Publications

book projects: I wrote 5 books (16 editions). Publishers: Wiley-IEEE, Springer and Galileo Press/Rheinwerk Verlag.

 Information Hiding in Communication Networks  Einstieg in Linux Tunnel und verdeckte Kanäle im Netz Linux. Das umfassende Handbuch Praxisbuch Netzwerksicherheit

My scientific papers are pulished in ACM Computing Surveys (CSUR), Comm. ACM (CACM, 2x), Journal of Universal Computer Science (J.UCS, 3x), Springer Annals of Telecommunications (ANTE), IFIP Sec, IEEE LCN (2x), WILEY Security and Communication Networks (3x), IFIP CMS (2x), ACM CCS, IFIP SEC and others.

Some of my key publications are on information hiding taxonomy/patterns [1], creativity evaluation in information hiding [2], information hiding methodology [3], traffic normalization/wardens [4, 5] and covert channel optimization [6, 7].

Work in Progress / Submitted

  • Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller: You Shall Not Pass: Countering Network Covert Channels with Dynamic Wardens (in progress).
  • Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander: Special Issue Editorial: Emerging and Unconventional: New Attacks and Innovative Detection Techniques, Security and Communication Networks (SCN), Hindawi, 2018 (in progress).
  • Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel: Digital Forensics Special Issue Introduction, IEEE Security and Privacy Magazine (submited).
  • Steffen Wendzel: Sicherheit für IoT und Netzwerke (tentative title), Springer (in progress).

In Press

  1. Wojciech Mazurczyk, Steffen Wendzel: Information Hiding: Challenges for Forensic Experts, Communications of the ACM, January 2018 (in press).
  2. Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk: The Future of Digital Forensics: Challenges and the Road Ahead, IEEE Security & Privacy Magazine (in press).
  3. Steffen Wendzel: Smart Homes – sicher, bis der Hacker kommt (RND news article, in press).
  4. Steffen Wendzel: IT-Sicherheit ist nicht optional, CCI-Zeitung (in press).
  5. Steffen Wendzel: Review of the Cambridge Univ. Press book `Darkweb Cyber Threat Intelligence Mining' (in press)

2017

  1. Steffen Wendzel, Wojciech Mazurczyk, Georg Haas: Steganography for Cyber-physical Systems, Journal of Cyber Security and Mobility (JCSM), Vol. 6(2), pp. 105-126, River Publishers, 2017.
  2. Gabriele Spenger, Jörg Keler, Steffen Wendzel: Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs, Journal of Cyber Security and Mobility (JCSM), Vol. 6(2), pp. 147-170, River Publishers, 2017.
  3. Florian Lehner, Wojciech Mazurczyk, Joerg Keller, Steffen Wendzel: Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach, in Proc. 42th IEEE Conference on Local Computer Networks (LCN), pp. 78-85, IEEE, 2017.
    Presentation slides [PDF]
  4. Steffen Wendzel, Wojciech Mazurczyk, Georg Haas: Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings, IEEE Security & Privacy BioSTAR Workshop. San José, 2017.
    Presentation slides [PDF], Video [Youtube]
  5. Jörg Keller, Gabriele Spenger, Steffen Wendzel: Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators, IEEE Security & Privacy BioSTAR Workshop. San José, 2017.
  6. Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Jean-Francois Lalande: Network Information Hiding and Science 2.0: Can it be a Match?, Int. Journal of Electronics and Telecommunications, Vol. 63(2), pp. 217-222, 2017.
  7. Steffen Wendzel, Jernej Tonejc, Jaspreet Kaur, Alexandra Kobekova: Cyber Security of Smart Buildings, in: Security and Privacy in Cyber-Physical Systems: Foundations and Applications, Chapter 16, pp. 327-352, Editors: H. Song, G. Fink, S. Jeschke, Wiley, ISBN 978-1-119-22604-8, 2017.
  8. Steffen Wendzel: Review of ACM Comp. Surv. article `Out-of-band Covert Channels--A Survey', ACM Computing Reviews, Vol. 58(1), p. 49, ACM, 2017.
  9. Alexandra Kobekova, Lennart Bültermann, Jernej Tonejc, Steffen Wendzel: Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT, 15. Deutscher IT-Sicherheitskongress des BSI, pp. 515-526, SecuMedia Verlags-GmbH, 2017.
  10. Steffen Wendzel: Zur IT-Sicherheit von Smart Homes, PC-Welt (Beitrag zum Expert Network), 2017.
  11. Steffen Wendzel: Steganografie - eine zunehmende Bedrohung, PC-Welt (Beitrag zm Expert Network), 2017.

