@article{SerrorHackHenzeetal.2021, author = {Serror, Martin and Hack, Sacha and Henze, Martin and Schuba, Marko and Wehrle, Klaus}, title = {Challenges and Opportunities in Securing the Industrial Internet of Things}, series = {IEEE Transactions on Industrial Informatics}, volume = {17}, journal = {IEEE Transactions on Industrial Informatics}, number = {5}, publisher = {IEEE}, address = {New York}, issn = {1941-0050}, doi = {10.1109/TII.2020.3023507}, pages = {2985 -- 2996}, year = {2021}, language = {en} } @article{OrzadaFiedlerBitzetal.2020, author = {Orzada, Stephan and Fiedler, Thomas M. and Bitz, Andreas and Ladd, Mark E. and Quick, Harald H.}, title = {Local SAR compression with overestimation control to reduce maximum relative SAR overestimation and improve multi-channel RF array performance}, series = {Magnetic Resonance Materials in Physics, Biology and Medicine}, journal = {Magnetic Resonance Materials in Physics, Biology and Medicine}, number = {34 (2021)}, publisher = {Springer}, address = {Heidelberg}, isbn = {1352-8661}, doi = {10.1007/s10334-020-00890-0}, pages = {153 -- 164}, year = {2020}, abstract = {Objective In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance. Method Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression. Result Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20\% at the cost of a higher absolute overestimation at high actual local SAR values. Conclusion The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.}, language = {en} } @article{HueningDeMatteis2020, author = {H{\"u}ning, Felix and De Matteis, Stefan}, title = {Entwicklung eines taktilen HMI f{\"u}r sehbehinderte und blinde Nutzerinnen und Nutzer}, series = {Blind - sehbehindert}, volume = {140}, journal = {Blind - sehbehindert}, number = {2}, publisher = {Edition Bentheim}, address = {W{\"u}rzburg}, issn = {0176-7836}, pages = {9 -- 19}, year = {2020}, language = {de} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{LimpertWiesenFerreinetal.2019, author = {Limpert, Nicolas and Wiesen, Patrick and Ferrein, Alexander and Kallweit, Stephan and Schiffer, Stefan}, title = {The ROSIN Project and its Outreach to South Africa}, series = {R\&D Journal}, volume = {35}, journal = {R\&D Journal}, pages = {1 -- 6}, year = {2019}, language = {en} } @article{OrzadaSolbachGratzetal.2019, author = {Orzada, Stephan and Solbach, Klaus and Gratz, Marcel and Brunheim, Sascha and Fiedler, Thomas M. and Johst, S{\"o}ren and Bitz, Andreas and Shooshtary, Samaneh and Abuelhaija, Asjraf and Voelker, Maximilian N. and Rietsch, Stefan H. G. and Kraff, Oliver and Maderwald, Stefan and Fl{\"o}ser, Martina and Oehmingen, Mark and Quick, Harald H. and Ladd, Mark E.}, title = {A 32-channel parallel transmit system add-on for 7T MRI}, series = {Plos one}, journal = {Plos one}, doi = {10.1371/journal.pone.0222452}, year = {2019}, language = {en} } @article{HofmannLimpertMatareetal.2018, author = {Hofmann, Till and Limpert, Nicolas and Matar{\´e}, Victor and Sch{\"o}nitz, Sebastian and Niemueller, Tim and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {The Carologistics RoboCup Logistics Team 2018}, year = {2018}, abstract = {The Carologistics team participates in the RoboCup Logistics League for the seventh year. The RCLL requires precise vision, manipulation and path planning, as well as complex high-level decision making and multi-robot coordination. We outline our approach with an emphasis on recent modifications to those components. The team members in 2018 are David Bosen, Christoph Gollok, Mostafa Gomaa, Daniel Habering, Till Hofmann, Nicolas Limpert, Sebastian Sch{\"o}nitz, Morian Sonnet, Carsten Stoffels, and Tarik Viehmann. This paper is based on the last year's team description.}, language = {en} } @article{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training}, series = {International Journal on Advances in Security}, volume = {11}, journal = {International Journal on Advances in Security}, number = {3 \& 4}, publisher = {IARIA Journals}, issn = {1942-2636}, pages = {274 -- 287}, year = {2018}, abstract = {To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.