Selected papers


Books

  1. A. Abd El-Latif, M. Adel Hammad, Y. Maleh, B. Gupta, W. Mazurczyk (Eds.) - Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications, IET, DOI: 10.1049/PBSE020E, 2023 [ORDER]
  2. D. Megias, W. Mazurczyk, M. Kuribayashi (Eds.) - Data Hiding and Its Applications: Digital Watermarking and Steganography, MDPI, https://doi.org/10.3390/books978-3-0365-2937-0, January 2022 [ORDER]
  3. A. Abd El-Latif, B. Abd-El-Atty, S. Venegas-Andraca, W. Mazurczyk, B. Gupta - Security and Privacy Preserving for IoT and 5G Networks, Springer International Publishing, DOI: 10.1007/978-3-030-85428-7, 2022 [ORDER]
  4. E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk - Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications, Institution of Engineering and Technology (IET), March 2019, ISBN: 978-1-78561-638-9 [ORDER]
  5. W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, K. Szczypiorski - Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures, IEEE Press Series on Information and Communication Networks Security, IEEE Press-Wiley, April 2016, ISBN-10: 1118861698 [ORDER]
  6. Z. Yan, R. Molva, W. Mazurczyk, R. Kantola (Eds.) - Network and System Security, 11th International Conference on Network and System Security Proceedings (NSS 2017), Helsinki, Finland, August 21-23, 2017, DOI: 10.1007/978-3-319-64701-2

Work in progress or submitted

  1. R. Seo, M. Kuribayashi, A. Ura, W. Mazurczyk, D. Megias - Toward Universal Detector for Synthesized Images by Estimating Generative AI Models (submitted)
  2. P. Szary, W. Mazurczyk, L. Caviglione - A Survey on Cybersecurity Threats in Industrial and Information Technology Environments: Advancements and Resilience Through Network Steganographic Techniques (submitted)
  3. P. Rajba, J. Keller, W. Mazurczyk - Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios (submitted)
  4. A. Brodzik, W. Mazurczyk - Assessing the Threat of Neural Network Enhanced Obfuscation in Malware (submitted)
  5. P. Rajba, J. Keller, W. Mazurczyk - Double Proof-of-Work Scheme for Key Transfer in Steganographic Communication (submitted)
  6. A. Malanowska, A. Rosales, M. Kowalczyk, D. Blanche-Tarrago, K. Cabaj, D. Megias, M. Kuribayashi, T. Koohpayeh Araghi, W. Mazurczyk - Cultural perspectives in UX design: Investigating user understanding in a fake news detection platform (submitted)
  7. M. T. Ahvanooey, W. Mazurczyk, D. Lee - Science, Deepfake Socio-Economic Threats, and the Role of Cyber-Wellness Education (submitted)
  8. S. Wendzel, L. Caviglione, A. Houmansadr, W. Mazurczyk - We Belong Together: Concealment and Circumvention Research Share Common Ground (submitted)
  9. M. T. Ahvanooey, W. Mazurczyk, L. Caviglione, K. R. Choo - Blockchain-based Authentication Schemes for IoT Environment: Cybersecurity Challenges and Opportunities (submitted)

