@incollection{NiemuellerZwillingLakemeyeretal.2017, author = {Niemueller, Tim and Zwilling, Frederik and Lakemeyer, Gerhard and L{\"o}bach, Matthias and Reuter, Sebastian and Jeschke, Sabina and Ferrein, Alexander}, title = {Cyber-Physical System Intelligence}, series = {Industrial Internet of Things}, booktitle = {Industrial Internet of Things}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42559-7}, doi = {10.1007/978-3-319-42559-7_17}, pages = {447 -- 472}, year = {2017}, abstract = {Cyber-physical systems are ever more common in manufacturing industries. Increasing their autonomy has been declared an explicit goal, for example, as part of the Industry 4.0 vision. To achieve this system intelligence, principled and software-driven methods are required to analyze sensing data, make goal-directed decisions, and eventually execute and monitor chosen tasks. In this chapter, we present a number of knowledge-based approaches to these problems and case studies with in-depth evaluation results of several different implementations for groups of autonomous mobile robots performing in-house logistics in a smart factory. We focus on knowledge-based systems because besides providing expressive languages and capable reasoning techniques, they also allow for explaining how a particular sequence of actions came about, for example, in the case of a failure.}, language = {en} } @inproceedings{WeberWolf2017, author = {Weber, Niklas and Wolf, Martin}, title = {Datenerhebung f{\"u}r die CDG-Forschung}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017 : angewandte Forschung in der Wirtschaftsinformatik : Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg / Arbeitskreis Wirtschaftsinformatik an Fachhochschulen (AKWI)}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017 : angewandte Forschung in der Wirtschaftsinformatik : Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg / Arbeitskreis Wirtschaftsinformatik an Fachhochschulen (AKWI)}, editor = {Barton, Thomas}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {218 -- 227}, year = {2017}, language = {de} } @inproceedings{StopforthDavrajhFerrein2017, author = {Stopforth, Riaan and Davrajh, Shaniel and Ferrein, Alexander}, title = {Design considerations of the duo fugam dual rotor UAV}, series = {2017 Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech)}, booktitle = {2017 Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech)}, isbn = {978-1-5386-2314-5}, doi = {10.1109/RoboMech.2017.8261115}, pages = {7 -- 13}, year = {2017}, language = {en} } @inproceedings{CzarneckiDietze2017, author = {Czarnecki, Christian and Dietze, Christian}, title = {Domain-Specific reference modeling in the telecommunications industry}, series = {DESRIST 2017: Designing the Digital Transformation}, booktitle = {DESRIST 2017: Designing the Digital Transformation}, editor = {Maedche, Alexander and vom Brocke, Jan and Hevner, Alan}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-59144-5}, doi = {10.1007/978-3-319-59144-5_19}, pages = {313 -- 329}, year = {2017}, abstract = {The telecommunications industry is currently going through a major transformation. In this context, the enhanced Telecom Operations Map (eTOM) is a domain-specific process reference model that is offered by the industry organization TM Forum. In practice, eTOM is well accepted and confirmed as de facto standard. It provides process definitions and process flows on different levels of detail. This article discusses the reference modeling of eTOM, i.e., the design, the resulting artifact, and its evaluation based on three project cases. The application of eTOM in three projects illustrates the design approach and concrete models on strategic and operational levels. The article follows the Design Science Research (DSR) paradigm. It contributes with concrete design artifacts to the transformational needs of the telecommunications industry and offers lessons-learned from a general DSR perspective.}, language = {en} } @book{Muehl2017, author = {M{\"u}hl, Thomas}, title = {Elektrische Messtechnik : Grundlagen, Messverfahren, Anwendungen}, edition = {5., {\"u}berarbeitete und erweiterte Auflage}, publisher = {Springer Vieweg}, address = {Wiesbaden}, isbn = {978-3-658-15719-7}, doi = {10.1007/978-3-658-15720-3}, pages = {XVI, 306 Seiten, Illustrationen}, year = {2017}, language = {de} } @inproceedings{ThomeCzarneckiAuthetal.2017, author = {Thom{\´e}, Tristan Eberhard and Czarnecki, Christian and Auth, Gunnar and Bensberg, Frank}, title = {Erweiterung des Referenzprozessmodells eTOM um die Anforderungen des deutschen IT-Sicherheitsgesetzes}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, editor = {Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {51 -- 60}, year = {2017}, abstract = {Kritische Infrastrukturen sind prim{\"a}re Ziele krimineller Hacker. Der Deutsche Bundestag reagierte darauf am 25. Juli 2015 mit einem Gesetz zur Verbesserung der Sicherheit von ITSystemen, dem IT-Sicherheitsgesetz. Dies verlangt von Betreibern kritischer Infrastrukturen, angemessene Mindeststandards f{\"u}r organisatorische und technische Sicherheit zu implementieren, um den Betrieb und die Verf{\"u}gbarkeit dieser Infrastruktur zu gew{\"a}hrleisten. Telekommunikationsunternehmen sind einerseits von diesem Gesetz in besonderem Maße betroffen und verf{\"u}gen andererseits mit dem Rahmenwerk enhanced Telecom Operations Map (eTOM) {\"u}ber ein international anerkanntes Referenzmodell zur Gestaltung von Gesch{\"a}ftsprozessen in dieser Branche. Da s{\"a}mtliche Telekommunikationsunternehmen in Deutschland verpflichtet sind, das Gesetz innerhalb eines bestimmten Zeitrahmens zu implementieren, pr{\"a}sentiert dieser Beitrag einen Vorschlag zur Erweiterung von eTOM um die relevanten Anforderungen des deutschen IT-Sicherheitsgesetzes.}, language = {de} } @inproceedings{NiemuellerNeumannHenkeetal.2017, author = {Niemueller, Tim and Neumann, Tobias and Henke, Christoph and Sch{\"o}nitz, Sebastian and Reuter, Sebastian and Ferrein, Alexander and Jeschke, Sabina and Lakemeyer, Gerhard}, title = {Improvements for a robust production in the RoboCup logistics league 2016}, series = {RoboCup 2016: Robot World Cup XX. RoboCup 2016.}, booktitle = {RoboCup 2016: Robot World Cup XX. RoboCup 2016.}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-68792-6}, doi = {10.1007/978-3-319-68792-6_49}, pages = {589 -- 600}, year = {2017}, language = {en} } @article{NoureddineKraffLaddetal.2017, author = {Noureddine, Yacine and Kraff, Oliver and Ladd, Mark E. and Wrede, Karsten H. and Chen, Bixia and Quick, Harald H. and Schaefers, Gregor and Bitz, Andreas}, title = {In vitro and in silico assessment of RF-induced heating around intracranial aneurysm clips at 7 Tesla}, series = {Magnetic Resonance in Medicine}, journal = {Magnetic Resonance in Medicine}, number = {Early view}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.26650}, pages = {14 Seiten}, year = {2017}, language = {en} } @inproceedings{NiemuellerNeumannHenkeetal.2017, author = {Niemueller, Tim and Neumann, Tobias and Henke, Christoph and Sch{\"o}nitz, Sebastian and Reuter, Sebastian and Ferrein, Alexander and Jeschke, Sabina and Lakemeyer, Gerhard}, title = {International Harting Open Source Award 2016: Fawkes for the RoboCup Logistics League}, series = {RoboCup 2016: RoboCup 2016: Robot World Cup XX. RoboCup 2016}, booktitle = {RoboCup 2016: RoboCup 2016: Robot World Cup XX. RoboCup 2016}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-68792-6}, doi = {10.1007/978-3-319-68792-6_53}, pages = {634 -- 642}, year = {2017}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} }