SSLChina: IFWS), Beijing, China, 2017, pp. 69-73, DOI: 10.1109/IFWS.2017.8245977
F. Lehner, W. Mazurczyk, J. Keller, S. Wendzel - Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach - In Proc. of 42nd IEEE Conference on Local Computer Networks (LCN), October 9-12, 2017, Singapore, pp. 78-85
S. Schmidt, W. Mazurczyk, J. Keller, L. Caviglione - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2017 conference
A. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Information Hiding in RGB Images Using an Improved Matrix Pattern Approach - In Proc. of the Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2017), Honolulu, Hawaii, July 21, 2017
S. Wendzel, W. Mazurczyk, G. Haas - Don't You Touch My Nuts: Information Hiding In Cyber-Physical Systems Using Smart Buildings - In Proc. of the Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2017) co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, USA, May 25, 2017
S. Wendzel, W. Mazurczyk - An Educational Network Protocol for Covert Channel Analysis Using Patterns - In Proc. of ACM Conference on Computer and Communications Security (ACM CCS 2016), October 24-28, 2016, Vienna, Austria, pp. 1739-1741
B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - In Proc. of 5th International Conference on Networking and Information Technology (ICNIT 2014), November 21-23, 2014, Singapore
M. Seredynski, R. Aggoune, W. Mazurczyk, K. Szczypiorski, D. Khadraoui - Vehicular Ad Hoc Networks for Join Traffic and Mobility Management - International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2013), Almaty, Kazakhstan, September 10-13, 2013
P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In Proc. of 2nd International Workshop on Cyber Crime (IWCC 2013) co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Francisco, USA, May 24, 2013, pp. 151-157
M. Seredynski, W. Mazurczyk, D. Khadraoui - Multi-Segment Green Light Optimal Speed Advisory - In Proc. of 16th International Workshop on Nature Inspired Distributed Computing (NIDISC 2013), May 20-24, 2013, Boston, Massachusetts USA
W. Mazurczyk, K. Szczypiorski, B. Jankowski - Towards Steganography Detection Through Network Traffic Visualisation - In Proc. of First International Workshop on Cyber Crime (IWCC 2012) co-located with International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012), October 3-5, 2012, St. Petersburg, Russia
W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof?, In Proc. of: The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
W. Frączek, W. Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In Proc. of: First International Workshop on Digital Forensics (IWDF 2011) co-located with The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 121-131, Prague, Czech Republic, 26-28.05.2011
W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography Applied to Networks - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 90-96, Prague, Czech Republic, 26-28.05.2011
W. Frączek, W. Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
W. Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In Proc. of: First International Workshop on Network Steganography (IWNS'09), Wuhan, Hubei, China, 18-20 November, 2009 - co-located with 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009), Vol. I, pp. 569-572
T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, 2nd Euro-NF Workshop - Future Internet Architectures: New Trends in Service Architectures Future 2009, 10-12 June 2009, Santander, Spain
W. Mazurczyk, J. Lubacz, K. Szczypiorski - Steganography for Real-time Services in IP Networks, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
K. Szczypiorski, J. Lubacz, W. Mazurczyk - Hiding Data in Wireless LANs, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
K. Szczypiorski, W. Mazurczyk, K. Cabaj, P. Radziszewski - Towards the Steganographic Routing, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
J. Lubacz, W. Mazurczyk, K. Szczypiorski - Hiding Data in VoIP In Proc of: The 26th Army Science Conference (ASC 2008), Orlando, Florida, USA, December 1-4, 2008
W. Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls, In Proc. of the PGTS '08 - the Fifth Polish-German Teletraffic Symposium (A. Feldmann, P. Kuhn, M. Pioro, A. Wolisz [Eds.]), Berlin, Germany, ISBN 978-3-8325-2047-2, Logos Verlag Berlin, pp. 119-128, October 6-8, 2008
Ch.Eliasson, M.Fiedler, T.Ciszkowski, Z.Kotulski, W.Mazurczyk - Parameterisation of a reputation system for VoIP in P2P networks for improved communication quality and security, EuroFGI, IA.7.6 Workshop on Socio-Economic Aspects of Future Generation Internet, Karlskrona, Sweden, 27-29 May, 2008