Journal papers - accepted or published

    (in JCR list)
  1. D. Kolasa, K. Pilch, W. Mazurczyk - Detecting Malicious Clients in Federated Learning Using Weights Comparison, SoftwareX, Vol. 27, September 2024, 101765, DOI: https://doi.org/10.1016/j.softx.2024.101765 [NEW]
  2. A. Malanowska, W. Mazurczyk, T. Araghi, D. Megias, M. Kuribayashi - Digital watermarking - a meta-survey and techniques for fake news detection, IEEE Access, 2024, pp. 1-35, DOI: 10.1109/ACCESS.2024.3374201 [NEW]
  3. K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk - Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security applications in IoT environments, Computer Networks, Volume 242, April 2024, 110252, DOI: 10.1016/j.comnet.2024.110252 [NEW]
  4. W. Mazurczyk, D. Lee, A. Vlachos - Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective, Communications of the ACM, Volume 67, Issue 3, pp 36-39, DOI: 10.1145/3624721, March 2024 [NEW]
  5. L. Caviglione, W. Mazurczyk - You Can't Do That On Protocols Anymore: Analysis of Covert Channels in IETF Standards, IEEE Network, 2024, DOI: 10.1109/MNET.2024.3352411 [NEW]
  6. R. Kozik, W. Mazurczyk, K. Cabaj, A. Pawlicka, M. Pawlicki, M. Choras - Deep Learning for Combating Misinformation in Multicategorical Text Content, Sensors 2023, 23, 9666, DOI: 10.3390/s23249666
  7. A. Kuzdralinski, M. Miskiewicz, H. Szczerba, W. Mazurczyk, J. Nivala, B. Ksiezopolski - Unlocking the Potential of DNA-Based Tagging: Current Market Solutions and Expanding Horizons, Nature Communications, volume 14, Article number: 6052, 2023
  8. P. Zorawski, L. Caviglione, W. Mazurczyk - A Long-term Perspective of the Internet Traffic Vulnerability to Covert Channels, IEEE Communications, Volume: 61, Issue: 10, October 2023, DOI: 10.1109/MCOM.011.2200744
  9. R. Kozik, A. Pawlicka, M. Pawlicki, M. Choras, W. Mazurczyk, K. Cabaj- A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods", IEEE Transactions on Computational Social Systems, DOI: 10.1109/TCSS.2023.3296627
  10. C. Sun, H. Tian, W. Mazurczyk, C. Chang, H. Quan, Y. Chen - Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning, Computers and Electrical Engineering, Volume 111, Part A, 2023, https://doi.org/10.1016/j.compeleceng.2023.108909
  11. H. Tian, H. Wang, H. Quan, W. Mazurczyk, C. Chang - FedSpy: A Secure Collaborative Speech Steganalysis Framework Based on Federated Learning, Electronics 2023, 12, 2854. https://doi.org/10.3390/electronics12132854
  12. M. Kowalski, W.Mazurczyk - Toward the mutual routing security in wide area networks a scoping review of current threats and countermeasures, Computer Networks, Vol. 230, July 2023, 109778
  13. M. T. Ahvanooey, X. Zhu, S. Ou, H. D. Mazraeh, W. Mazurczyk, K. R. Choo, C. Li - AFPr-AM: A Novel Fuzzy-AHP based Privacy Risk Assessment Model For Strategic Information Management of Social Media Platforms, Computers & Security, Vol. 130, July 2023, 103263
  14. S. Wendzel, L. Caviglione, W. Mazurczyk - Avoiding Research Tribal Wars Using Taxonomies, IEEE Computer magazine, Vol. 56(1), 2022
  15. H. Tian, Y. Qiu, W. Mazurczyk, H. Li, Z. Qian - STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Voice-over-IP Streams, IEEE/ACM Transactions on Audio, Speech and Language Processing, 2022, DOI: 10.1109/TASLP.2022.3224295
  16. M. T. Ahvanooey, X. Zhu, W. Mazurczyk, Q. Li, M. Kilger, K. R. Choo, M. Conti - CovertSYS: A Systematic Covert Communication Approach for Providing Perfectly Secure End-to-End Conversation via Social Networks, Journal of Information Security and Applications, Vol. 71, 2022, DOI: https://doi.org/10.1016/j.jisa.2022.103368
  17. C. Sun, H. Tian, W. Mazurczyk, C. Chang, Y. Cai, Y. Chen Towards blind detection of steganography in low-bit-rate speech streams - International Journal of Intelligent Systems, Wiley, 2022, 1- 28. DOI:10.1002/int.23077
  18. L. Caviglione, W. Mazurczyk - Never Mind The Malware, Here's The Stegomalware - IEEE S&P magazine, Volume 20, Issue 5, 2022, DOI: 10.1109/MSEC.2022.3178205
  19. Y. Qiu, H. Tian, L. Tang, W. Mazurczyk, C. Chang, Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords, Journal of Information Security and Applications, Vol. 68, August 2022, 103250, DOI: 10.1016/j.jisa.2022.103250
  20. A. Schaffhauser, W. Mazurczyk, M. Zuppelli, L. Caviglione, J-H. Castro - Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images, Security and Communication Networks, 2022
  21. M. Zuppelli, M. Repetto, A. Schaffhauser, W. Mazurczyk, L. Caviglione - Code Layering for the Detection of Network Covert Channels in Agentless Systems, IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2022.3176752, 2022
  22. P. Szary, W. Mazurczyk, S. Wendzel, L. Caviglione - Analysis of Reversible Network Covert Channels - IEEE Access, 2022, DOI: 10.1109/ACCESS.2022.3168018
  23. D. Megias, M. Kuribayashi, A. Rosales, K. Cabaj, W. Mazurczyk - Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 13, Number 1, pp. 33-55, March 2022, DOI:10.22667/JOWUA.2022.03.31.033
  24. L. Caviglione, A. Schaffhauser, M. Zuppelli, W. Mazurczyk - IPv6CC: IPv6 Covert Channels for Testing Networks Against Stegomalware and Data Exfiltration, SoftwareX journal, Elsevier, Volume 17, January 2022, no. 100975, DOI: 10.1016/j.softx.2022.100975
  25. M. T. Ahvanooey, X. Zhu, Q. Li, W. Mazurczyk, K. R. Choo, B. B. Gupta, M. Conti - Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey, IEEE Internet of Things Journal, 2022, DOI: 10.1109/JIOT.2021.3138073
  26. M. T. Ahvanooey, X. Zhu, W. Mazurczyk, M. Bendechache - Information Hiding in Digital Textual Contents: Techniques, and Current Challenges, IEEE Computer magazine, vol. 55, no. 6, pp. 56-65, June 2022, DOI: 10.1109/MC.2021.3113922.
  27. M. T. Ahvanooey, X. Zhu, W. Mazurczyk, K. R. Choo, M. Conti, J. Zhang - Misinformation Detection on Social Media: Challenges and The Road Ahead, IEEE IT Professional Magazine, Volume: 24, Issue: 1, Jan.-Feb. 1 2022, pp. 34-40, DOI: 10.1109/MITP.2021.3120876
  28. P. Rajba, W. Mazurczyk- Information Hiding using Minification, IEEE Access, vol. 9, pp. 66436 - 66449, 2021, doi: 10.1109/ACCESS.2021.3077197
  29. S. Nowaczewski, W. Mazurczyk - Improving Security of Future Networks Using Enhanced Customer Edge Switching and Risk-Based Analysis, Electronics, MDPI, 10(9), 1107; https://doi.org/10.3390/electronics10091107, 2021
  30. G. Siewruk, W. Mazurczyk - Context-Aware Software Vulnerabilities Classification using Machine Learning, IEEE Access, vol. 9, pp. 88852 - 88867, 2021, DOI: 10.1109/ACCESS.2021.3075385
  31. P. Bialczak, W. Mazurczyk - Fingerprinting malware HTTP communication, Entropy 2021, 23(5), 507; https://doi.org/10.3390/e23050507
  32. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 12, Number 1, March 2021 , pp. 44-63, DOI:10.22667/JOWUA.2021.03.31.044
  33. L. Caviglione, W. Mazurczyk, M. Repetto, A. Schaffhauser, M. Zuppelli - Kernel-level Tracing for Detecting Stegomalware and Covert Channels, Computer Networks, https://doi.org/10.1016/j.comnet.2021.108010, 2021
  34. W. Mazurczyk, L. Caviglione - Cyber Reconnaissance Techniques - Communications of the ACM, March 2021, Vol. 64 No. 3, Pages 86-95, DOI: 10.1145/3418293
  35. D. Shi, X. Zhang, L. Shi, A. Vladimirescu, W. Mazurczyk, K. Cabaj, B. Meunier, K. Ali, J. Cosmas, H. Zhang, Y. Zhang - On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method, MDPI, Sensors 2021, 21(4), 1515; https://doi.org/10.3390/s21041515, 2021
  36. A. Velinov, A. Mileva, L. Hartmann, S. Wendzel, W. Mazurczyk - Comprehensive Analysis of MQTT 5.0 Susceptibility to Network Covert Channels, Computers & Security, Elsevier, Volume 104, May 2021, DOI: https://doi.org/10.1016/j.cose.2021.102207
  37. L. Caviglione, M. Choras, I. Corona, A.Janicki, W. Mazurczyk, M. Pawlicki, K. Wasilewska - Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection, IEEE Access, vol. 9, pp. 5371-5396, 2021, doi: 10.1109/ACCESS.2020.3048319
  38. K. Cabaj, P. Zorawski, P. Nowakowski, M. Purski, W. Mazurczyk - Efficient Distributed Network Covert Channels for Internet of Things Environments, Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa018, https://doi.org/10.1093/cybsec/tyaa018
  39. S. Nowaczewski, W. Mazurczyk - Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), September 2020, DOI: DOI:10.22667/JOWUA.2020.09.30.087
  40. P. Bialczak, W. Mazurczyk - Characterizing Anomalies in Malware-generated HTTP Traffic, Security and Communication Networks, vol. 2020, Article ID 8848863, 26 pages, 2020. https://doi.org/10.1155/2020/8848863
  41. M. Gregorczyk, P. Zorawski, P. Nowakowski, K. Cabaj, W. Mazurczyk - Sniffing Detection Based on Traffic Probing and Machine Learning, IEEE Access, 2020, DOI: 10.1109/ACCESS.2020.3016076
  42. P. Laka, Z. Korzeb, W. Mazurczyk - Novel user authentication method based on body composition analysis - Annals of Telecommunications, 2020, https://doi.org/10.1007/s12243-020-00779-y
  43. W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, K. Cabaj - Challenges and Novel Solutions for 5G Network Security, Privacy and Trust - IEEE Wireless Communications, vol. 27, no. 4, pp. 6-7, August 2020, doi: 10.1109/MWC.2020.9170261
  44. A. El-Latif, B. Abd-El-Atty, S. Venegas-Andraca, H. Elwahsh, MD. Jalil Piran, A. K. Bashir, O. Song, W. Mazurczyk - Providing End-to-End Security Using Quantum Walks in IoT Networks, IEEE Access, Vol. 8, 2020, pp. 92687-92696, DOI: 10.1109/ACCESS.2020.2992820
  45. J. Saenger, W. Mazurczyk, J. Keller, L. Caviglione - VoIP network covert channels to enhance privacy and information sharing, Future Generation Computer Systems, Vol. 111, October 2020, pp. 96-106, DOI: 10.1016/j.future.2020.04.032
  46. A. EL-Latif, B. Abd-El-Attya, W. Mazurczyk, C. Fung, S. Venegas-Andraca - Secure data encryption based on quantum walks for 5G Internet of Things scenario, IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2020.2969863, Vol. 17 , Iss.: 1, March 2020, pp. 118-131
  47. W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, K. Cabaj - Special issue on Advancements in 5G Networks Security - Future Generation Computer Systems, September 2020, Vol. 110, pp. 314-316, DOI:10.1016/j.future.2020.04.043
  48. M. Skowron, A. Janicki, W. Mazurczyk - Traffic Fingerprinting Attacks on the Internet of Things using Machine Learning, IEEE Access, Vol. 8, 2020, pp. 20386-20400, DOI: 10.1109/ACCESS.2020.2969015
  49. S. Wendzel, F. Link, D. Eller, W. Mazurczyk - Detection of Size Modulation Covert Channels, Journal of Universal Computer Science, Volume 25 / Issue 11, p. 1396-1416, 2019
  50. J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec - Cyberattack Detection and Response, Journal of Universal Computer Science, Volume 25 / Issue 11, p. 1394-1395, 2019
  51. A. Velinov, A. Mileva, S. Wendzel, W. Mazurczyk - Covert Channels in MQTT-based Internet of Things, IEEE Access, 2019, DOI: 10.1109/ACCESS.2019.2951425
  52. Z. Lv, W. Mazurczyk, S. Wendzel, H. Song, Recent Advances in Cyber-Physical Security in Industrial Environments, IEEE Transactions on Industrial Informatics, 2019, DOI: 10.1109/TII.2019.2945971
  53. A. EL-Latif, B. Abd-El-Attya, S. Venegas-Andraca, W. Mazurczyk - Efficient quantum-based security protocols for information sharing and data protection in 5G Networks, Future Generation Computer Systems, Vol. 100, November 2019, pp. 893-906, DOI: https://doi.org/10.1016/j.future.2019.05.053
  54. A. Janicki, W. Mazurczyk, X. Luo, D. Ye, Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes - Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 25, No. 9, 2019, pp. 1039-1043
  55. N. Jawad, M. Salih, K. Ali, B. Meunier, Y. Zhang, X. Zhang, R. Zetik, C. Zarakovitis, H. Koumaras, M. Kourtis, L. Shi, W. Mazurczyk, J. Cosmas - Smart Television Services using NFV/SDN Network Management, IEEE Transactions on Broadcasting, 2019, DOI: 10.1109/TBC.2019.2898159
  56. W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics, part 2 - IEEE S&P magazine, Vol.: 17, Iss.: 1, Jan.-Feb. 2019, DOI: 10.1109/MSEC.2019.2896857
