@article{HueningHeuermannWache2018, author = {H{\"u}ning, Felix and Heuermann, Holger and Wache, Franz-Josef}, title = {Wireless CAN without WLAN or Bluetooth}, series = {CAN Newsletter}, journal = {CAN Newsletter}, number = {December 2018}, pages = {44 -- 46}, year = {2018}, abstract = {In two developed concepts, dual-mode radio enables CAN participants to be integrated wirelessly into a CAN network. Constructed from a few components, a protocol-free, real-time transmission and thus transparent integration into CAN is provided.}, language = {en} } @inproceedings{HeuermannHarzheimMuehmel2021, author = {Heuermann, Holger and Harzheim, Thomas and M{\"u}hmel, Marc}, title = {A maritime harmonic radar search and rescue system using passive and active tags}, series = {2020 17th European Radar Conference (EuRAD)}, booktitle = {2020 17th European Radar Conference (EuRAD)}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-2-87487-061-3}, doi = {10.1109/EuRAD48048.2021.00030}, pages = {73 -- 76}, year = {2021}, abstract = {This article introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested attached to life jackets and a rescue boat. This system was able to detect and range the active tags up to a range of 5800 m in tests on the Baltic Sea with an antenna input power of only 100 W. All electronic GHz components of the system, excluding the S-band power amplifier, were custom developed for this purpose. Special attention is given to the performance and conceptual differences between passive and active tags used in the system and integration with a maritime X-band navigation radar is demonstrated.}, language = {en} } @inproceedings{FerreinMeessenLimpertetal.2021, author = {Ferrein, Alexander and Meeßen, Marcus and Limpert, Nicolas and Schiffer, Stefan}, title = {Compiling ROS schooling curricula via contentual taxonomies}, series = {Robotics in Education}, booktitle = {Robotics in Education}, editor = {Lepuschitz, Wilfried}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-67411-3}, doi = {10.1007/978-3-030-67411-3_5}, pages = {49 -- 60}, year = {2021}, abstract = {The Robot Operating System (ROS) is the current de-facto standard in robot middlewares. The steadily increasing size of the user base results in a greater demand for training as well. User groups range from students in academia to industry professionals with a broad spectrum of developers in between. To deliver high quality training and education to any of these audiences, educators need to tailor individual curricula for any such training. In this paper, we present an approach to ease compiling curricula for ROS trainings based on a taxonomy of the teaching contents. The instructor can select a set of dedicated learning units and the system will automatically compile the teaching material based on the dependencies of the units selected and a set of parameters for a particular training. We walk through an example training to illustrate our work.}, language = {en} } @article{RoepkeKoehlerDruryetal.2020, author = {Roepke, Rene and K{\"o}hler, Klemens and Drury, Vincent and Schroeder, Ulrik and Wolf, Martin and Meyer, Ulrike}, title = {A pond full of phishing games - analysis of learning games for anti-phishing education}, series = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, journal = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-62433-0}, doi = {10.1007/978-3-030-62433-0_32020}, pages = {41 -- 60}, year = {2020}, abstract = {Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom's Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.}, language = {en} } @inproceedings{HoegenDonckerRuetters2020, author = {Hoegen, Anne von and Doncker, Rik W. De and R{\"u}tters, Ren{\´e}}, title = {Teaching Digital Control of Operational Amplifier Processes with a LabVIEW Interface and Embedded Hardware}, series = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, booktitle = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.23919/ICEMS50442.2020.9290928}, pages = {1117 -- 1122}, year = {2020}, abstract = {Control engineering theory is hard to grasp for undergraduates during the first semesters, as it deals with the dynamical behavior of systems also in combination with control strategies on an abstract level. Therefore, operational amplifier (OpAmp) processes are reasonable and very effective systems to connect mathematical description with actual system's behavior. In this paper, we present an experiment for a laboratory session in which an embedded system, driven by a LabVIEW human machine interface (HMI) via USB, controls the analog circuits.With this setup we want to show the possibility of firstly, analyzing a first order process and secondly, designing a P-and PI-controller. Thereby, the theory of control engineering is always applied to the empirical results in order to break down the abstract level for the students.}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @article{Wolf2000, author = {Wolf, Martin}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin}, volume = {21}, journal = {ACM SIGGROUP Bulletin}, number = {2}, issn = {2372-7403}, doi = {10.1145/605660.605662}, pages = {5 -- 8}, year = {2000}, abstract = {his report summarizes the results of a workshop on Groupware related task design which took place at the International Conference on Supporting Group Work Group'99, Arizona, from 14 th to 17 th November 1999. The workshop was addressed to people from different viewpoints, backgrounds, and domains: - Researchers dealing with questions of task analysis and task modeling for Groupware application from an academic point of view. They may contribute modelbased design approaches or theoretically oriented work - Practitioners with experience in the design and everyday use of groupware systems. They might refer to the practical side of the topic: "real" tasks, "real" problems, "real" users, etc.}, language = {en} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{DowidatKoenigWolf2017, author = {Dowidat, Linda and K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The motivational competence developing game framework}, series = {Mensch und Computer 2017 - Tagungsband}, booktitle = {Mensch und Computer 2017 - Tagungsband}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Regensburg}, doi = {10.18420/muc2017-mci-0130}, pages = {15 -- 26}, year = {2017}, abstract = {Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This 'motivational Competence Developing Game Framework' demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.}, language = {en} }