T. Hoßfeld, D. Collange, M. Fiedler, T. Ciszkowski, Z. Kotulski, W. Mazurczyk - QoEWeb: Quality of Experience and User Behaviour Modelling for Web Traffic, 1st Euro-NF Socio-Economics Workshop, Greece, October 16-17 2008
W. Mazurczyk, K. Szczypiorski - Steganography Harnesses VoIP Networks published in: SC Magazine, Haymarket Media, UK, July 2008
T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Luki w VoIP - miesięcznik Hakin9, pazdziernik 2007
K. Cabaj, W. Mazurczyk, K. Szczypiorski - Mechanizmy zabezpieczeń w sieciach WiMAX - dwumiesięcznik Zabezpieczenia, ISSN: 1505-2419, 4/2007
Wojciech Mazurczyk, Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesyłania danych w sieci telekomunikacyjnej dla usług multimedialnych - Zgłoszenie wynalazku nr P-396615. Politechnika Warszawska. Data zgłoszenia: 12 pazdziernik 2011
Wojciech Mazurczyk i Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesylania danych sieci telekomunikacyjnych - Zgloszenie wynalazku nr P-384940 na rzecz Politechniki Warszawskiej. Data zgloszenia: 15 kwietnia 2008
W. Mazurczyk, M. Kara , K. Szczypiorski - SkyDe: a Skype-based Steganographic Method
- In: Computing Research Repository (CoRR), abs/1301.3632, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 16
January 2013
A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography
- In: Computing Research Repository (CoRR), abs/1210.5888, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 22
October 2012
J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography
- In: Computing Research Repository (CoRR), abs/1207.0917, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 5
July 2012
W. Mazurczyk - VoIP Steganography and Its Detection - A Survey
- In: Computing Research Repository (CoRR), abs/1203.4374, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 20
March 2012
E. Zielinska, W. Mazurczyk, K. Szczypiorski - The Advent of Steganography in Computing Environments
- In: Computing Research Repository (CoRR), abs/1202.5289, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 23
February 2012
A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography
- In: Computing Research Repository (CoRR), abs/1201.6218, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 30
January 2012
W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony
- In: Computing Research Repository (CoRR), abs/1111.1250, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 4
November 2011
W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof?
- In: Computing Research Repository (CoRR), abs/1107.4077, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 20
July 2011
W. Frączek, W.Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden?
- In: Computing Research Repository (CoRR), abs/1107.4065, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 20
July 2011
P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest
- In: Computing Research Repository (CoRR), abs/1107.4062, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 20
July 2011
W. Frączek, W.Mazurczyk, K. Szczypiorski - Hiding Information in a Stream Control Transmission Protocol
- In: Computing Research Repository (CoRR), abs/1104.3333, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 17
April 2011
B. Jankowski, W.Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography
- In: Computing Research Repository (CoRR), abs/1104.0422, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 3
April 2011
W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets
In: Computing Research Repository (CoRR), abs/1102.0023, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 31
January 2011
W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied
In: Computing Research Repository (CoRR), abs/1007.0767, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 5
July 2010
K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks
In: Computing Research Repository (CoRR), abs/1006.0495, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 2
June 2010
W. Frączek, W.Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography
- In: Computing Research Repository (CoRR), abs/1006.0247, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 1
June 2010
B. Jankowski, W.Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding
- In: Computing Research Repository (CoRR), abs/1005.1925, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 12
May 2010
W.Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays?