2016

  1. Steffen Wendzel: How to increase the security of smart buildings?ACM DL Author-ize service, Communications of the ACM, Vol. 59(5), pp. 47-49, ACM, 2016. 
  2. Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, Krzysztof Szczypiorski: Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications, IEEE Series on Information and Communication Networks Security, Wiley, 2016 (cf. Amazon.com).
  3. Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander: Unified Description for Network Information Hiding Methods, Journal of Universal Computer Science (J.UCS), Vol. 22(11), pp. 1456-1486, 2016.
  4. Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller: Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions, Security and Communication Networks (SCN), Vol. 9(15), pp. 2972–2985, Wiley, 2016.
  5. Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc, Michael Meier: Covert Channel-internal Control Protocols: Attacks and Defense, Security and Communication Networks (SCN), Vol. 9(15), pp. 2986–2997, Wiley, 2016.
  6. Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski: On Importance of Steganographic Cost For Network Steganography, Security and Communication Networks (SCN), Wiley, Vol. 9(8), pp. 781-790, 2016.
  7. Steffen Wendzel, Saffija Kasem-Madani: IoT Security: The Improvement-Decelerating 'Cycle of Blame', opinion piece in Journal of Cyber Security and Mobility (JCSM), River Publishers, DOI: 10.13052/popcas010, 2016. 
  8. Steffen Wendzel, Wojciech Mazurczyk: Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns, 23rd Conference on Computer and Communications Security (CCS), pp. 1739-1741, Vienna, ACM, 2016. [you can also download the related poster (PDF)]
  9. Steffen Wendzel, Jörg Keller (Eds.): Special Issue on Security, Privacy and Reliability of Smart Buildings, Journal of Universal Computer Science (J.UCS), Vol. 22(9), 2016.
  10. Wojciech Mazurczyk, Philipp Amann, Luca Caviglione, Steffen Wendzel: CUIng: Criminal Use of Information Hiding Initiative [newsletter website], European CIIP Newsletter, Issue 25 (Vol. 10, No. 3), pp. 31-32, 2016.
  11. Steffen Wendzel: Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography, 2016.
  12. Michael Meier, Delphine Reinhardt, Steffen Wendzel (Eds.): Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), LNI Vol. 256, 5.-7. April 2016, Bonn, ISBN 978-3-88579-650-3, Bonn, 2016.
  13. Steffen Wendzel, Johannes Plötner: Einstieg in Linux. Linux verstehen und einsetzen, 7th Ed., Rheinwerk, 2016.
  14. Steffen Wendzel, Alexandra Kobekova, Jernej Tonejc, Jaspreet Kaur: IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt, Technical Report published internally by Smart Home Summit, 2016.
  15. Steffen Wendzel: Tatort Smart Building - die Gebäudeautomation muss sicherer werden, cci Zeitung, issue 08, pp. 16, 2016.
  16. Alexandra Kobekova, Steffen Wendzel, Jernej Tonejc: Smart Building - Sicherheitslücken schließen, PROTECTOR, no. 4, pp. 42-43, 2016.

