Network Information Hiding and Science 2.0: Can it be a Match?


  • Steffen Wendzel Worms University of Applied Sciences
  • Luca Caviglione Institute for Intelligent Systems for Automation (ISSIA), Genova, Italy
  • Wojciech Mazurczyk Warsaw University of Technology, Institute of Telecommunications, Warsaw, Poland
  • Jean-Francois Lalande INSA Centre Val de Loire - Inria, Bourges, France


Science 2.0 aims at using the information sharing
and collaborative features of the Internet to offer new features
to the research community. Science 2.0 has been already applied
to computer sciences, especially bioinformatics. For network
information hiding, a field studying the possibility of concealing a
communication in networks, the application of Science 2.0 is still
a rather uncovered territory. To foster the discussion of potential
benefits for network information hiding, we provide a disquisition
for six different Science 2.0 aspects when applied to this domain.

Author Biography

Steffen Wendzel, Worms University of Applied Sciences

Professor for Information Security and Computer Networks at Worms University of Applied Sciences


D. D. Roure, C. Goble, and R. Stevens, “The design and realisation of the virtual research environment for social sharing of workflows,” Future Generation Computer Systems, vol. 25, no. 5, pp. 561 – 567, 2009.

Zooniverse, “Galaxy Zoo website,” 2015,

Cornell University, “ArXiv website,” 2015,

W. Mazurczyk and L. Caviglione, “Information hiding as a challenge for malware detection,” IEEE Security & Privacy, vol. 13, no. 2, pp. 89–93, 2015.

J. Priem and B. M. Hemminger, “Scientometrics 2.0: Toward new metrics of scholarly impact on the social web,” First Monday, vol. 15, no. 7, July 2010.

T. Lin, “Cracking open the scientific process,” January 2012,

T. W. Nattkemper, “Are we ready for science 2.0?” in International Conference on Knowledge Management and Information Sharing, K. Liu and J. Filipe, Eds., Barcelona, Spain, 2012, pp. 302–306.

T. Bcheler and J. H. Sieg, “Understanding science 2.0: Crowdsourcing and open innovation in the scientific method,” Procedia Computer Science, vol. 7, no. 0, pp. 327 – 329, 2011.

J. West, A. Salter, W. Vanhaverbeke, and H. Chesbrough, “Open innovation: The next decade,” Research Policy, vol. 43, no. 5, pp. 805 – 811, 2014, open Innovation: New Insights and Evidence.

C. Franzoni and H. Sauermann, “Crowd science: The organization of scientific research in open collaborative projects,” Research Policy, vol. 43, no. 1, pp. 1 – 20, 2014.

K. Laursen and A. J. Salter, “The paradox of openness: Appropriability, external search and collaboration,” Research Policy, vol. 43, no. 5, pp. 867 – 878, 2014, open Innovation: New Insights and Evidence.

T. Anderson, “Conference reviewing considered harmful,” ACM SIGOPS Operating Systems Review, vol. 43, no. 2, pp. 108–116, 2009.

A. Aviẑienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of depandable and secure computing,” IEEE Trans. Depandable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.

D. K. Simonton, Creativity in science: Chance, logic, genius, and zeitgeist. Cambridge University Press, 2004.

S. Wendzel, S. Zander, B. Fechner, and C. Herdin, “Pattern-based survey and categorization of network covert channel techniques,” ACM Computing Surveys (CSUR), vol. 47, no. 3, 2015.

W. Mazurczyk and L. Caviglione, “Steganography in modern smart-phones and mitigation techniques,” Communications Surveys Tutorials, IEEE, vol. 17, no. 1, pp. 334–357, Firstquarter 2015.

“User interface design patterns,” 2015,

“Github website,” 2015,

M. McLennan and R. Kennell, “Hubzero: A platform for dissemination and collaboration in computational science and engineering,” Computing in Science Engineering, vol. 12, no. 2, pp. 48–53, March 2010.

S. Wendzel and W. Mazurczyk, “Poster: An educational network protocol for covert channel analysis using patterns,” in Proc. 23rd ACM Conference on Computer and Communications Security (CCS). ACM, 2016, pp. 1739–1741.

F. Bertolotti, E. Mattarelli, M. Vignoli, and D. M. Macr, “Exploring the relationship between multiple team membership and team performance: The role of social networks and collaborative technology,” Research Policy, vol. 44, pp. 911–924, 2015.

R. Van Noorden, “Online collaboration: Scientists and the social network,” Nature (News Feature), vol. 512, pp. 126–129, August 2014.

Google Inc., “Google scholar website,” 2015,

ResearchGate GmbH, “ResearchGate website,” 2015,

“Overleaf website,” 2015,

“Authorea website,” 2015,

Mendeley Ltd., “Mendeley website,” 2015,

K. A. Khor and L.-G. Yu, “Influence of international co-authorship on the research citation impact of young unviersities,” Scientometrics, vol. 107, pp. 1095–1110, 2016.

J. Kosten, “A classification of the use of research indicators,” Scientometrics, vol. 108, pp. 457–464, 2016.

J. C. Mogul, “Towards more constructive reviewing of CS papers,” ACM SIGCOMM Computer Communication Review, vol. 43, no. 3, pp. 90–94, Jul. 2013.

B. Meyer, “The nastiness problem in computer science,” BLOG@CACM, August 2011,

R. A. Kemmerer, “Shared resource matrix methodology: an approach to identifying storage and timing channels,” ACM Transactions on Computer Systems, vol. 1, no. 3, pp. 256–277, 1983.






Internet Engineering, Web Technology