  57. K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - Network threats mitigation using Software-Defined Networking for the 5G Internet of Radio Light system, Security and Communication Networks, John Wiley & Sons, 2019, Vol. 2019, Article ID 4930908, 22 pages, DOI: 10.1155/2019/4930908
  58. K. Opasiak, W. Mazurczyk - (In)Secure Android Debugging, Computers & Security, Elsevier, Vol. 82, May 2019, pp. 80-98, DOI: 10.1016/j.cose.2018.12.010
  59. W. Mazurczyk, S. Wendzel, M. Chourib, J. Keller - Countering Network Covert Channels with Dynamic Wardens, Future Generation Computer Systems, 2019, DOI: 10.1016/j.future.2018.12.047
  60. S. Schmidt, W. Mazurczyk, R. Kulesza, J. Keller, L. Caviglione - Exploiting IP Telephony with Silence Suppression for Hidden Data Transfers, Computers & Security, Elsevier, Volume 79, November 2018, Pages 17-32
  61. J. Keller, I. Bernik, W. Mazurczyk - Technical and Social Aspects of Critical Infrastructure Security, Journal of Universal Computer Science (J. UCS), vol. 24, no. 5 (2018), 554-555, ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM
  62. P. Laka, W. Mazurczyk - User Perspective and Security of a New Mobile Authentication, Telecommunication Systems, November 2018, Volume 69, Issue 3, pp 365-379, DOI: 10.1007/s11235-018-0437-1
  63. K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander - The New Threats of Information Hiding: the Road Ahead, IEEE IT Professional, May/June 2018
  64. L. Caviglione, W. Mazurczyk, S. Wendzel, S. Zander - Emerging and Unconventional: New Attacks and Innovative Detection Techniques, Security and Communication Networks, Article ID 9672523, 2018, DOI:10.1155/2018/9672523
  65. W. Mazurczyk, S. Wendzel - Information Hiding: Challenges for Forensic Experts - Communications of the ACM, Vol. 61 No. 1, Pages 86-94, DOI: 10.1145/3158416
  66. K. Cabaj, M. Gregorczyk, W. Mazurczyk - Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics, Computers and Electrical Engineering, Vol. 66, pp. 353-368, DOI: 10.1016/j.compeleceng.2017.10.012, February 2018
  67. W. Mazurczyk, L. Caviglione, S. Wendzel - Recent advancements in digital forensics - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 10 - 11, Nov./Dec. 2017
  68. L. Caviglione, S. Wendzel, W. Mazurczyk - The Future of Digital Forensics: Challenges and the Road Ahead - IEEE S&P magazine, Vol. 15, Iss. 6, pp. 12 - 17, Nov./Dec. 2017, DOI: 10.1109/MSP.2017.4251117
  69. L. Caviglione, M. Podolski, W. Mazurczyk, M. Ianigro - Covert Channels in Personal Cloud Storage Services: the case of Dropbox, IEEE Transactions on Industrial Informatics, Vol. 13, Iss. 4, pp. 1921-1931, 2017 DOI: 10.1109/TII.2016.2627503
  70. W. Mazurczyk, M. Korczynski, K. Nakao, E. Kirda, C. Hesselman, K. Yoshioka - Traffic Measurements for Cyber Security - IEEE Communication Magazine, Vol. 55, Iss. 7, pp. 12-13, DOI: 10.1109/MCOM.2017.7981517, 2017
  71. S. Wendzel, W. Mazurczyk, S. Zander - A Unified Description for Network Information Hiding Methods, Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 22, No. 11, 2016, pp. 1456-1486
  72. K. Cabaj, W. Mazurczyk - Using Software-Defined Networking for Ransomware Mitigation: the Case of CryptoWall, IEEE Network, November/December 2016, DOI: 10.1109/MNET.2016.1600110NM, pp. 14-20
  73. T. Andrysiak, L. Saganowski, W. Mazurczyk - Network Anomaly Detection for Railway Critical Infrastructure based on Autoregressive Fractional Integrated Moving Average, EURASIP Journal on Wireless Communications and Networking, 2016, 2016(1), pp. 1-14, DOI: 10.1186/s13638-016-0744-8
  74. W. Mazurczyk, K. Szczypiorski, Z. Duric, D. Ye - Cyber Crime - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2861-2863, 2016, DOI: 10.1002/sec.1603
  75. W. Mazurczyk, S. Moore, E. W. Fulp, H. Wada, K. Leibnitz - Bio-inspired Cyber Security for Communications and Networking - IEEE Communication Magazine, pp. 120-121, June 2016
  76. M. Urbanski, W. Mazurczyk, J-F. Lalande, L. Caviglione - Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones - International Journal of Computer Systems Science and Engineering, Vol. 32 No. 2, March 2017
  77. L. Caviglione, M. Gaggero, J-F. Lalande, M. Urbanski, W. Mazurczyk - Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence - IEEE Transactions on Information Forensics and Security, Vol. 11, No. 4, pp. 799-810, April 2016
  78. M. Naumann, S. Wendzel, W. Mazurczyk, J. Keller - Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions - International Journal of Security and Communication Networks, John Wiley & Sons, Vol 9, Issue 15, pp. 2972-2985, 2016, DOI: 10.1002/sec.1500
  79. W. Mazurczyk, T. Holt, K. Szczypiorski - Guest Editors' Introduction: Special Issue on Cyber Crime - IEEE Transactions on Dependable and Secure Computing, Vol. 13, Iss. 2, March/April 2016, pp. 146-147, DOI: 10.1109/TDSC.2015.2502407
  80. W. Mazurczyk, K. Szczypiorski, A. Janicki, H. Tian - Trends in modern Information Hiding: techniques, applications, and detection - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1469, Vol. 9, Iss. 8, pp. 703-704, 2016
  81. W. Mazurczyk, M. Karas, K. Szczypiorski, A. Janicki - YouSkyde: Information Hiding for Skype Video Traffic - Multimedia Tools and Applications, 75(21), pp. 13521-13540, 2016, DOI: 10.1007/s11042-015-2740-0
  82. A. Janicki, W. Mazurczyk, K. Szczypiorski - On the Undetectability of Transcoding Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, DOI: 10.1002/sec.1301
  83. W. Mazurczyk, L. Caviglione - Information Hiding as a Challenge for Malware Detection - IEEE Security and Privacy Magazine, Issue 2, March/April 2015, pp. 89-93
  84. E. Rzeszutko, W. Mazurczyk - Insights from Nature for Cybersecurity - Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (now Health Security Journal), April 2015, Vol. 13, No. 2: 82-87
  85. L. Caviglione, W. Mazurczyk - Understanding Information Hiding in iOS - IEEE Computer Magazine, January 2015, Vol. 48, Iss. 1, pp. 62 - 65
  86. W. Mazurczyk, E. Rzeszutko - Security - a perpetual war: lessons from nature - IEEE IT Professional, vol. 17, no. 1, pp. 16-22, January/February 2015
  87. A. Janicki, W. Mazurczyk, K. Szczypiorski - Evaluation of Efficiency of Transcoding Steganography - Journal of Homeland Security and Emergency Management, 2015, DOI: 10.1515/jhsem-2014-0028
  88. W. Mazurczyk, L. Caviglione - Steganography in Modern Smartphones and Mitigation Techniques - IEEE Communications Surveys & Tutorials, Vol. 17, Iss. 1, pp. 334 - 357, 2014, DOI: 10.1109/COMST.2014.2350994
  89. W. Mazurczyk, S. Wendzel, I. Azagra Villares, K. Szczypiorski - On Importance of Steganographic Cost For Network Steganography - International Journal of Security and Communication Networks, John Wiley & Sons, DOI: 10.1002/sec.1085, 2016; Vol. 9, Iss. 8, pp. 781-790
  90. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography, IEEE Communication Magazine, vol. 52, no. 5, May 2014
  91. E. Zielinska, W. Mazurczyk, K. Szczypiorski - Trends in Steganography - Communications of the ACM, vol 57, No.2, March 2014, pp. 86-95
  92. W. Mazurczyk, K. Szczypiorski, J. Lubacz - The Spy Who Skyped Me - Four New Ways to Smuggle Messages Across the Internet, IEEE Spectrum, November 2013, p. 40-43
  93. W. Mazurczyk, K. Szczypiorski - Advances in digital media security and right management - Multimedia Systems Journal, DOI 10.1007/s00530-013-0339-8
  94. A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 449-460, DOI: 10.1007/s12243-013-0385-4
  95. W. Mazurczyk, K. Szczypiorski, H. Tian - Network forensics and challenges for cybersecurity - Annals of Telecommunications, Vol. 69, Iss. 7, 2014, pp. 345-346, DOI: 10.1007/s12243-014-0434-7
  96. W. Mazurczyk, P. Kopiczko - Understanding BitTorrent Through Real Measurements - China Communications, 2013 10 (11): 107-118, ISSN: 1673-5447
  97. W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony - Multimedia Tools and Applications, Volume 70, Issue 3, pp. 2139-2165, DOI: 10.1007/s11042-012-1224-8, June 2014
  98. W. Mazurczyk, M. Karas, K. Szczypiorski - SkyDe: a Skype-based Steganographic Method - International Journal of Computers, Communications & Control (IJCCC), ISSN: 1841- 9836, 8(3), June 2013, pp. 389-400
  99. W. Mazurczyk - VoIP Steganography and Its Detection - A Survey - ACM Computing Surveys, vol. 46, Issue. 2, November 2013
  100. A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography - Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 59, Iss. 3, pp. 305-3315, DOI 10.1007/s11235-014-9937-9, 2015
  101. W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography: Improving Hidden Communication in Networks - Journal of Universal Computer Science (J. UCS), ISSN: 0948-695X, Graz Univ Technology, Inst. Information Systems Computer Media-IICM, Vol. 18, No. 14, 2012, pp. 1967-1986
  102. W. Mazurczyk, K. Szczypiorski - Toward Effective and Reliable Digital Forensics - Computer Journal, Vol. 55, Iss. 6, Oxford University Press, June 2012, pp. 651-652
  103. W. Mazurczyk - Lost Audio Packets Steganography: A First Practical Evaluation - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Vol. 5, Iss. 12, pp. 1394-1403, December 2012
  104. W. Frączek, W. Mazurczyk, K. Szczypiorski - Hiding Information in Stream Control Transmission Protocol - Computer Communication Journal (ComCom), Elsevier, ISSN: 0140-3664, January 2012, 35 (2), pg. 159-169
  105. W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets - International Journal of Security and Communication Networks, John Wiley & Sons, doi: 10.1002/sec.388, ISSN: 1939-0114
  106. K. Szczypiorski, W. Mazurczyk - Steganography in IEEE 802.11 OFDM Symbols - International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Vol. 3:1-12, 2011
  107. B. Jankowski, W. Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 52, Issue 2, 2013, pp. 1101-1111, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  108. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - On Information Hiding in Retransmissions - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 52, Issue 2, 2013, pp. 1113-1121, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  109. W. Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays? - In: Multimedia Tools and Applications (published online 22.04.2010), ISSN: 1380-7501 (print version), ISSN: 1573-7721 (electronic version), Springer US, Journal no. 11042, Vol. 57, Issue 1, pp. 109-126, 2012
  110. W. Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method - In: Telecommunication Systems: Modelling, Analysis, Design and Management, 2010, Volume 45, Numbers 2-3, Pages 153-163, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  111. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Vice over IP (invited paper) In: IEEE Spectrum, ISSN: 0018-9235, February 2010, pp. 40-45
  112. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography and Its Detection In: Soft Computing, ISSN: 1432-7643 (print version) ISSN: 1433-7479 (electronic version), Journal no. 500 Springer, Vol. 15, Issue 3, p. 505-515, 2011
  113. W. Mazurczyk, K. Szczypiorski - Evaluation of Steganographic Methods for Oversized IP Packets In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 49, Issue 2 (2012), Page 207-217, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  114. K. Szczypiorski, W. Mazurczyk - Toward network steganography detection - In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 49, Issue 2 (2012), Page 161-162, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  115. T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, In: Telecommunication Systems: Modelling, Analysis, Design and Management, Volume 51: Issue 4, December 2012, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235
  116. G.F. Marias, J. Barros, M. Fiedler, R. Herkenhoener, A. Grillo, A. Lentini, L. Lima, C.Lorentzen, W. Mazurczyk, H. de Meer, P. Oliveira, G.C. Polyzos, E. Pujol, K.Szczypiorski, J.P. Vilela, T. Vinhoza - Security and Privacy Issues for the Network of the Future, International Journal of Security and Communication Networks, John Wiley & Sons, ISSN: 1939-0114, Volume 5, Issue 9, pages 987 1005, September 2012