}, language = {en} } @article{SchmidtForkmannSchultzetal.2019, author = {Schmidt, Katharina and Forkmann, Katarina and Schultz, Heidrun and Gratz, Marcel and Bitz, Andreas and Wiech, Katja and Bingel, Ulrike}, title = {Enhanced Neural Reinstatement for Evoked Facial Pain Compared With Evoked Hand Pain}, series = {The Journal of Pain}, journal = {The Journal of Pain}, number = {In Press, Corrected Proof}, publisher = {Elsevier}, address = {Amsterdam}, issn = {1526-5900}, doi = {10.1016/j.jpain.2019.03.003}, year = {2019}, language = {en} } @article{NoureddineKraffLaddetal.2019, author = {Noureddine, Yacine and Kraff, Oliver and Ladd, Mark E. and Wrede, Karsten and Chen, Bixia and Quick, Harald H. and Schaefers, Georg and Bitz, Andreas}, title = {Radiofrequency induced heating around aneurysm clips using a generic birdcage head coil at 7 Tesla under consideration of the minimum distance to decouple multiple aneurysm clips}, series = {Magnetic Resonance in Medicine}, journal = {Magnetic Resonance in Medicine}, number = {Early view}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.27835}, pages = {1 -- 17}, year = {2019}, language = {en} } @article{SchoppBritunVoracetal.2019, author = {Schopp, Christoph and Britun, Nikolay and Vorac, Jan and Synek, Petr and Snyders, Rony and Heuermann, Holger}, title = {Thermal and Optical Study on the Frequency Dependence of an Atmospheric Microwave Argon Plasma Jet}, series = {IEEE Transactions on Plasma Science}, volume = {47}, journal = {IEEE Transactions on Plasma Science}, number = {7}, publisher = {IEEE}, address = {New York}, issn = {1939-9375}, pages = {3176 -- 3181}, year = {2019}, language = {en} } @article{ClaerFerreinSchiffer2019, author = {Claer, Mario and Ferrein, Alexander and Schiffer, Stefan}, title = {Calibration of a Rotating or Revolving Platform with a LiDAR Sensor}, series = {Applied Sciences}, volume = {Volume 9}, journal = {Applied Sciences}, number = {issue 11, 2238}, publisher = {MDPI}, address = {Basel}, issn = {2076-3417}, doi = {10.3390/app9112238}, pages = {18 Seiten}, year = {2019}, language = {en} } @article{RietschBrunheimOrzadaetal.2019, author = {Rietsch, Stefan H. G. and Brunheim, Sascha and Orzada, Stephan and Voelker, Maximilian N. and Maderwald, Stefan and Bitz, Andreas and Gratz, Marcel and Ladd, Mark E. and Quick, Harald H.}, title = {Development and evaluation of a 16-channel receive-only RF coil to improve 7T ultra-high field body MRI with focus on the spine}, series = {Magnetic Resonance in Medicine}, journal = {Magnetic Resonance in Medicine}, number = {Early view}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.27731}, year = {2019}, language = {en} } @article{Huening2019, author = {H{\"u}ning, Felix}, title = {Nachr{\"u}stm{\"o}glichkeiten von Dieselfahrzeugen aus technischer Sicht}, series = {Zeitschrift f{\"u}r Verkehrsrecht : NZV}, journal = {Zeitschrift f{\"u}r Verkehrsrecht : NZV}, number = {1}, publisher = {C.H.Beck}, pages = {27 -- 32}, year = {2019}, language = {de} } @article{HueningHeuermannWache2018, author = {H{\"u}ning, Felix and Heuermann, Holger and Wache, Franz-Josef}, title = {Wireless CAN without WLAN or Bluetooth}, series = {CAN Newsletter}, journal = {CAN Newsletter}, number = {December 2018}, pages = {44 -- 46}, year = {2018}, abstract = {In two developed concepts, dual-mode radio enables CAN participants to be integrated wirelessly into a CAN network. Constructed from a few components, a protocol-free, real-time transmission and thus transparent integration into CAN is provided.}, language = {en} } @article{HueningHeuermannWache2018, author = {H{\"u}ning, Felix and Heuermann, Holger and Wache, Franz-Josef}, title = {Wireless CAN}, series = {Etz: Elektrotechnik \& Automation}, volume = {139}, journal = {Etz: Elektrotechnik \& Automation}, number = {10}, publisher = {VDE-Verlag}, address = {Wuppertal}, issn = {0170-1711}, pages = {22 -- 26}, year = {2018}, abstract = {In modernen elektronischen und mechatronischen Systemen, z. B. im industriellen oder automobil Bereich, kommunizieren eingebettete Steuerger{\"a}te und Sensoren vielfach {\"u}ber Bussysteme wie CAN oder LIN. Die Kommunikation findet in der Regel drahtgebunden statt, so dass der Kabelbaum f{\"u}r die Kommunikation sehr groß werden kann. Daher ist es naheliegend, Leitungen und dazugeh{\"o}rige Stecker, z. B. f{\"u}r nicht-sicherheitskritische Komfortsysteme, einzusparen und diese durch gerichtete Funkstrecken f{\"u}r kurze Entfernungen zu ersetzen. Somit k{\"o}nnten Komponenten wie ECUs oder Sensoren kabel- und steckerlos in ein Bussystem integriert werden. Zudem ist eine einfache galvanische und mechanische Trennung zu erreichen. Funk{\"u}bertragung wird bei diesen Bussystemen derzeit nicht eingesetzt, da insbesondere die Echtzeitf{\"a}higkeit und die Robustheit der vorhandenen Funksysteme nicht den Anforderungen der Anwendungen entspricht. Zudem sind bestehende Funksysteme wie WLAN oder Bluetooth im Vergleich zur konventionellen Verkabelung teuer und es besteht hierbei die M{\"o}glichkeit, dass sie ausspioniert werden k{\"o}nnen und so sensible Daten entwendet werden k{\"o}nnen. In dieser Arbeit wird eine alternative Realisierung zu den bestehenden Funksystemen vorgestellt, die aus wenigen Komponenten aufzubauen ist. Es ist eine protokolllose, echtzeitf{\"a}hige {\"U}bertragung m{\"o}glich und somit die transparente Integration in ein Bussystem wie CAN.