- In: Computing Research Repository (CoRR), abs/1002.4303, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 24
February 2010
W.Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets
- In: Computing Research Repository (CoRR), abs/0907.0313, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 2
July 2009
W.Mazurczyk, M. Smolarczyk, K. Szczypiorski - Hiding Information in Retransmissions
- In: Computing Research Repository (CoRR), abs/0905.0363, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 5
May 2009
W.Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method
- In: Computing Research Repository (CoRR), abs/0811.4138, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 26
November 2008
K. Szczypiorski, I. Margasinski, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems
In: Computing Research Repository (CoRR), abs/0808.4060, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 1
September 2008>
K. Szczypiorski, I. Margasinski, W.Mazurczyk - Steganographic Routing in Multi Agent System Environment
- In: Computing Research Repository (CoRR), abs/0806.0576, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 4
June 2008
W.Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling
- In: Computing Research Repository (CoRR), abs/0805.3538, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 26
May 2008
W.Mazurczyk, K. Szczypiorski - Steganography of VoIP streams
- In: Computing Research Repository (CoRR), abs/0805.2938, arXiv.org
E-print Archive, Cornell University, Ithaca, NY (USA), published on 21
May 2008
W. Mazurczyk - Trends in stegomalware - utilization of data hiding techniques by malicious software, Samsung R&D Institute Poland, 11 December 2022, Warsaw, Poland
W. Mazurczyk - Sposoby detekcji fake news w tresciach multimedialnych w projekcie DISSIMILAR - podejscie interdyscyplinarne, Seminarium Wybrane zastosowania inteligencji obliczeniowej, Komisja Informatyki i Automatyki PAN, 25 November, 2022, online
W. Mazurczyk - Recent advances in stegomalware: development trends and detection opportunities, 21st International Workshop on Digital-forensics and Watermarking (IWDW 2022), 19-21 November 2022, Guilin, P.R. China (keynote)
W. Mazurczyk - Adversarial Cyber Reconnaissance Techniques: Evolution, Countermeasures, and Challenges, NATO IST-190 Research Symposium (RSY) on Artificial Intelligence, Machine Learning and Big Data for Hybrid Military Operations (AI4HMO), 5-6 October, 2021, Koblenz, Germany (keynote)
W. Mazurczyk - Trends in Stegomalware: Techniques and Countermeasures, 3rd International Conference on Frontiers in Cyber Security (FCS 2020), December 18 2020, Tinjan, China (keynote)
W. Mazurczyk - Secure Intelligent Methods for Advanced Recognition of Malware and Stegomalware, IEEE Conference on Network Softwarization (IEEE NetSoft), July 2020 (virtual conference)
W. Mazurczyk - Trends in Network Covert Channels: Design and Mitigation, Cyber Security Seminar, University of Kent, Canterbury, UK, January 2020
P. Georgi, J. Keller, W. Mazurczyk - IVLIS - International Virtual Laboratory for Information Security, Erasmus+ Staff Week 2018, June 2018, Hagen, Germany
W. Mazurczyk - Challenges of network steganography detection, TAKEDOWN workshop co-located with ARES 2017, August 29 2017, Reggio Calabria, Italy (invited talk)
W. Mazurczyk - Criminal Use of Information Hiding (CUIng) initiative: past, present and future, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (keynote)
W. Mazurczyk - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (paper presentation)
W. Mazurczyk - Criminal Use of Information Hiding Initiative: the First Year, 3rd EC3 Academic Advisory Network Meeting (EC3 AAN), 20 April 2017, The Hague, Netherlands
W. Mazurczyk - Sposoby wspolpracy jednostek badawczych z firmami, PLNOG 2017, 6-7 March 2016, Warsaw, Poland
W. Mazurczyk, K. Cabaj - Information hiding techniques and how modern malware uses them / Techniki ukrywania informacji i sposoby ich wykorzystania przez zlosliwe oprogramowanie, Secure 2016, 25-26 October 2016, Warsaw, Poland