Other journal papers

  1. K. Kaminski, W. Mazurczyk - RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook, International Journal of Electronics and Telecommunications, Vol. 69, No. 4, pp. 803-810, 2023, DOI: 10.24425/ijet.2023.147704 [NEW]
  2. A. Nilizadeh, S. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Adaptive Matrix Pattern Steganography on RGB Images, Journal of Cyber Security and Mobility (JCSM), Vol. 11, Iss. 1, River Publishers, 2022
  3. G. Siewruk, W. Mazurczyk, A. Karpinski - Security Assurance in DevOps Methodologies and Related Environments, International Journal of Electronics and Telecommunications, Vol. 65, NO. 2, PP. 211-216, 2019
  4. S. Wendzel, W. Mazurczyk, G. Haas - Steganography for Cyber Physical Systems, Journal of Cyber Security and Mobility (JCSM), Vol. 6(2), pp. 105-126, River Publishers, 2017
  5. S. Wendzel, L. Caviglione, W. Mazurczyk, J-F. Lalande - Network Information Hiding and Science 2.0: Can it be a Match?, International Journal of Electronics and Telecommunications, Vol. 63, No. 2, 2017, pp. 217-222
  6. W. Mazurczyk - Nature as an inspiration for the next-generation network defences, Journal of Cyber Security and Mobility, December 2016, DOI: 10.13052/popcas013
  7. W. Mazurczyk, P. Amann, L. Caviglione, S. Wendzel - CUIng: Criminal Use of Information Hiding Initiative, European CIIP Newsletter (ECN 25), Vol. 10, No. 3, November 16 - February 17, December 2016, pp. 31-32
  8. P. Łąka, D. Flaga, W. Mazurczyk - Bezpieczne uwierzytelnianie z wykorzystaniem urządzeń mobilnych - XXXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2016, Gliwice, September 2016, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2016
  9. B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - Journal of Advances in Computer Networks, Vol. 3, No. 2, June 2015, DOI: 10.7763/JACN.2015.V3.155
  10. W. Mazurczyk, K. Szczypiorski, J. Lubacz, A. Janicki, E. Rzeszutko - Ukrywanie informacji w ruchu telefonii IP - Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 2-3/2015
  11. P. Białczak, W. Mazurczyk - Multipleksacja kanału ukrytego jako sposob niejawnej transmisji grupowej - XXX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2014, Poznan, September 2014, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2014
  12. B. Lipiński, W. Mazurczyk, K. Szczypiorski - Steganografia w srodowisku chmury obliczeniowej - XXIX Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2013, Gdansk, 4-6 September 2013, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2013
  13. M. Gregorczyk, W. Mazurczyk, K. Szczypiorski - Wpływ steganografii sieciowej na opóznienia w telefonii IP - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 797-808
  14. W. Frączek, W. Mazurczyk, K. Szczypiorski - Sposoby głębokiego ukrywania w sieciach - XXVIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2012, Warszawa, 12-14 September 2012, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2012, str. 849-858
  15. W. Frączek, W. Mazurczyk, K. Szczypiorski - Zastosowania steganografii wielopoziomowej - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 783-788
  16. P. Białczak, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w Google Suggest - XXVII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2011, Łódz, 14-16 September 2011, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2011, str. 789-794
  17. K. Szczypiorski, W. Mazurczyk - Ukrywanie danych w symbolach OFDM w sieciach IEEE 802.11 - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wrocław, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1055-1064
  18. B. Jankowski, W. Mazurczyk, K. Szczypiorski - System steganograficzny oparty na niepoprawnym dopełnianiu ramek - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1035-1044
  19. W. Frączek, W. Mazurczyk, K. Szczypiorski - Ukrywanie informacji w protokole SCTP - XXVI Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2010, Wroclaw, 8-10 September 2010, Materiały: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2010, str. 1045-1054
  20. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganografia sieciowa, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 4/2010, ISSN 1230-3496, April 2010, nr 4/2010, str. 134-135
  21. M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznych (paper accepted to KSTiT 2009, published in Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 8-9/2009 pp. 819-823, ISSN 1230-3496, September 2009 (in Polish)
  22. K. Szczypiorski, I. Margasiński, W. Mazurczyk - Steganographic Routing in Multi Agent System Environment - Journal of Information Assurance and Security (JIAS), 04/2007, Dynamic Publishers Inc., USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010
  23. W. Mazurczyk, Z. Kotulski - Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security - Journal of Information Assurance and Security (JIAS), 04/2007, Dynamic Publishers Inc., USA, Volume 2, Issue 3, September 2007, pp. 226-234, ISSN 1554-1010
  24. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Bezpieczeństwo usługi VoIP opartej na systemie Asterisk, (paper accepted to KSTiT 2007), Przegląd Telekomunikacyjny 8-9/2007 pp. 646-655, ISSN 1230-3496, September 2007 (in Polish)
  25. W. Mazurczyk, Z. Kotulski - Lightweight security mechanism for PSTN-IP Telephony convergence - IJCSNS International Journal of Computer Science and Network Security, Communication Network & Security, vol.7, No.5, ISSN 1738-7906, May 2007

Book chapters

  1. K. Cabaj, L. Caviglione, J. Keller, W. Mazurczyk, A. Schaffhauser - Teaching Cyber Security through Distance Learning with International Students, "Innovation in Cybersecurity Education", Springer Nature, Editors: Kevin Daimi and Guillermo Francia, 2020
  2. L. Caviglione, W. Mazurczyk, S. Wendzel - Advanced Information Hiding Techniques for Modern Botnets, in: G. Kambourakis et al. (Eds.): Botnets: Architectures, Countermeasures, and Challenges, CRC Series in Security, Privacy and Trust, Taylor & Francis, October 2019
  3. E. Rzeszutko, W. Mazurczyk - Nature-inspired analogies and metaphors for cyber security, In: Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques, and Applications<, E. M. El-Alfy, M. Eltoweissy, E. Fulp, W. Mazurczyk (Eds.), Institution of Engineering and Technology (IET), March 2019
  4. L. Caviglione, M. Gaggero, J-F Lalande, W. Mazurczyk - Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data, M. Migliardi, A. Merlo, B. S. Al-Haj (Eds.), Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, August 2017, ISBN: 9780128046036
  5. W. Mazurczyk, S. Drobniak, S. Moore - Towards a Systematic View on Cybersecurity Ecology, B. Akhgar and B. Brewster (eds.), Combatting Cybercrime and Cyberterrorism, Advanced Sciences and Technologies for Security Applications, Springer, DOI: 10.1007/978-3-319-38930-1, June 2016, pp. 17-37
  6. W. Mazurczyk, L. Caviglione - Chapter 4 - Network Steganograpy In: S. Kaztenbeisser and F. Petitcolas (Eds.): Information Hiding - Techniques for Steganography and Digital Watermarking, Artech House, Edition 2, 2015
  7. L. Caviglione, J.-F. Lalande, W. Mazurczyk, S. Wendzel - Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, USA, Lecture Notes in Computer Science (LNCS), Springer, Vol. 9190, pp. 165-177, July 2015
  8. W. Mazurczyk, K. Szczypiorski - Steganography of VoIP Streams In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1001-1018
  9. K. Szczypiorski, I. Margasiński, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008, pp. 1019-1035
  10. W. Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Hamid Jahankhani, Kenneth Revett, and Dominic Palmer-Brown (Eds.): ICGeS 2008 - Communications in Computer and Information Science (CCIS) 12, Springer Verlag Berlin Heidelberg, Proc. of 4th International Conference on Global E-security 2008, London, United Kingdom, 23-25 June 2008, pp. 65-72
  11. T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System, 7th International Conference on Computer Science - Research and Applications (IBIZA 2008), Poland, Kazimierz Dolny 31.01 - 2.02 2008, Published in Annales UMCS, Informatica, AI 8 (2008), pp. 186-201
  12. W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security (extended version), In: Jerzy Pejas, Khalid Saeed (Eds.) - Advances in Information Processing and Protection, Science+Business Media Inc. Springer, ISBN: 978-0-387-73136-0, August 2007
  13. W. Mazurczyk, Z. Kotulski - New VoIP traffic security scheme with digital watermarking - In Proceedings of The 25-th International Conference on Computer Safety, Reliability and Security SafeComp 2006, Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer-Verlag, Heidelberg 2006, ISBN 978-3-540-45762-6
  14. W. Mazurczyk, Z. Kotulski - New security and control protocol for VoIP based on steganography and digital watermarking - 5th International Conference on Computer Science - Research and Applications (IBIZA 2006), Poland, Kazimierz Dolny 9-11 February 2006, Published in Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360