}, language = {de} } @article{SchifferFerrein2018, author = {Schiffer, Stefan and Ferrein, Alexander}, title = {ERIKA—Early Robotics Introduction at Kindergarten Age}, series = {Multimodal Technologies Interact}, volume = {2}, journal = {Multimodal Technologies Interact}, number = {4}, publisher = {MDPI}, address = {Basel}, issn = {2414-4088}, doi = {10.3390/mti2040064}, pages = {15}, year = {2018}, abstract = {In this work, we report on our attempt to design and implement an early introduction to basic robotics principles for children at kindergarten age. One of the main challenges of this effort is to explain complex robotics contents in a way that pre-school children could follow the basic principles and ideas using examples from their world of experience. What sets apart our effort from other work is that part of the lecturing is actually done by a robot itself and that a quiz at the end of the lesson is done using robots as well. The humanoid robot Pepper from Softbank, which is a great platform for human-robot interaction experiments, was used to present a lecture on robotics by reading out the contents to the children making use of its speech synthesis capability. A quiz in a Runaround-game-show style after the lecture activated the children to recap the contents they acquired about how mobile robots work in principle. In this quiz, two LEGO Mindstorm EV3 robots were used to implement a strongly interactive scenario. Besides the thrill of being exposed to a mobile robot that would also react to the children, they were very excited and at the same time very concentrated. We got very positive feedback from the children as well as from their educators. To the best of our knowledge, this is one of only few attempts to use a robot like Pepper not as a tele-teaching tool, but as the teacher itself in order to engage pre-school children with complex robotics contents.}, language = {en} } @article{HueningHeuermannWacheetal.2018, author = {H{\"u}ning, Felix and Heuermann, Holger and Wache, Franz-Josef and Jajo, Rami Audisho}, title = {A new wireless sensor interface using dual-mode radio}, series = {Journal of Sensors and Sensor Systems : JSSS}, volume = {Volume 7}, journal = {Journal of Sensors and Sensor Systems : JSSS}, number = {2}, publisher = {Copernicus Publ.}, address = {G{\"o}ttingen}, doi = {10.5194/jsss-7-507-2018}, pages = {507 -- 515}, year = {2018}, abstract = {The integration of sensors is one of the major tasks in embedded, control and "internet of things" (IoT) applications. For the integration mainly digital interfaces are used, starting from rather simple pulse-width modulation (PWM) interface to more complex interfaces like CAN (Controller Area Network). Even though these interfaces are tethered by definition, a wireless realization is highly welcome in many applications to reduce cable and connector cost, increase the flexibility and realize new emerging applications like wireless control systems. Currently used wireless solutions like Bluetooth, WirelessHART or IO-Link Wireless use dedicated communication standards and corresponding higher protocol layers to realize the wireless communication. Due to the complexity of the communication and the protocol handling, additional latency and jitter are introduced to the data communication that can meet the requirements for many applications. Even though tunnelling of other bus data like CAN data is generally also possible the latency and jitter prevent the tunnelling from being transparent for the bus system. Therefore a new basic technology based on dual-mode radio is used to realize a wireless communication on the physical layer only, enabling a reliable and real-time data transfer. As this system operates on the physical layer it is independent of any higher layers of the OSI (open systems interconnection) model. Hence it can be used for several different communication systems to replace the tethered physical layer. A prototype is developed and tested for real-time wireless PWM, SENT (single-edge nibble transmission) and CAN data transfer with very low latency and jitter.}, language = {en} }