@article{FaganBitzBjoerkmanBurtscheretal.2021, author = {Fagan, Andrew J. and Bitz, Andreas and Bj{\"o}rkman-Burtscher, Isabella M. and Collins, Christopher M. and Kimbrell, Vera and Raaijmakers, Alexander J. E.}, title = {7T MR Safety}, series = {Journal of Magnetic Resonance Imaging (JMRI)}, volume = {53}, journal = {Journal of Magnetic Resonance Imaging (JMRI)}, number = {2}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2586}, doi = {10.1002/jmri.27319}, pages = {333 -- 346}, year = {2021}, language = {en} } @article{FiedlerLaddClemensetal.2020, author = {Fiedler, Thomas M. and Ladd, Mark E. and Clemens, Markus and Bitz, Andreas}, title = {Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging}, series = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, volume = {2}, journal = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, number = {3}, publisher = {IEEE}, address = {New York, NY}, isbn = {2637-6423}, doi = {10.1109/LEMCPA.2020.3029747}, pages = {1 -- 8}, year = {2020}, abstract = {Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.}, language = {en} } @article{SerrorHackHenzeetal.2021, author = {Serror, Martin and Hack, Sacha and Henze, Martin and Schuba, Marko and Wehrle, Klaus}, title = {Challenges and Opportunities in Securing the Industrial Internet of Things}, series = {IEEE Transactions on Industrial Informatics}, volume = {17}, journal = {IEEE Transactions on Industrial Informatics}, number = {5}, publisher = {IEEE}, address = {New York}, issn = {1941-0050}, doi = {10.1109/TII.2020.3023507}, pages = {2985 -- 2996}, year = {2021}, language = {en} } @article{OrzadaFiedlerBitzetal.2020, author = {Orzada, Stephan and Fiedler, Thomas M. and Bitz, Andreas and Ladd, Mark E. and Quick, Harald H.}, title = {Local SAR compression with overestimation control to reduce maximum relative SAR overestimation and improve multi-channel RF array performance}, series = {Magnetic Resonance Materials in Physics, Biology and Medicine}, journal = {Magnetic Resonance Materials in Physics, Biology and Medicine}, number = {34 (2021)}, publisher = {Springer}, address = {Heidelberg}, isbn = {1352-8661}, doi = {10.1007/s10334-020-00890-0}, pages = {153 -- 164}, year = {2020}, abstract = {Objective In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance. Method Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression. Result Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20\% at the cost of a higher absolute overestimation at high actual local SAR values. Conclusion The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.}, language = {en} } @article{HueningDeMatteis2020, author = {H{\"u}ning, Felix and De Matteis, Stefan}, title = {Entwicklung eines taktilen HMI f{\"u}r sehbehinderte und blinde Nutzerinnen und Nutzer}, series = {Blind - sehbehindert}, volume = {140}, journal = {Blind - sehbehindert}, number = {2}, publisher = {Edition Bentheim}, address = {W{\"u}rzburg}, issn = {0176-7836}, pages = {9 -- 19}, year = {2020}, language = {de} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{LimpertWiesenFerreinetal.2019, author = {Limpert, Nicolas and Wiesen, Patrick and Ferrein, Alexander and Kallweit, Stephan and Schiffer, Stefan}, title = {The ROSIN Project and its Outreach to South Africa}, series = {R\&D Journal}, volume = {35}, journal = {R\&D Journal}, pages = {1 -- 6}, year = {2019}, language = {en} } @article{OrzadaSolbachGratzetal.2019, author = {Orzada, Stephan and Solbach, Klaus and Gratz, Marcel and Brunheim, Sascha and Fiedler, Thomas M. and Johst, S{\"o}ren and Bitz, Andreas and Shooshtary, Samaneh and Abuelhaija, Asjraf and Voelker, Maximilian N. and Rietsch, Stefan H. G. and Kraff, Oliver and Maderwald, Stefan and Fl{\"o}ser, Martina and Oehmingen, Mark and Quick, Harald H. and Ladd, Mark E.}, title = {A 32-channel parallel transmit system add-on for 7T MRI}, series = {Plos one}, journal = {Plos one}, doi = {10.1371/journal.pone.0222452}, year = {2019}, language = {en} }