@article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, publisher = {AAAI}, address = {Menlo Park}, pages = {20 -- 28}, year = {2010}, language = {en} } @inproceedings{SchnellBrandesGligorevicetal.2008, author = {Schnell, Michael and Brandes, Sinja and Gligorevic, Snjezana and Walter, Michael and Rihacek, Christoph and Sajatovic, Miodrag and Haindl, Bernhard}, title = {Interference mitigation for broadband L-DACS}, series = {27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn.}, booktitle = {27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn.}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {978-1-4244-2207-4 ; 978-1-4244-2208-1}, pages = {2B2-1 -- 2B2-12}, year = {2008}, language = {en} } @inproceedings{LindenlaufHoefkenSchuba2015, author = {Lindenlauf, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Cold Boot Attacks on DDR2 and DDR3 SDRAM}, series = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, booktitle = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, doi = {10.1109/ARES.2015.28}, pages = {287 -- 292}, year = {2015}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @article{HagemannBachmannLadeetal.1994, author = {Hagemann, Hans-J{\"u}rgen and Bachmann, Peter K. and Lade, H. and Leers, D.}, title = {Diamond chemical vapor deposition: gas compositions and film properties / Bachmann, P.K.; Hagemann, H.-J.; Lade, H; Leers, D.; Picht, F.; Wiechert, D.U.; Wilson, H.}, series = {Diamond, SiC and nitride wide bandgap semiconductors : symposium held April 4 - 8, 1994, San Francisco, California, U.S.A. / ed.: Calvin H. Carter, Jr. ...}, journal = {Diamond, SiC and nitride wide bandgap semiconductors : symposium held April 4 - 8, 1994, San Francisco, California, U.S.A. / ed.: Calvin H. Carter, Jr. ...}, address = {Pittsburgh, Penn.}, isbn = {1-55899-239-1}, pages = {267 -- 277}, year = {1994}, language = {en} } @inproceedings{GligorevicJostWalter2009, author = {Gligorevic, Snjezana and Jost, T. and Walter, Michael}, title = {Scatterer based airport surface channel model}, series = {IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla.}, booktitle = {IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla.}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {978-1-4244-4078-8}, pages = {4C2-1 -- 4C2-10}, year = {2009}, language = {en} } @inproceedings{SchifferFerreinLakemeyer2011, author = {Schiffer, Stefan and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Fuzzy representations and control for domestic service robots in Golog}, series = {Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102)}, booktitle = {Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102)}, publisher = {ACM}, address = {New York}, isbn = {978-3-642-25486-4}, doi = {10.1007/978-3-642-25489-5_24}, pages = {241 -- 250}, year = {2011}, abstract = {In the RoboCup@Home domestic service robot competition, complex tasks such as "get the cup from the kitchen and bring it to the living room" or "find me this and that object in the apartment" have to be accomplished. At these competitions the robots may only be instructed by natural language. As humans use qualitative concepts such as "near" or "far", the robot needs to cope with them, too. For our domestic robot, we use the robot programming and plan language Readylog, our variant of Golog. In previous work we extended the action language Golog, which was developed for the high-level control of agents and robots, with fuzzy concepts and showed how to embed fuzzy controllers in Golog. In this paper, we demonstrate how these notions can be fruitfully applied to two domestic service robotic scenarios. In the first application, we demonstrate how qualitative fluents based on a fuzzy set semantics can be deployed. In the second program, we show an example of a fuzzy controller for a follow-a-person task.}, language = {en} } @inproceedings{LogenHoefkenSchuba2012, author = {Logen, Steffen and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework}, series = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, booktitle = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, publisher = {IEEE}, address = {New York}, isbn = {978-1-4673-2244-7}, doi = {10.1109/ARES.2012.12}, pages = {620 -- 624}, year = {2012}, abstract = {The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database.}, language = {en} } @article{FerreinSiebelSteinbauer2010, author = {Ferrein, Alexander and Siebel, Nils T. and Steinbauer, Gerald}, title = {Hybrid control for autonomous systems — Integrating learning, deliberation and reactive control}, series = {Robotics and Autonomous Systems}, volume = {58}, journal = {Robotics and Autonomous Systems}, number = {9}, publisher = {Elsevier}, address = {Amsterdam}, issn = {0921-8890}, doi = {10.1016/j.robot.2010.06.003}, pages = {1037 -- 1038}, year = {2010}, language = {en} } @inproceedings{VladovaUllrichSultanowetal.2023, author = {Vladova, Gergana and Ullrich, Andr{\´e} and Sultanow, Eldar and Tobolla, Marinho and Sebrak, Sebastian and Czarnecki, Christian and Brockmann, Carsten}, title = {Visual analytics for knowledge management}, series = {INFORMATIK 2023 - Designing Futures: Zuk{\"u}nfte gestalten}, booktitle = {INFORMATIK 2023 - Designing Futures: Zuk{\"u}nfte gestalten}, publisher = {GI - Gesellschaft f{\"u}r Informatik}, address = {Bonn}, isbn = {978-3-88579-731-9}, issn = {1617-5468}, doi = {10.18420/inf2023_187}, pages = {1851 -- 1870}, year = {2023}, abstract = {The management of knowledge in organizations considers both established long-term processes and cooperation in agile project teams. Since knowledge can be both tacit and explicit, its transfer from the individual to the organizational knowledge base poses a challenge in organizations. This challenge increases when the fluctuation of knowledge carriers is exceptionally high. Especially in large projects in which external consultants are involved, there is a risk that critical, company-relevant knowledge generated in the project will leave the company with the external knowledge carrier and thus be lost. In this paper, we show the advantages of an early warning system for knowledge management to avoid this loss. In particular, the potential of visual analytics in the context of knowledge management systems is presented and discussed. We present a project for the development of a business-critical software system and discuss the first implementations and results.}, language = {en} }