2015

  1. Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin: Pattern-Based Survey and Categorization of Network Covert Channel TechniquesACM DL Author-ize service, Computing Surveys (CSUR), Vol. 47(3), ACM, 2015.
  2. Steffen Wendzel, Carolin Palmer: Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research, Journal of Universal Computer Science (J.UCS), Vol. 21(12), pp. 1684-1705, 2015.
  3. Jaspreet Kaur, Steffen Wendzel, Michael Meier: Countermeasures for Covert Channel-internal Control Protocols, Proc. ARES 2015, part of 4th Int. Workshop on Cyber Crime (IWCC), pp. 422-428, Toulouse, IEEE, 2015. Publication received a Best Paper Award.
  4. Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier: Securing BACnet's Pitfalls, 30th International Information Security and Privacy Conference (IFIP SEC), IFIP AICT 455, pp. 616-629, Hamburg, Springer, 2015.
  5. Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel: Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making, 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), LNCS 9190, Springer, Los Angeles, 2015.
  6. Luca Caviglione, Jean-Francois Lalande, Wojciech Mazurczyk, Steffen Wendzel: Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), LNCS 9190, Springer, Los Angeles, 2015.
  7. Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel: “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography, Journal of Communications (JCM), reprint of an ICNIT 2015 paper, Vol. 10(10), pp. 747-752, 2015.
  8. Contibutor of ENISA's Security and Resilience of Smart Home Environments: Good Practices and Recommendations, 2015.
  9. Contributor of the Network and Information Security (NIS) Platform's Strategic Research Agenda (SRA) as announced in the Cybersecurity Strategy of the European Union, 2015.
  10. Contributor of the Network and Information Security (NIS) Platform's State of the Art of the Secure ICT Landscape Deliverable v2, 2015. 
  11. Jaspreet Kaur, Christian Herdin, Jernej Tonejc, Steffen Wendzel, Michael Meier, Sebastian Szlósarczyk: Novel Approaches for Security in Building Automation Systems, in Proc. 14. Sicherheitskongress des BSI, pp. 145-158, 2015.
  12. Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel: “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography, ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, 2015.
  13. Eva Maria Anhaus, Steffen Wendzel: BACtag: Data Leakage Protection für Gebäude, in Proc. D-A-CH Security, St. Augistin, 2015.
  14. Steffen Wendzel, Michael Meier, Jernej Tonejc: Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation, BusSysteme Magazin, 22. Jahrgang, no. 4, p. 257, 2015. 
  15. Matthias Wübbeling, Steffen Wendzel: IT-Sicherheitsmonitoring, in: Cyber Security Report 2015, Mittler-Report, pp. 19-21, 2015.

2014

  1. Steffen Wendzel, Jörg Keller: Hidden and Under Control:  A Survey and Outlook on Covert Channel-internal Control Protocols, Annals of Telecommunications (ANTE), Vol. 69, Issue 7, pp. 417-430, Springer Paris, 2014.
  2. Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier: Hidden and Uncontrolled - On the Emergence of Network Steganography, Information Security Solutions Europe (ISSE'14), in: Securing Electronic Business Processes, pp. 123-133, Brussels, Springer-Vieweg, 2014.
  3. Steffen Wendzel, Christian Herdin, Roman Wirth, Masood Masoodian, Santonio Luz, Jaspreet Kaur: Mosaic-chart based Visualization in Building Automation Systems, 9th Future Security (Security Research Conference), pp. 687-690, Fraunhofer Verlag/MEV Verlag, Berlin, 2014.
  4. Steffen Wendzel, Viviane Zwanger, Michael Meier, Sebastian Szlósarczyk:
    Envisioning Smart Building Botnets, GI Sicherheit 2014, LNI 228, pp. 319-329, GI, Vienna, 2014.
  5. Sebastian Szlósarczyk, Steffen Wendzel, Jaspreet Kaur, Michael Meier, Frank Schubert: Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet, Sicherheit 2014, LNI 228, pp. 407-418, GI, Vienna, 2014.
  6. Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk, Steffen Wendzel: A Cost-Efficient Building Automation Security Testbed for Educational Purposes, poster at SECURWARE 2014, Lisbon, 2014.
  7. Jaspreet Kaur, Steffen Wendzel: Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose, CSCUB, Bonn, 2014.
  8. Steffen Wendzel, Jörg Keller: IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten, Controlling (Zeitschrift für erfolgsorientierte Unternehmenssteuerung), vol. 26, no 14/6, pp. 304-308, DOI: 10.15358/0935-0381_2014_6_304, Beck, 2014.
  9. Steffen Wendzel, Johannes Plötner: Einstieg in Linux, 6th Ed., Galileo Press, 2014.
  10. Kirsten Messer-Schmidt, Dirk Rösler, Christopher Ruppricht, Heinrich Seebauer, Steffen Wendzel: Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik), digitalbusiness CLOUD, no. 8, pp. 40-41, 2014. 
  11. Steffen Wendzel: Exfiltration vertrauenswürdiger Daten - Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher, digitalbusiness CLOUD, no. 2, p. 37, 2014. 

