@inproceedings{GrundAltherr2023, author = {Grund, Raphael M. and Altherr, Lena}, title = {Development of an open source energy disaggregation tool for the home automation platform Home Assistant}, series = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, booktitle = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-01-6}, doi = {10.33968/2023.02}, pages = {11 -- 20}, year = {2023}, abstract = {In order to reduce energy consumption of homes, it is important to make transparent which devices consume how much energy. However, power consumption is often only monitored aggregated at the house energy meter. Disaggregating this power consumption into the contributions of individual devices can be achieved using Machine Learning. Our work aims at making state of the art disaggregation algorithms accessibe for users of the open source home automation platform Home Assistant.}, language = {en} } @inproceedings{ElsenSchmalzbauer2011, author = {Elsen, Ingo and Schmalzbauer, Michael}, title = {Messsystematik zur Steuerung der Produkt- und Prozessqualit{\"a}t in Systemintegrationsprojekten - ein Erfahrungsbericht}, series = {Software Engineering 2011 - Fachtagung des GI-Fachbereichs Softwaretechnik, 21. - 25. Februar 2011 in Karlsruhe}, booktitle = {Software Engineering 2011 - Fachtagung des GI-Fachbereichs Softwaretechnik, 21. - 25. Februar 2011 in Karlsruhe}, editor = {Reussner, Ralf and Grund, Matthias and Oberweis, Andreas and Tichy, Walter}, publisher = {Gesellschaft f{\"u}r Informatik eV}, address = {Bonn}, isbn = {9783885792772}, issn = {1617-5468}, pages = {1 Seite}, year = {2011}, abstract = {Der Erfolg eines Softwarenentwicklungsprojektes insbesondere eines Systemintegrationsprojektes wird mit der Erf{\"u}llung des „Teufelsdreiecks", „In-Time", „In-Budget", „In-Quality" gemessen. Hierzu ist die Kenntnis der Software- und Prozessqualit{\"a}t essenziell, um die Einhaltung der Qualit{\"a}tskriterien festzustellen, aber auch, um eine Vorhersage hinsichtlich Termin- und Budgettreue zu treffen. Zu diesem Zweck wurde in der T-Systems Systems Integration ein System aus verschiedenen Key Performance Indikatoren entworfen und in der Organisation implementiert, das genau das leistet und die Kriterien f{\"u}r CMMI Level 3 erf{\"u}llt.}, language = {de} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @incollection{SchubaHoefken2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm}, title = {Cybersicherheit in Produktion, Automotive und intelligenten Geb{\"a}uden}, series = {IT-Sicherheit - Technologien und Best Practices f{\"u}r die Umsetzung im Unternehmen}, booktitle = {IT-Sicherheit - Technologien und Best Practices f{\"u}r die Umsetzung im Unternehmen}, publisher = {Carl Hanser Verlag}, address = {M{\"u}nchen}, isbn = {978-3-446-47223-5}, doi = {10.3139/9783446473478.012}, pages = {193 -- 218}, year = {2022}, language = {de} } @inproceedings{BroennerHoefkenSchuba2016, author = {Broenner, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Streamlining extraction and analysis of android RAM images}, series = {Proceedings of the 2nd international conference on information systems security and privacy}, booktitle = {Proceedings of the 2nd international conference on information systems security and privacy}, organization = {ICISSP International Conference on Information Systems Security and Privacy <2, 2016, Rome, Italy>}, isbn = {978-989-758-167-0}, doi = {10.5220/0005652802550264}, pages = {255 -- 264}, year = {2016}, language = {en} }