K. Cabaj, W. Mazurczyk - Ransomware infrastructure identification using dynamic analysis based on CryptoWall and Locky families examples / Identyfikacja infrastruktury ransomware z wykorzystaniem analizy dynamicznej na przykladzie rodzin CryptoWall i Locky, Secure 2016, 25-26 October 2016, Warsaw, Poland
W. Mazurczyk - On-going Cybersecurity Research Projects, 2nd EC3 Academic Advisory Network Meeting (EC3 AAN), 6-7 April 2016, The Hague, Netherlands
W. Mazurczyk - Inspirations for innovative cybersecurity technologies, The COURAGE - CAMINO - CyberROAD joint conference on "Emerging and Current Challenges in Cybercrime and Cyberterrorism", 10-11 March 2016, The Hague, Netherlands
K. Cabaj, W. Mazurczyk - Dynamic analysis of CryptoWall network activity, Europol EC3 meeting, 9 March 2016, The Hague, Netherlands
W. Mazurczyk - Influence of modern information hiding techniques on digital forensics, "Secure Europe without borders" conference organized by Lodz Regional Police Headquarters, Poland, February 2016 (invited talk)
W. Mazurczyk - Innovative cyber security methods for NGI (Next Generation Infrastructures), CIPRNet training lecture, May 2015, University of Technology and Life Sciences, Bydgoszcz, Poland
K. Szczypiorski, W. Mazurczyk, E. Rzeszutko - Hiding information in Skype, Materiały: The 5th Annual WUT-KNU Joint Workshop on ICT Programme, 13-14 November 2014, Warsaw, Poland
W. Mazurczyk, K. Szczypiorski, E. Zielińska - Studia realistycznych przypadków steganografii sieciowej, Materiały: Secure 2012, XVI Konferencja na temat bezpieczeństwa teleinformatycznego, 22-24 November 2012, Warsaw, Poland
W. Mazurczyk, K. Szczypiorski - O ukrywaniu informacji w sieciach - XXVII Jesienne Spotkania PTI, Jachranka, 17-20 pazdziernika 2011
W. Mazurczyk - Nowe sposoby ukrywania informacji w sieciach telekomunikacyjnych - Jesienne Warsztaty CSZ, Madralin, 14-16 pazdziernik 2011
W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Ukrywanie
informacji w retransmisjach, Materiały: Secure 2009, XIII Konferencja na
temat bezpieczeństwa teleinformatycznego, 20-21 October 2009, Warszawa
W. Mazurczyk, K. Cabaj, K. Szczypiorski - Presentation of
selected steganographic tools, Seminar: Information hiding in data
communication networks organized by TP S.A., Warsaw, 16 October 2009
K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganographic
methods to secretly transmit data in communication networks, Seminar:
Information hiding in data communication networks organized by TP S.A.,
Warsaw, 16 October 2009
K. Szczypiorski, W. Mazurczyk, J. Lubacz - Fundamentals of
Networks Steganography - A seminar presentation. FEIT Skopje
(Macedonia), 26 June 2009
K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganologia
sieciowa - czyli o wyrafinowanych sposobach ukrytego przekazywania
informacji - A seminar presentation. Polish Information Processing
Society, 12 May 2009
K. Szczypiorski, W. Mazurczyk, J. Lubacz - Metody
steganografii sieciowej - A seminar presentation. Research and Academic
Computer Network, Warsaw, 18 March 2009
J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganofonia:
ukrywanie informacji w telefonii internetowej - Materiały: Secure 2008,
XII Konferencja na temat bezpieczeństwa teleinformatycznego, 2-3
pazdziernika 2008, Warszawa
J. Lubacz, W. Mazurczyk, K. Szczypiorski - Nowe metody
steganografii w sieciach - Posiedzenie Sekcji Telekomunikacji Polskiej
Akademii Nauki (PAN) podczas XXIII Krajowego Sympozjum Telekomunikacji i
Teleinformatyki 2008, 11 wrzesnia 2008, Bydgoszcz
W. Mazurczyk - Covert channel for improving VoIP security The 13th International Multi-Conference on Advanced Computer Systems - ACS 2006, 18-20 October 2006, Miedzyzdroje
W. Mazurczyk - Bezpieczeństwo VoIP
- Materiały: V Konferencja Infrastruktura Telekomunikacyjna dla
Biznesu: VoIP - telefonia internetowa: Modele biznesowe i taryfy, 26
stycznia 2006, Warszawa