Conference papers

  1. K. Hoelk, W. Mazurczyk, M. Zuppelli, W. Mazurczyk - Investigating HTTP Covert Channels Through Fuzz Testing, Proc. of the 19th International Conference on Availability, Reliability and Security (ARES 2024), July 2024 [NEW]
  2. K. Cabaj, M. Kowalczyk, M. Gregorczyk, M. Choras, R. Kozik, W. Mazurczyk - Strategies to Use Harvesters in Trustworthy Fake News Detection Systems, In Proc. of 16th International Conference on Computational Collective Intelligence (ICCCI 2024), 9-11 September 2024, Leipzig, Germany [NEW]
  3. K. Kamieniarz, W. Mazurczyk - A Comparative Study on the Security of Kubernetes Deployments, In Proc. of 20th International Wireless Communications & Mobile Computing Conference (IWCMC 2024), Ayia Napa, Cyprus, 27-31 May 2024 [NEW]
  4. L. Pietraszek, W. Mazurczyk - A Research Environment for Evaluating File-based Cryptojacking Detection Techniques, In Proc. of 20th International Wireless Communications & Mobile Computing Conference (IWCMC 2024), Ayia Napa, Cyprus, 27-31 May 2024 [NEW]
  5. T. Koohpayeh Araghi, D. Megias, V. Garcia-Font, M. Kuribayashi, W. Mazurczyk - Disinformation detection and source tracking using semi-fragile watermarking and blockchain, In Proc. of In Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2024), Xanthi, Greece, 5-6 June 2024 [NEW]
  6. P. Bialczak, W. Mazurczyk - Malware classification using Open Set Recognition and HTTP protocol requests, In Proc. of 28th European Symposium on Research in Computer Security (ESORICS 2023), Lecture Notes in Computer Science, vol. 14345, Springer, DOI: 10.1007/978-3-031-51476-0_12, The Hague, The Netherlands, 25-29 September 2023
  7. R. Kozik, W. Mazurczyk, K. Cabaj, A. Pawlicka, M. Pawlicki, M. Choras - Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models, In Proc. of 10th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2023), Thessaloniki, Greece, 9-13 October 2023, DOI: 10.1109/DSAA60987.2023.10302543
  8. N. Orzechowski, K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk, N. Leligou, M. Przybyszewski, R. Kozik, M. Choras - Security Architecture in the SILVANUS project, In Proc. of Emerging Network Security (ENS) Workshop, Proc. of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August - 1 September 2023
  9. P. Rajba, J. Keller, W. Mazurczyk - Proof-of-work based new encoding scheme for information hiding purposes, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August - 1 September 2023
  10. K. Rzepka, P. Szary, K. Cabaj, W. Mazurczyk - Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  11. P. Rajba, W. Mazurczyk - Limitations of Web Cryptojacking Detection: A Practical Evaluation, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  12. L. Caviglione, M. Grabowski, K. Gutberlet, A. Marzecki, M. Zuppelli, A. Schaffhauser, W. Mazurczyk - Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  13. M. Kowalczyk, A. Malanowska, W. Mazurczyk, K. Cabaj - Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection, In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 2022
  14. M. T. Ahvanooey, M. X. Zhu, W. Mazurczyk, M. Kilger, K-K. R. Choo - Do Dark Web and Cryptocurrencies Empower Cybercriminals?, In: Gladyshev, P., Goel, S., James, J., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 441. Springer, Cham. https://doi.org/10.1007/978-3-031-06365-7_17, December 7-9, 2021, Singapore
  15. J. Hospital, D. Megias, W. Mazurczyk - Retransmission steganography in real-world scenarios: a practical study, In Proc. of European Interdisciplinary Cybersecurity Conference (EICC), Virtual, November 2021, pp. 60-65, DOI: 10.1145/3487405.3487659
  16. M. Chourib, S. Wendzel, W. Mazurczyk - Adaptive Warden Strategy for Countering Network Covert Storage Channels, In Proc. of 46nd IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021
  17. S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann, C. Kraetzer, K. Lamshoeft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert - A Revised Taxonomy of Steganography Embedding Patterns - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  18. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  19. P. Rajba, W. Mazurczyk - Data Hiding Using Code Obfuscation - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  20. D. Megias, M. Kuribayashi, A. Rosales, W. Mazurczyk - DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning - Criminal Use of Information Hiding (CUING) Workshop, In Proc. of the 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17-20, 2021
  21. M. Gregorczyk, W. Mazurczyk - Inferring Flow Table State through Active Fingerprinting in SDN Environments, 18th International Conference on Security and Cryptography (SECRYPT 2021), July 2021
  22. L. Caviglione, M. Zuppelli, W. Mazurczyk, A. Schaffhauser, M. Repetto - Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label - In Proc. of the 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), June 2021
  23. C. Heinz, W. Mazurczyk, L. Caviglione - Covert Channels in Transport Layer Security - In Proc. of European Interdisciplinary Cybersecurity Conference (EICC 2020), Rennes, France, November 2020
  24. P. Rajba, W.Mazurczyk - Exploiting Minification for Data Hiding Purposes - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  25. P. Nowakowski, P. Zorawski, K. Cabaj, M. Gregorczyk, M. Purski, W. Mazurczyk - Distributed Packet Inspection for Network Security Purposes in Software-Defined Networking Environments - In Proc. of 5G Networks security (5G-NS) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  26. P. Szary, W. Mazurczyk, S. Wendzel, L. Caviglione - Design and Performance Evaluation of Reversible Network Covert Channels - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  27. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Network Covert Channels Detection using Data Mining and Hierarchical Organisation of Frequent Sets: an Initial Study - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, Proc. of the 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2020
  28. J. Cosmas, M. Gregorczyk, W. Mazurczyk, K. Cabaj, et al. - Network and Application Layer Services for High Performance Communications in Buildings, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB 2020), Paris, France, June 2-5 2020
  29. P. Nowakowski, P. Zorawski, K. Cabaj, W. Mazurczyk - Securing Modern Network Architectures with Software Defined Networking, In Proc. of 2019 International Conference on Computational Science and Computational Intelligence, December 05-07, 2019, Las Vegas, USA
  30. W. Mazurczyk, K. Powojski, L. Caviglione - IPv6 Covert Channels in the Wild - In Proc. of Central European Cybersecurity Conference (CECC 2019), Munich, Germany, November 2019
  31. W. Mazurczyk, P. Szary, S. Wendzel, L. Caviglione - Towards Reversible Storage Network Covert Channels - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
  32. K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches, - In Proc. of 5G Network Security (5G-NS 2019) workshop, ARES 2019 Proceedings of the 14th International Conference on Availability, Reliability and Security, August 2019
  33. K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
  34. T. Schmidbauer, S. Wendzel, A. Mileva, W. Mazurczyk - Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2019
  35. M. Skwarek, M. Korczynski, W. Mazurczyk, A. Duda - Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning - In Proc. of 4th Workshop on Traffic Measurements in Cybersecurity (WTMC 2019) co-located with 40th IEEE Security & Privacy 2019 (IEEE S&P) conference, May 2019, San Diego, USA
  36. U. Rauf, M. Mohsin, W. Mazurczyk - Cyber Regulatory Networks: Towards A Bio-inspired Auto-resilient Framework for Cyber-Defense - In Proc. of 11th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT 2019), March 13-14, 2019, Pittsburgh, United States
  37. J-F Lalande, V. Viet Triem Tong, P. Graux, G. Hiet, W. Mazurczyk, H. Chaoui, P. Berthome - Teaching Android Mobile Security - In Proc. of 50th ACM Technical Symposium on Computer Science Education, February 27 - March 2, 2019, Minneapolis, USA
  38. S. Wendzel, D. Eller, W. Mazurczyk - One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels - In Proc. of Central European Cybersecurity Conference (CECC 2018), Ljubljana, Slovenia, 15-16 November 2018
  39. K. Cabaj, M. Gregorczyk, W. Mazurczyk, P. Nowakowski, P. Zorawski - SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System - In Proc. of 5G Network Security (5G-NS 2018) workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  40. A. Tundis, W. Mazurczyk, M. Muehlhaeuser - A Review of Network Vulnerabilities Scanning Tools: Types, Capabilities and Functioning - In Proc. of International Workshop on Organized Cybercrime, Cybersecurity and Terrorist Networks (IWOCCTN 2018), ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  41. K. Cabaj, W. Mazurczyk, P. Nowakowski, P. Zorawski - Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  42. D. Geisler, W. Mazurczyk, J. Keller - Towards Utilization of Covert Channels as a Green Networking Technique - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2018 conference
  43. W. Mazurczyk, S. Wendzel, K. Cabaj - Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach - In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security Article No. 65, August 2018
  44. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - A 5G Radio-Light SDN Architecture for Wireless and Mobile Network Access in Buildings - In Proc. of IEEE 5G World Forum, Santa Clara, California, USA, 9-11 July
  45. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - A Scaleable and License Free 5G Internet of Radio Light Architecture for Services in Train Stations - In Proc. of 24th European Wireless (EW 2018), Catania, Italy, 2-4 May 2018
  46. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - 5G Internet of Radio Light Services for Musee de la Carte a Jouer - In Proc. of 1st Global LiFi Congress, Paris, France, 8-9 February, 2018
  47. J. Cosmas, K. Cabaj, W. Mazurczyk, et. al. - 5G Internet of Radio Light Services for Supermarkets, 14th China International Forum on Solid State Lighting: International Forum on Wide Bandgap Semiconductors China (SSLChina: IFWS), Beijing, China, 2017, pp. 69-73, DOI: 10.1109/IFWS.2017.8245977
  48. F. Lehner, W. Mazurczyk, J. Keller, S. Wendzel - Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach - In Proc. of 42nd IEEE Conference on Local Computer Networks (LCN), October 9-12, 2017, Singapore, pp. 78-85
  49. S. Schmidt, W. Mazurczyk, J. Keller, L. Caviglione - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression - In Proc. of Criminal Use of Information Hiding (CUING) Workshop co-located with ARES 2017 conference
  50. A. Nilizadeh, W. Mazurczyk, C. Zou, G. T. Leavens - Information Hiding in RGB Images Using an Improved Matrix Pattern Approach - In Proc. of the Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2017), Honolulu, Hawaii, July 21, 2017
  51. S. Wendzel, W. Mazurczyk, G. Haas - Don't You Touch My Nuts: Information Hiding In Cyber-Physical Systems Using Smart Buildings - In Proc. of the Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2017) co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, USA, May 25, 2017
  52. S. Wendzel, W. Mazurczyk - An Educational Network Protocol for Covert Channel Analysis Using Patterns - In Proc. of ACM Conference on Computer and Communications Security (ACM CCS 2016), October 24-28, 2016, Vienna, Austria, pp. 1739-1741
  53. B. Lipiński, W. Mazurczyk, K. Szczypiorski, P. Smietanka - Towards Effective Security Framework for Vehicular Ad-hoc Networks - In Proc. of 5th International Conference on Networking and Information Technology (ICNIT 2014), November 21-23, 2014, Singapore
  54. S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier - Hidden and Uncontrolled On the Emergence of Network Steganography - In Proc. of ISSE 2014 Securing Electronic Business Processes, pp. 123-133, Springer Vieweg, 2014
  55. B. Lipinski, W. Mazurczyk, K. Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment - In Proc. of 3rd International Workshop on Cyber Crime (IWCC 2014) co-located with the 35th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Jose, USA, May 18
  56. M. Seredynski, R. Aggoune, W. Mazurczyk, K. Szczypiorski, D. Khadraoui - Vehicular Ad Hoc Networks for Join Traffic and Mobility Management - International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2013), Almaty, Kazakhstan, September 10-13, 2013
  57. P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In Proc. of 2nd International Workshop on Cyber Crime (IWCC 2013) co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013), San Francisco, USA, May 24, 2013, pp. 151-157
  58. M. Seredynski, W. Mazurczyk, D. Khadraoui - Multi-Segment Green Light Optimal Speed Advisory - In Proc. of 16th International Workshop on Nature Inspired Distributed Computing (NIDISC 2013), May 20-24, 2013, Boston, Massachusetts USA
  59. W. Mazurczyk, K. Szczypiorski, B. Jankowski - Towards Steganography Detection Through Network Traffic Visualisation - In Proc. of First International Workshop on Cyber Crime (IWCC 2012) co-located with International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012), October 3-5, 2012, St. Petersburg, Russia
  60. W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof?, In Proc. of: The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
  61. W. Frączek, W. Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In Proc. of: First International Workshop on Digital Forensics (IWDF 2011) co-located with The 2011 International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011
  62. P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 121-131, Prague, Czech Republic, 26-28.05.2011
  63. W. Frączek, W. Mazurczyk, K. Szczypiorski - Multi-Level Steganography Applied to Networks - In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), ISBN 978-0-9820958-4-3, pp. 90-96, Prague, Czech Republic, 26-28.05.2011
  64. B. Jankowski, W. Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding - 14th International Telecommunications Network Strategy and Planning Symposium (Networks 2010), 27-30.09.2010, Warsaw, Poland
  65. W. Frączek, W. Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  66. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  67. K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks - In Proc. of: Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, November 4-6, 2010
  68. W. Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In Proc. of: First International Workshop on Network Steganography (IWNS'09), Wuhan, Hubei, China, 18-20 November, 2009 - co-located with 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009), Vol. I, pp. 569-572
  69. T. Ciszkowski, W. Mazurczyk, Z. Kotulski, T. Hoßfeld, M. Fiedler, D. Collange - Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, 2nd Euro-NF Workshop - Future Internet Architectures: New Trends in Service Architectures Future 2009, 10-12 June 2009, Santander, Spain
  70. W. Mazurczyk, J. Lubacz, K. Szczypiorski - Steganography for Real-time Services in IP Networks, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  71. K. Szczypiorski, J. Lubacz, W. Mazurczyk - Hiding Data in Wireless LANs, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  72. K. Szczypiorski, W. Mazurczyk, K. Cabaj, P. Radziszewski - Towards the Steganographic Routing, In Proc. of: 17th International Conference on Computing (CIC 2008), Mexico City, Mexico, December 3-5, 2008
  73. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Hiding Data in VoIP In Proc of: The 26th Army Science Conference (ASC 2008), Orlando, Florida, USA, December 1-4, 2008
  74. W. Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls, In Proc. of the PGTS '08 - the Fifth Polish-German Teletraffic Symposium (A. Feldmann, P. Kuhn, M. Pioro, A. Wolisz [Eds.]), Berlin, Germany, ISBN 978-3-8325-2047-2, Logos Verlag Berlin, pp. 119-128, October 6-8, 2008
  75. Ch.Eliasson, M.Fiedler, T.Ciszkowski, Z.Kotulski, W.Mazurczyk - Parameterisation of a reputation system for VoIP in P2P networks for improved communication quality and security, EuroFGI, IA.7.6 Workshop on Socio-Economic Aspects of Future Generation Internet, Karlskrona, Sweden, 27-29 May, 2008
  76. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo bezprzewodowych sieci WiMAX - Materiały: XI Krajowa Konferencja Zastosowań Kryptografii Enigma 2007, 23-25 maja 2007, Warszawa
  77. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Zarzadzanie kluczami w sieciach WiMAX - Materiały: XI Krajowa Konferencja Zastosowań Kryptografii Enigma 2007, 23-25 maja 2007, Warszawa
  78. W. Mazurczyk, Z. Kotulski - Covert channel for improving VoIP security In Proceedings of The 13th International Multi-Conference on Advanced Computer Systems ACS 2006, Vol. 1, pp. 361-370, Międzyzdroje 18-20 October 2006, ISBN 83-87362-75-1
  79. W. Mazurczyk - Aspekty bezpieczeństwa sieci P2P na przykładzie Skype - In Proceedings of XXII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2006, Bydgoszcz, 13-15 September 2006
  80. W. Mazurczyk - Możliwości wykorzystania watermarkingu do zabezpieczenia telefonii IP - IX Krajowa Konferencja Zastosowań Kryptografii Enigma 2005, Warszawa, maj/czerwiec 2005
  81. W. Mazurczyk - Bezpieczeństwo protokołów sygnalizacyjnych VoIP: koncepcja bezpiecznej współpracy protokołów SIP i H.323 - VIII Krajowa Konferencja Zastosowań Kryptografii Enigma 2004, Warszawa, maj 2004
  82. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - XIX Krajowe Sympozjum Telekomunikacji KST 2003, Bydgoszcz, wrzesień 2003
  83. W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj 2003