2013

  1. Steffen Wendzel: Novel Approaches for Network Covert Storage Channels, PhD thesis, University of Hagen, submitted: Jan-2013, defended: May-2013.
  2. Jean-François Lalande, Steffen Wendzel: Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, Proc. ARES 2013, part of ECTCM workshop, pp. 701-710, Regensburg, 2013. (slides [pdf], download paper via IEEE Xplore)
  3. Christoph Pohl, Sebastian Schinzel, Steffen Wendzel (Eds.): Tagungsband zum 8. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2013-01, ISSN 2190-846X, München, 2013.
  4. Benjamin Kahler, Steffen Wendzel: How to own a Building? Wardriving gegen die Gebäude-Automation, 20. DFN Workshop „Sicherheit in vernetzten Systemen“, pp. H1-H13, 2013.
  5. Steffen Wendzel: Gefahrenpotential der Netzwerksteganografie, IT-SICHERHEIT, no. 6, pp. 58-59, 2013.
  6. Steffen Wendzel: Sicherheitsaspekte in der Gebäude-Automation. Perspektiven der Personenüberwachung, IT-SICHERHEIT, no. 3, pp. 70-72, 2013. 

2012

  1. Steffen Wendzel, Jörg Keller: Preventing Protocol Switching Covert Channels, International Journal On Advances in Security, vol. 5 no. 3&4, pp. 81-93, IARIA, 2012.
  2. Steffen Wendzel, Sebastian Zander: Detecting Protocol Switching Covert Channels, 37th IEEE Conf. on Local Computer Networks (LCN), pp. 280-283, Clearwater, Florida, 2012. (download via IEEE Xplore)
  3. Steffen Wendzel, Jörg Keller: Systematic Engineering of Control Protocols for Covert Channels, 13th Conference on Communications and Multimedia Security (CMS 2012), LNCS 7394, pp. 131-144, Kent (Great Britain), Springer, 2012.
  4. Peter Backs, Steffen Wendzel, Jörg Keller: Dynamic Routing in Covert Channel Overlays Based on Control Protocols, Proc. 7th International Conference for Internet Technology and Secured Transactions (ICITST'12), part of ISTP'12 workshop, IEEE, pp. 32-39, London, 2012.
  5. Steffen Wendzel, Benjamin Kahler, Thomas Rist: Covert Channels and their Prevention in Building Automation Protocols - A Prototype Exemplified Using BACnet, Proc. GreenCom 2012 / iThings 2012 / CPSCom 2012, part of 2nd Workshop on Security of Systems and Software Resiliency, pp. 731-736, Besançon, France, IEEE, 2012. (download via IEEE Xplore)
  6. Steffen Wendzel: Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden, Proc. IEEE International Conference on Communications (ICC), part of SFCS'12 workshop, Ottawa, Canada, pp. 6753-6758, 2012.
  7. Thomas Rist, Steffen Wendzel, Masood Masoodian, Elisabeth André: Next-Generation Home Automation Systems, Techniken für Menschen im nächsten Jahrzehnt -- Beiträge zum Usability Day X, Pabst Science Publishers, pp. 80-87, Dornbirn, AT, 2012.
  8. Steffen Wendzel, Jörg Keller: Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 1-6, IARIA, Stuttgart, Germany, 2012. Publication received a Best Paper Award.
  9. Steffen Wendzel: The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase, Sicherheit 2012 (6. Jahrestagung des Fachbereichs Sicherheit), LNI vol. 195, pp. 149-161, Gesellschaft für Informatik, Darmstadt, Germany, 2012.
  10. Steffen Wendzel: Control Protocols for Network Covert Channels,
    7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01, page 24, Berlin, 2012.