W. Mazurczyk, K. Szczypiorski
- Bezpieczeństwo VoIP bazujacego na SIP - IV Sympozjum AFCEA -
Bezpieczeństwo systemów informacyjnych "BSI 2003", Warszawa, maj 2003
W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII
Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj
2003
Theses
W. Mazurczyk - Information hiding in IP telephony traffic / Ukrywanie informacji w ruchu telefonii IP - rozprawa habilitacyjna / habilitation thesis, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2014
W. Mazurczyk - Steganografia w telefonii IP / Steganography in IP telephony - rozprawa doktorska / PhD thesis pod kierunkiem prof. Jozefa Lubacza, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Listopad 2009
W. Mazurczyk - Bezpieczeństwo i współpraca protokołów sygnalizacyjnych VoIP - praca dyplomowa magisterska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Czerwiec 2004
W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - praca dyplomowa inżynierska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2003
Awards and scholarships
W. Mazurczyk, - Polish Prime Minister's Award for Scientific Achievements (12.2023), Warsaw, Poland
W. Mazurczyk, K. Cabaj, M. Gregorczyk, P. Nowakowski, P. Zorawski - First degree Rector's Award for Scientific Achievements for Research Team in 2020/2021 (10.2022), Warsaw University of Technology, Poland
W. Mazurczyk - Second-degree Individual Rector's Award for Scientific Achievements 2018/2019 (10.2020), Warsaw University of Technology, Poland
Researcher Travel Scholarship in the Bekker Programme (06-09.2018), Polish National Agency for Academic Exchange (Narodowa Agencja Wymiany Akademickiej, NAWA), November 2018, Poland
W. Mazurczyk - First-degree Individual Rector's Award for Scientific Achievements 2016/2017 (10.2018), Warsaw University of Technology, Poland
W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2012/2013 (10.2014), Warsaw University of Technology, Poland
W. Mazurczyk - Researcher Travel Scholarship (06-07.2014), Center for Advanced Studies Warsaw University of Technology, December 2013, Poland
W. Mazurczyk - Polish Minister Of Science and Higher Education Scholarship for Outstanding Young Researchers (2013-2015), November 2012, Warsaw, Poland
W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2009/2010 (10.2011), Warsaw University of Technology, Poland
W. Mazurczyk - Polish Prime Minister's Award for PhD Thesis, November 2010, Warsaw, Poland
W. Mazurczyk - Young Researcher Scholarship (2011-2012), Center for Advanced Studies Warsaw University of Technology, December 2010, Poland
W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2007/2008 (10.2009), Warsaw University of Technology, Poland
W. Mazurczyk - ACM SIGCOMM Student Travel Grant (08.2009) - funded by supporting organizations of ACM SIGCOMM 2009, Barcelona, Spain
W. Mazurczyk - Mazovia PhD Scholarship (2008-2009) - funded by Mazovia Voivodeship, Polish Goverment
Grants and projects
J. Keller (kier.) - Stego-Malware Communication Fingerprinting (StegoMaCoFi) (2023-2024) - a project funded by the German Ministry of Education and Research (BMBF) (role: Senior Researcher) [NEW]
J. Keller (kier.) - Intelligent Monitoring and Countermeasures of Stego Malware and Ransomware (IMACOSAR) (2021-2022) - a project funded by the German Ministry of Education and Research (BMBF) (role: Senior Researcher)
W. Mazurczyk (kier.) - Integrated Technological and Information Platform for wildfire Management (SILVANUS) (2021-2025) - funded by EU (role: Principal Investigator at WUT)
W. Mazurczyk (kier.) - DISSIMILAR: Detection of fake newS on SocIal MedIa pLAtfoRms (2021-2024) - funded by National Centre for Research and Development under the EIG CONCERT-Japan Programme framework (role: Principal Investigator at WUT)
M. Choras (kier.) - Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware (SIMARGL) (2019-2022) - funded by EU (role: Senior Researcher)
W. Mazurczyk (kier.) - IoRL (Internet of Radio Light) (2017-2020) - H2020 project funded by EU (role: Principal Investigator)