Other articles

  1. T. Hoßfeld, D. Collange, M. Fiedler, T. Ciszkowski, Z. Kotulski, W. Mazurczyk - QoEWeb: Quality of Experience and User Behaviour Modelling for Web Traffic, 1st Euro-NF Socio-Economics Workshop, Greece, October 16-17 2008
  2. W. Mazurczyk, K. Szczypiorski - Steganography Harnesses VoIP Networks published in: SC Magazine, Haymarket Media, UK, July 2008
  3. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Luki w VoIP - miesięcznik Hakin9, pazdziernik 2007
  4. K. Cabaj, W. Mazurczyk, K. Szczypiorski - Mechanizmy zabezpieczeń w sieciach WiMAX - dwumiesięcznik Zabezpieczenia, ISSN: 1505-2419, 4/2007
  5. W. Mazurczyk - Rozmowa kontrolowana - miesięcznik CHIP, kwiecień 2006
  6. W. Mazurczyk - Bezpieczeństwo VoIP fakt czy mit? - dwumiesięcznik Zabezpieczenia, 2003
  7. W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo VoIP opartego na SIP - IV Sympozjum AFCEA - Bezpieczeństwo systemów informacyjnych BSI 2003, Warszawa, maj 2003

Patent Applications

  1. Wojciech Mazurczyk, Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesyłania danych w sieci telekomunikacyjnej dla usług multimedialnych - Zgłoszenie wynalazku nr P-396615. Politechnika Warszawska. Data zgłoszenia: 12 pazdziernik 2011
  2. Wojciech Mazurczyk i Krzysztof Szczypiorski - Sposób steganograficznego ukrywania i przesylania danych sieci telekomunikacyjnych - Zgloszenie wynalazku nr P-384940 na rzecz Politechniki Warszawskiej. Data zgloszenia: 15 kwietnia 2008

E-prints

  1. B. Lipinski, W. Mazurczyk, K. Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment - In: Computing Research Repository (CoRR), abs/1402.0239, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 February 2014
  2. P. Kopiczko, W. Mazurczyk, K. Szczypiorski - StegTorrent: a Steganographic Method for the P2P File Sharing Service - In: Computing Research Repository (CoRR), abs/1303.4264, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 18 March 2013
  3. W. Mazurczyk, M. Kara , K. Szczypiorski - SkyDe: a Skype-based Steganographic Method - In: Computing Research Repository (CoRR), abs/1301.3632, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 16 January 2013
  4. A. Janicki, W. Mazurczyk, K. Szczypiorski - Steganalysis of Transcoding Steganography - In: Computing Research Repository (CoRR), abs/1210.5888, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 22 October 2012
  5. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Principles and Overview of Network Steganography - In: Computing Research Repository (CoRR), abs/1207.0917, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 July 2012
  6. W. Mazurczyk - VoIP Steganography and Its Detection - A Survey - In: Computing Research Repository (CoRR), abs/1203.4374, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 March 2012
  7. E. Zielinska, W. Mazurczyk, K. Szczypiorski - The Advent of Steganography in Computing Environments - In: Computing Research Repository (CoRR), abs/1202.5289, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 23 February 2012
  8. A. Janicki, W. Mazurczyk, K. Szczypiorski - Influence of Speech Codecs Selection on Transcoding Steganography - In: Computing Research Repository (CoRR), abs/1201.6218, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 30 January 2012
  9. W. Mazurczyk, P. Szaga, K. Szczypiorski - Using Transcoding for Hidden Communication in IP Telephony - In: Computing Research Repository (CoRR), abs/1111.1250, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 4 November 2011
  10. W. Mazurczyk, P. Kopiczko - What more can be learnt about BitTorrent from meta-data files and uTorrent logs? - In: Computing Research Repository (CoRR), abs/1110.6265, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 28 October 2011
  11. W. Mazurczyk, K. Szczypiorski - Is Cloud Computing Steganography-proof? - In: Computing Research Repository (CoRR), abs/1107.4077, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  12. W. Mazurczyk - Lost Audio Packets Steganography: The First Practical Evaluation - In: Computing Research Repository (CoRR), abs/1107.4076, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  13. W. Frączek, W.Mazurczyk, K. Szczypiorski - How Hidden Can Be Even More Hidden? - In: Computing Research Repository (CoRR), abs/1107.4065, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  14. P. Białczak, W. Mazurczyk, K. Szczypiorski - Sending Hidden Data via Google Suggest - In: Computing Research Repository (CoRR), abs/1107.4062, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 20 July 2011
  15. W. Frączek, W.Mazurczyk, K. Szczypiorski - Hiding Information in a Stream Control Transmission Protocol - In: Computing Research Repository (CoRR), abs/1104.3333, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 17 April 2011
  16. B. Jankowski, W.Mazurczyk, K. Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Computing Research Repository (CoRR), abs/1104.0422, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 3 April 2011
  17. W. Mazurczyk, J. Lubacz, K. Szczypiorski - On Steganography in Lost Audio Packets In: Computing Research Repository (CoRR), abs/1102.0023, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 31 January 2011
  18. W. Frączek, W.Mazurczyk, K. Szczypiorski - Multi-Level Steganography: Improving Hidden Communication in Networks - In: Computing Research Repository (CoRR), abs/1101.4789, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 25 January 2011
  19. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Retransmission Steganography Applied In: Computing Research Repository (CoRR), abs/1007.0767, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 July 2010
  20. K. Szczypiorski, W. Mazurczyk - Hiding Data in OFDM Symbols of IEEE 802.11 Networks In: Computing Research Repository (CoRR), abs/1006.0495, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 June 2010
  21. W. Frączek, W.Mazurczyk, K. Szczypiorski - Stream Control Transmission Protocol Steganography - In: Computing Research Repository (CoRR), abs/1006.0247, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 1 June 2010
  22. B. Jankowski, W.Mazurczyk, K. Szczypiorski - Information Hiding Using Improper Frame Padding - In: Computing Research Repository (CoRR), abs/1005.1925, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 12 May 2010
  23. W.Mazurczyk, K. Cabaj, K. Szczypiorski - What are suspicious VoIP delays? - In: Computing Research Repository (CoRR), abs/1002.4303, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 24 February 2010
  24. W.Mazurczyk, K. Szczypiorski - Steganography in Handling Oversized IP Packets - In: Computing Research Repository (CoRR), abs/0907.0313, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 2 July 2009
  25. W.Mazurczyk, M. Smolarczyk, K. Szczypiorski - Hiding Information in Retransmissions - In: Computing Research Repository (CoRR), abs/0905.0363, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 5 May 2009
  26. W.Mazurczyk, J. Lubacz - LACK - a VoIP Steganographic Method - In: Computing Research Repository (CoRR), abs/0811.4138, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 26 November 2008
  27. K. Szczypiorski, I. Margasinski, W. Mazurczyk, K. Cabaj, P. Radziszewski - TrustMAS - Trusted Communication Platform for Multi-Agent Systems In: Computing Research Repository (CoRR), abs/0808.4060, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 1 September 2008>
  28. W.Mazurczyk, J. Lubacz - Analysis of a Procedure for Inserting Steganographic Data into VoIP Calls - In: Computing Research Repository (CoRR), abs/0806.1034, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 7 June 2008
  29. K. Szczypiorski, I. Margasinski, W.Mazurczyk - Steganographic Routing in Multi Agent System Environment - In: Computing Research Repository (CoRR), abs/0806.0576, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 4 June 2008
  30. W.Mazurczyk, K. Szczypiorski - Covert Channels in SIP for VoIP signalling - In: Computing Research Repository (CoRR), abs/0805.3538, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 26 May 2008
  31. W.Mazurczyk, K. Szczypiorski - Steganography of VoIP streams - In: Computing Research Repository (CoRR), abs/0805.2938, arXiv.org E-print Archive, Cornell University, Ithaca, NY (USA), published on 21 May 2008
  32. T. Ciszkowski, C. Eliasson, M. Fiedler, Z. Kotulski, R. Lupu, W. Mazurczyk - SecMon: End-to-End Quality and Security Monitoring System - arXiv.org e-Print archive, April 2008
  33. W. Mazurczyk, Z. Kotulski - Lightweight security mechanism for PSTN-VoIP cooperation - arXiv.org e-Print archive, December 2006
  34. W. Mazurczyk, Z. Kotulski - New security and control protocol for VoIP based on steganography and digital watermarking - arXiv.org e-Print archive, February 2006
  35. W. Mazurczyk, Z. Kotulski - Alternative security architecture for IP Telephony based on digital watermarking - arXiv.org e-Print archive, June 2005