  11. Steffen Wendzel: Tunnel und verdeckte Kanäle im Netz, 1st Ed. Springer-Vieweg, 2012.
  12. Johannes Plötner, Steffen Wendzel: Linux. Das umfassende Handbuch, 5th Ed., Galileo Press, 2012. [Download]
  13. Steffen Wendzel, Johannes Plötner: Einstieg in Linux, 5th Ed., Galileo Press, 2012.
  14. Steffen Wendzel, Jörg Keller: Einführung in die Forschungsthematik der verdeckten Kanäle, In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen?, Buchkapitel, Editors: S. Schumacher, R. Pfeiffer, BoD, pp. 91-102, 2012.
  15. Steffen Wendzel: Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme, BusSysteme Magazin, no. 03, pp. 182-183, 2012.
  16. Steffen Wendzel, Thomas Rist, Roman Wirth, Elisabeth André, Masood Masoodian: Sicherheit beim Energiesparen durch Abstraktion, BusSysteme Magazin, no. 2, pp. 124-125, 2012.
  17. Roland Koch, Steffen Wendzel: Social Network Security, pt. 2, Hakin9 (en), no. 1, 2012.
  18. Steffen Wendzel, Roland Koch: Social Network Security, pt. 1, Hakin9 (en), no. 1, 2012.
  19. Thomas Rist, Steffen Wendzel: Internationale Forschungskooperation IT4SE, Jahresbericht der Hochschule Augsburg, p. 116, 2012.
  20. Steffen Wendzel: Novel Developments in the Area of Network Covert Channels, Forschungsbericht der Hochschule Augsburg, pp. 108-112, 2012.
  21. Roland Koch, Steffen Wendzel: Social Network Security Project, Forschungsbericht der Hochschule Augsburg, pp. 158-162, 2012.
  22. Steffen Wendzel: Sichere Middleware für Gebäude-Automation, Forschungsbericht der Hochschule Augsburg, pp. 155, 2012.

2011

  1. Steffen Wendzel, Jörg Keller: Low-attention forwarding for mobile network covert channels, 12th Conference on Communications and Multimedia Security (CMS 2011), LNCS vol. 7025, pp. 122-133, Springer, Ghent, Belgium, 2011.
  2. Thomas Rist, Steffen Wendzel, Masood Masoodian, Paul Monigatti, Elisabeth André: Creating Awareness for Efficient Energy Use in Smart Homes, Intelligent Wohnen. Zusammenfassung der Beiträge zum Usability Day IX, Feuerstein Gerhild, Ritter Walter (Hrsg.), pp. 162-168, Dornbirn, AT, 2011.
  3. Steffen Wendzel, Thomas Rist, Elisabeth André, Masood Masoodian: A secure interoperable architecture for building automation applications, ISABEL'11, ACM, pp. 8:1-8:5, Barcelona, 2011.  
  4. Thomas Rist, Steffen Wendzel, Elisabeth André, Masood Masoodian: IT4SE – IT for smart renewable energy generation and use. News from a German - New Zealand Research Cooperation within the BMBF-funded APRA Initiative, Forschungsbericht der Hochschule Augsburg, pp. 59-66, October 2011.
  5. Steffen Wendzel: Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle, Master's thesis, Augsburg University of Applied Sciences, Jun-2011.
  6. Steffen Wendzel, Jörg Keller: Einführung in die Forschungsthematik der verdeckten Kanäle, Magdeburger Journal zur Sicherheitsforschung, Bd. 2, pp. 115-124, 2011. 
  7. Steffen Wendzel: Mikroprotokolle in verdeckten Netzwerkkanälen, Informatik Ruhr: Doktorandenkolleg 2011, Oct 6-7, Meinerzhagen Valbert, p. 35, Germany, 2011.
  8. Johannes Plötner, Steffen Wendzel: Linux. Das umfassende Handbuch, 4th Ed., Galileo Press, 2011.
  9. Steffen Wendzel: Bewusstsein für Sicherheit im Bereich der Gebäudeautomatisierung, Hakin9 (de), no.3, pp. 11-12, 2011. 