K. Cabaj (kier.) - CoCoDe: Covert Communication Detection (2017-2020) - R&D project funded by US Air Force Office of Scientific Research, contract No. FA9550-17-1-0254 (role: co-PI at WUT)
J. Battala (kier.) - 5G@PL: Deployment of 5G network in Polish market (2018-2020) - funded by National Centre for Research and Development under the Gospostrateg Programme framework, Contract no. 1/383021/19/NCBR/2018 (role: Senior Researcher)
J. Keller (kier.) - Detection and countermeasures against information hiding-based malware (DeCoIMa) (2017-2019) - a project funded by German Ministry of Education and Research (BMBF) (role: Senior Researcher)
J. Keller (kier.) - International Virtual Lab on Information Security (IVLIS) (2017-2018) - a project funded by FernUniversitaet within Foerderprogamm Innovative Lehre (FILeh) (role: Senior researcher)
F. Solano (kier.), W. Mazurczyk - microMole: Sewage Monitoring System for Tracking Synthetic Drug Laboratories (2015-2018) - H2020 project funded by EU (role: Senior researcher)
K. Szczypiorski (kier.), W. Mazurczyk - MobiTraff: Cooperative Way to Mobility and Traffic Efficiency (2013-2015) - funded by National Centre for Research (Poland) and Development and Fonds National de la Recherche (Luxembourg) - POLLUX programm (role: Senior researcher)
W. Mazurczyk, K. Szczypiorski - New Network Anomaly Detection Method (12.2011-12.2014) - funded by National Science Centre (role: PI)
W. Mazurczyk, K. Szczypiorski - Steganographic Methods for IP Networks (01.2012-01.2014) - funded by Polish Ministry of Science and Higher Education (role: PI)
W. Mazurczyk - Methods for Information Hiding in Network Traffic: Analysis and Detection (2012) - funded by Warsaw University of Technology (role: PI)
W. Mazurczyk, K. Szczypiorski - Methods for Network Steganography Detection in IP Networks (12.2010-12.2011) - funded by Polish Ministry of Science and Higher Education (role: PI)
W. Mazurczyk - New Methods for Information Hiding in Telecommunication Network (2011) - funded by Warsaw University of Technology (role: PI)
J. Lubacz (kier.), K. Szczypiorski, W. Mazurczyk - Methods and Evaluation Environment of Network Steganography (2009-2011) - funded by Polish Ministry of Science and Higher Education (role: researcher)
K. Szczypiorski (kier.), W. Mazurczyk - Prosense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers: Towards Pervasive Networking of WBC and the EU (2008-2010) funded by EU - FP7 (role: Researcher)
K. Szczypiorski (kier.), M. Pioro, W. Mazurczyk - Detecting Frauds in 2G/3G Networks (2008-2009) - funded by Polska Telefonia Cyfrowa - PTC
Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Quality of Experience and User Behaviour Modelling for Web Traffic (QoEWeb) - FP7 - EuroNF, Network of Excellence (2008-2009)
J. Lubacz (kier.), W. Mazurczyk - Steganografia w telefonii IP - Supervisor (research) grant funded by Polish Goverment (2008-2009)
Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Design and Evaluation of End-to-End Quality and Security (SecMon) - FP6 - EuroFGI - Design and Engineering of the Next Generation Internet, Network of Excellence (2007-2008)
K. Szczypiorski(kier.), I. Margasiński, W. Mazurczyk - Trusted Communication Platform for Multi-Agent Systems (TrustMAS), (01.2007-12.2007) - Contract No. N62558-07-P-0042 funded by European Research Office of US Army (also supported by European Office of Aerospace Research and Development of US Air Force)
K. Szczypiorski (kier.), W. Mazurczyk, K. Cabaj, S. Strzelak - Ochrona danych w sieciach WiMAX - Warszawa, listopad 2006, Instytut Telekomunikacji PW na zlecenie Instytutu Łacznosci w ramach Programu Wieloletniego - "Rozwój Telekomunikacji i Poczty w Dobie Społeczeństwa Informacyjnego", pazdziernik 2006
W. Mazurczyk - Nowoczesne systemy komunikacji głosowej: VoIP, opracowanie na zlecenie NextiraOne, sierpień 2006
Advanced network steganographic systems - stegano.net