Reports

  1. W. Mazurczyk - Deliverable No: D.WP.JRA.6.3.7 - Security considerations for Next Generation Internet - EuroNGI NoE, participation at the authors team, November 2006
  2. W. Mazurczyk - Deliverable No: D.WP.JRA.6.3.5 - Protection of stored data by system level encryption schemes - EuroNGI NoE, participation at the authors team, May 2005

Conference presentations and invited talks

  1. W. Mazurczyk - Trends in stegomalware - utilization of data hiding techniques by malicious software, Samsung R&D Institute Poland, 11 December 2022, Warsaw, Poland
  2. W. Mazurczyk - Sposoby detekcji fake news w tresciach multimedialnych w projekcie DISSIMILAR - podejscie interdyscyplinarne, Seminarium Wybrane zastosowania inteligencji obliczeniowej, Komisja Informatyki i Automatyki PAN, 25 November, 2022, online
  3. W. Mazurczyk - Recent advances in stegomalware: development trends and detection opportunities, 21st International Workshop on Digital-forensics and Watermarking (IWDW 2022), 19-21 November 2022, Guilin, P.R. China (keynote)
  4. W. Mazurczyk - Adversarial Cyber Reconnaissance Techniques: Evolution, Countermeasures, and Challenges, NATO IST-190 Research Symposium (RSY) on Artificial Intelligence, Machine Learning and Big Data for Hybrid Military Operations (AI4HMO), 5-6 October, 2021, Koblenz, Germany (keynote)
  5. W. Mazurczyk - Trends in Stegomalware: Techniques and Countermeasures, 3rd International Conference on Frontiers in Cyber Security (FCS 2020), December 18 2020, Tinjan, China (keynote)
  6. W. Mazurczyk - Secure Intelligent Methods for Advanced Recognition of Malware and Stegomalware, IEEE Conference on Network Softwarization (IEEE NetSoft), July 2020 (virtual conference)
  7. W. Mazurczyk - Trends in Network Covert Channels: Design and Mitigation, Cyber Security Seminar, University of Kent, Canterbury, UK, January 2020
  8. P. Georgi, J. Keller, W. Mazurczyk - IVLIS - International Virtual Laboratory for Information Security, Erasmus+ Staff Week 2018, June 2018, Hagen, Germany
  9. W. Mazurczyk - Challenges of network steganography detection, TAKEDOWN workshop co-located with ARES 2017, August 29 2017, Reggio Calabria, Italy (invited talk)
  10. W. Mazurczyk - Criminal Use of Information Hiding (CUIng) initiative: past, present and future, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (keynote)
  11. W. Mazurczyk - A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression, CUING workshop co-located with ARES 2017, August 31 2017, Reggio Calabria, Italy (paper presentation)
  12. W. Mazurczyk - Criminal Use of Information Hiding Initiative: the First Year, 3rd EC3 Academic Advisory Network Meeting (EC3 AAN), 20 April 2017, The Hague, Netherlands
  13. W. Mazurczyk - Sposoby wspolpracy jednostek badawczych z firmami, PLNOG 2017, 6-7 March 2016, Warsaw, Poland
  14. W. Mazurczyk, K. Cabaj - Information hiding techniques and how modern malware uses them / Techniki ukrywania informacji i sposoby ich wykorzystania przez zlosliwe oprogramowanie, Secure 2016, 25-26 October 2016, Warsaw, Poland
  15. K. Cabaj, W. Mazurczyk - Ransomware infrastructure identification using dynamic analysis based on CryptoWall and Locky families examples / Identyfikacja infrastruktury ransomware z wykorzystaniem analizy dynamicznej na przykladzie rodzin CryptoWall i Locky, Secure 2016, 25-26 October 2016, Warsaw, Poland
  16. W. Mazurczyk - On-going Cybersecurity Research Projects, 2nd EC3 Academic Advisory Network Meeting (EC3 AAN), 6-7 April 2016, The Hague, Netherlands
  17. W. Mazurczyk - Inspirations for innovative cybersecurity technologies, The COURAGE - CAMINO - CyberROAD joint conference on "Emerging and Current Challenges in Cybercrime and Cyberterrorism", 10-11 March 2016, The Hague, Netherlands
  18. K. Cabaj, W. Mazurczyk - Dynamic analysis of CryptoWall network activity, Europol EC3 meeting, 9 March 2016, The Hague, Netherlands
  19. W. Mazurczyk - Influence of modern information hiding techniques on digital forensics, "Secure Europe without borders" conference organized by Lodz Regional Police Headquarters, Poland, February 2016 (invited talk)
  20. W. Mazurczyk - Innovative cyber security methods for NGI (Next Generation Infrastructures), CIPRNet training lecture, May 2015, University of Technology and Life Sciences, Bydgoszcz, Poland
  21. K. Szczypiorski, W. Mazurczyk, E. Rzeszutko - Hiding information in Skype, Materiały: The 5th Annual WUT-KNU Joint Workshop on ICT Programme, 13-14 November 2014, Warsaw, Poland
  22. W. Mazurczyk, K. Szczypiorski, E. Zielińska - Studia realistycznych przypadków steganografii sieciowej, Materiały: Secure 2012, XVI Konferencja na temat bezpieczeństwa teleinformatycznego, 22-24 November 2012, Warsaw, Poland
  23. W. Mazurczyk, K. Szczypiorski - O ukrywaniu informacji w sieciach - XXVII Jesienne Spotkania PTI, Jachranka, 17-20 pazdziernika 2011
  24. W. Mazurczyk - Nowe sposoby ukrywania informacji w sieciach telekomunikacyjnych - Jesienne Warsztaty CSZ, Madralin, 14-16 pazdziernik 2011
  25. W. Mazurczyk, K. Szczypiorski - Information Hiding in Communication Protocols: Network Steganography - 1st Luxembourg-Polish Workshop on Security & Trust (LPWST 2010), May 6-7, 2010, Castle of Bourglinster, Luxembourg
  26. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski - Ukrywanie informacji w retransmisjach, Materiały: Secure 2009, XIII Konferencja na temat bezpieczeństwa teleinformatycznego, 20-21 October 2009, Warszawa
  27. W. Mazurczyk, K. Cabaj, K. Szczypiorski - Presentation of selected steganographic tools, Seminar: Information hiding in data communication networks organized by TP S.A., Warsaw, 16 October 2009
  28. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganographic methods to secretly transmit data in communication networks, Seminar: Information hiding in data communication networks organized by TP S.A., Warsaw, 16 October 2009
  29. M. Kreft, W. Mazurczyk - Zapewnianie bezbłednosci transmisji steganograficznej, XXV Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2009, Warszawa, 16-18 September 2009
  30. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Fundamentals of Networks Steganography - A seminar presentation. FEIT Skopje (Macedonia), 26 June 2009
  31. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Steganologia sieciowa - czyli o wyrafinowanych sposobach ukrytego przekazywania informacji - A seminar presentation. Polish Information Processing Society, 12 May 2009
  32. K. Szczypiorski, W. Mazurczyk, J. Lubacz - Metody steganografii sieciowej - A seminar presentation. Research and Academic Computer Network, Warsaw, 18 March 2009
  33. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Steganofonia: ukrywanie informacji w telefonii internetowej - Materiały: Secure 2008, XII Konferencja na temat bezpieczeństwa teleinformatycznego, 2-3 pazdziernika 2008, Warszawa
  34. J. Lubacz, W. Mazurczyk, K. Szczypiorski - Nowe metody steganografii w sieciach - Posiedzenie Sekcji Telekomunikacji Polskiej Akademii Nauki (PAN) podczas XXIII Krajowego Sympozjum Telekomunikacji i Teleinformatyki 2008, 11 wrzesnia 2008, Bydgoszcz
  35. T. Piotrowski, S. Wójcik, M. Wiśniewski, W. Mazurczyk - Bezpieczeństwo usługi VoIP opartej na systemie Asterisk, XXIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki KSTiT 2007, Bydgoszcz, 12-14 September 2007
  36. W. Mazurczyk - Covert channel for improving VoIP security The 13th International Multi-Conference on Advanced Computer Systems - ACS 2006, 18-20 October 2006, Miedzyzdroje
  37. W. Mazurczyk - New VoIP traffic security scheme with digital watermarking The 25-th International Conference on Computer Safety, Reliability and Security - SafeComp 2006, 26-29 September 2006, Gdansk
  38. W. Mazurczyk - Bezpieczeństwo VoIP - Materiały: V Konferencja Infrastruktura Telekomunikacyjna dla Biznesu: VoIP - telefonia internetowa: Modele biznesowe i taryfy, 26 stycznia 2006, Warszawa
  39. W. Mazurczyk - Możliwości wykorzystania watermarkingu do zabezpieczenia telefonii IP - IX Krajowa Konferencja Zastosowań Kryptografii Enigma 2005, Warszawa, maj/czerwiec 2005
  40. W. Mazurczyk - Bezpieczeństwo VoIP - Materiały: III Krajowa Konferencja Bezpieczeństwa Biznesu, 22-23 listopada 2004, Warszawa
  41. W. Mazurczyk - Bezpieczeństwo protokołów sygnalizacyjnych VoIP: koncepcja bezpiecznej współpracy protokołów SIP i H.323 - VIII Krajowa Konferencja Zastosowań Kryptografii Enigma 2004, Warszawa, maj 2004
  42. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - XIX Krajowe Sympozjum Telekomunikacji KST 2003, Bydgoszcz, wrzesień 2003
  43. W. Mazurczyk, K. Szczypiorski - Bezpieczeństwo VoIP bazujacego na SIP - IV Sympozjum AFCEA - Bezpieczeństwo systemów informacyjnych "BSI 2003", Warszawa, maj 2003
  44. W. Mazurczyk - Bezpieczeństwo VoIP opartego na SIP - VII Krajowa Konferencja Zastosowań Kryptografii Enigma 2003, Warszawa, maj 2003