2010

  1. Steffen Wendzel, Johannes Plötner: Einstieg in Linux – eine distributionsunabhängige Einführung, 4rd Ed., Galileo Press, 2010.
  2.  

2009

  1. Steffen Wendzel: Protokollwechsel zur Realisierung von Covert Channels und Header-Strukturveränderungen zur Vermeidung von Covert Channels, Diplomarbeit, Kempten University of Applied Sciences, May-2009.
  2. Steffen Wendzel: Protocol Channels, Kempten University of Applied Sciences, technical report/published on ArXiv, July 2009.
  3. Johannes Plötner, Steffen Wendzel: Linux. Das umfassende Handbuch, 3rd Ed., Galileo Press, 2009.
  4. Steffen Wendzel: Protocol Channels, Hakin9 (en), no. 06, 2009.

2008

  1. Johannes Plötner, Steffen Wendzel: Linux. Das umfassende Handbuch, 2nd Ed., Galileo Press, 2008.
  2. Steffen Wendzel, Johannes Plötner: Einstieg in Linux – eine distributionsunabhängige Einführung, 3rd Ed., Galileo Press, 2008.
  3. Steffen Wendzel: Intrusion Detection über Benutzerprofile, Hakin9 05/2008.
  4. Steffen Wendzel: Protocol Hopping Covert Channels, Hakin9, no. 03, 2008.

2007

  1. Johannes Plötner, Steffen Wendzel: Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, [Download] 2nd Ed., Galieo Press, 2007. 
  2. Steffen Wendzel: Forensik nach Angriffen auf Linux-Systeme, Hakin9, no. 06, 2007.
  3. Steffen Wendzel: Abhärtung von Linux/BSD Systemen. Eine Einführung, Hakin9, no. 04, 2007.
  4. Steffen Wendzel: Hostbasierte Intrusion Detection. Ein Einblick, Hakin9, no. 02, 2007.
  5. Steffen Wendzel: Firewalls umgehen mit Protokoll-Tunneling, Hakin9, no. 01, 2007.

2006

  1. Johannes Plötner, Steffen Wendzel: Linux. Ein distributionsunabhängiges Handbuch, 1st Ed., Galileo Press, 2006.
  2. Steffen Wendzel, Johannes Plötner: Einstieg in Linux – eine distributionsunabhängige Einführung, 2nd Ed., Galileo Press, 2006.
  3. Johannes Plötner, Steffen Wendzel: Versionsverwaltung, Linux-User 10/2006.

2005

  1. Johannes Plötner, Steffen Wendzel: Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 1st Ed., Galieo Press, 2005.
  2. Steffen Wendzel: Xyria:CDPNNTPd, FreeX, no. 5, 2005.

2004

  1. Steffen Wendzel, Johannes Plötner: Einstieg in Linux – eine distributionsunabhängige Einführung, 1st Ed., Galileo Press, 2004.

2003

  1. Steffen Wendzel: Das Allround-Genie Z-Shell, FreeX, no. 6, 2003.
  2. Steffen Wendzel: sysctl in OpenBSD, FreeX, no. 5, 2003.