Theses

  1. W. Mazurczyk - Information hiding in IP telephony traffic / Ukrywanie informacji w ruchu telefonii IP - rozprawa habilitacyjna / habilitation thesis, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2014
  2. W. Mazurczyk - Steganografia w telefonii IP / Steganography in IP telephony - rozprawa doktorska / PhD thesis pod kierunkiem prof. Jozefa Lubacza, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Listopad 2009
  3. W. Mazurczyk - Bezpieczeństwo i współpraca protokołów sygnalizacyjnych VoIP - praca dyplomowa magisterska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Czerwiec 2004
  4. W. Mazurczyk - Bezpieczeństwo SIP jako protokołu sygnalizacyjnego VoIP - praca dyplomowa inżynierska pod kierunkiem mgr inż. Krzysztofa Szczypiorskiego, Wydział Elektroniki i Technik Informacyjnych, Politechnika Warszawska, Kwiecień 2003

Awards and scholarships

  1. W. Mazurczyk, - Polish Prime Minister's Award for Scientific Achievements (12.2023), Warsaw, Poland
  2. W. Mazurczyk, K. Cabaj, M. Gregorczyk, P. Nowakowski, P. Zorawski - First degree Rector's Award for Scientific Achievements for Research Team in 2020/2021 (10.2022), Warsaw University of Technology, Poland
  3. W. Mazurczyk - Second-degree Individual Rector's Award for Scientific Achievements 2018/2019 (10.2020), Warsaw University of Technology, Poland
  4. Researcher Travel Scholarship in the Bekker Programme (06-09.2018), Polish National Agency for Academic Exchange (Narodowa Agencja Wymiany Akademickiej, NAWA), November 2018, Poland
  5. W. Mazurczyk - First-degree Individual Rector's Award for Scientific Achievements 2016/2017 (10.2018), Warsaw University of Technology, Poland
  6. W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2012/2013 (10.2014), Warsaw University of Technology, Poland
  7. W. Mazurczyk - Researcher Travel Scholarship (06-07.2014), Center for Advanced Studies Warsaw University of Technology, December 2013, Poland
  8. W. Mazurczyk - Polish Minister Of Science and Higher Education Scholarship for Outstanding Young Researchers (2013-2015), November 2012, Warsaw, Poland
  9. W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2009/2010 (10.2011), Warsaw University of Technology, Poland
  10. W. Mazurczyk - Polish Prime Minister's Award for PhD Thesis, November 2010, Warsaw, Poland
  11. W. Mazurczyk - Young Researcher Scholarship (2011-2012), Center for Advanced Studies Warsaw University of Technology, December 2010, Poland
  12. W. Mazurczyk, K. Szczypiorski - First-degree Rector's Award for Scientific Achievements for Research Team in 2007/2008 (10.2009), Warsaw University of Technology, Poland
  13. W. Mazurczyk - ACM SIGCOMM Student Travel Grant (08.2009) - funded by supporting organizations of ACM SIGCOMM 2009, Barcelona, Spain
  14. W. Mazurczyk - Mazovia PhD Scholarship (2008-2009) - funded by Mazovia Voivodeship, Polish Goverment

Grants and projects

  1. J. Keller (kier.) - Stego-Malware Communication Fingerprinting (StegoMaCoFi) (2023-2024) - a project funded by the German Ministry of Education and Research (BMBF) (role: Senior Researcher) [NEW]
  2. J. Keller (kier.) - Intelligent Monitoring and Countermeasures of Stego Malware and Ransomware (IMACOSAR) (2021-2022) - a project funded by the German Ministry of Education and Research (BMBF) (role: Senior Researcher)
  3. W. Mazurczyk (kier.) - Integrated Technological and Information Platform for wildfire Management (SILVANUS) (2021-2025) - funded by EU (role: Principal Investigator at WUT)
  4. W. Mazurczyk (kier.) - DISSIMILAR: Detection of fake newS on SocIal MedIa pLAtfoRms (2021-2024) - funded by National Centre for Research and Development under the EIG CONCERT-Japan Programme framework (role: Principal Investigator at WUT)
  5. M. Choras (kier.) - Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware (SIMARGL) (2019-2022) - funded by EU (role: Senior Researcher)
  6. W. Mazurczyk (kier.) - IoRL (Internet of Radio Light) (2017-2020) - H2020 project funded by EU (role: Principal Investigator)
  7. K. Cabaj (kier.) - CoCoDe: Covert Communication Detection (2017-2020) - R&D project funded by US Air Force Office of Scientific Research, contract No. FA9550-17-1-0254 (role: co-PI at WUT)
  8. J. Battala (kier.) - 5G@PL: Deployment of 5G network in Polish market (2018-2020) - funded by National Centre for Research and Development under the Gospostrateg Programme framework, Contract no. 1/383021/19/NCBR/2018 (role: Senior Researcher)
  9. J. Keller (kier.) - Detection and countermeasures against information hiding-based malware (DeCoIMa) (2017-2019) - a project funded by German Ministry of Education and Research (BMBF) (role: Senior Researcher)
  10. J. Keller (kier.) - International Virtual Lab on Information Security (IVLIS) (2017-2018) - a project funded by FernUniversitaet within Foerderprogamm Innovative Lehre (FILeh) (role: Senior researcher)
  11. S. Wendzel (kier.), W. Mazurczyk - E2S2E: Energy Efficient and Secure Smart Environment (2016-2018) - a project funded by German Ministry of Education and Research (BMBF) (role: PI at WUT)
  12. F. Solano (kier.), W. Mazurczyk - microMole: Sewage Monitoring System for Tracking Synthetic Drug Laboratories (2015-2018) - H2020 project funded by EU (role: Senior researcher)
  13. K. Szczypiorski (kier.), W. Mazurczyk - MobiTraff: Cooperative Way to Mobility and Traffic Efficiency (2013-2015) - funded by National Centre for Research (Poland) and Development and Fonds National de la Recherche (Luxembourg) - POLLUX programm (role: Senior researcher)
  14. W. Mazurczyk, K. Szczypiorski - New Network Anomaly Detection Method (12.2011-12.2014) - funded by National Science Centre (role: PI)
  15. W. Mazurczyk, K. Szczypiorski - Steganographic Methods for IP Networks (01.2012-01.2014) - funded by Polish Ministry of Science and Higher Education (role: PI)
  16. W. Mazurczyk - Methods for Information Hiding in Network Traffic: Analysis and Detection (2012) - funded by Warsaw University of Technology (role: PI)
  17. W. Mazurczyk, K. Szczypiorski - Methods for Network Steganography Detection in IP Networks (12.2010-12.2011) - funded by Polish Ministry of Science and Higher Education (role: PI)
  18. W. Mazurczyk - New Methods for Information Hiding in Telecommunication Network (2011) - funded by Warsaw University of Technology (role: PI)
  19. J. Lubacz (kier.), K. Szczypiorski, W. Mazurczyk - Methods and Evaluation Environment of Network Steganography (2009-2011) - funded by Polish Ministry of Science and Higher Education (role: researcher)
  20. K. Szczypiorski (kier.), W. Mazurczyk - Prosense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers: Towards Pervasive Networking of WBC and the EU (2008-2010) funded by EU - FP7 (role: Researcher)
  21. K. Szczypiorski (kier.), M. Pioro, W. Mazurczyk - Detecting Frauds in 2G/3G Networks (2008-2009) - funded by Polska Telefonia Cyfrowa - PTC
  22. Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Quality of Experience and User Behaviour Modelling for Web Traffic (QoEWeb) - FP7 - EuroNF, Network of Excellence (2008-2009)
  23. J. Lubacz (kier.), W. Mazurczyk - Steganografia w telefonii IP - Supervisor (research) grant funded by Polish Goverment (2008-2009)
  24. Z. Kotulski (kier.), W. Mazurczyk, T. Ciszkowski - Design and Evaluation of End-to-End Quality and Security (SecMon) - FP6 - EuroFGI - Design and Engineering of the Next Generation Internet, Network of Excellence (2007-2008)
  25. K. Szczypiorski(kier.), I. Margasiński, W. Mazurczyk - Trusted Communication Platform for Multi-Agent Systems (TrustMAS), (01.2007-12.2007) - Contract No. N62558-07-P-0042 funded by European Research Office of US Army (also supported by European Office of Aerospace Research and Development of US Air Force)
  26. K. Szczypiorski (kier.), W. Mazurczyk, K. Cabaj, S. Strzelak - Ochrona danych w sieciach WiMAX - Warszawa, listopad 2006, Instytut Telekomunikacji PW na zlecenie Instytutu Łacznosci w ramach Programu Wieloletniego - "Rozwój Telekomunikacji i Poczty w Dobie Społeczeństwa Informacyjnego", pazdziernik 2006
  27. W. Mazurczyk - Nowoczesne systemy komunikacji głosowej: VoIP, opracowanie na zlecenie NextiraOne, sierpień 2006
  28. Advanced network steganographic systems - stegano.net
  29. Bio-Inspired Cybersecurity Project -

WM