@inproceedings{KirschMatareFerreinetal.2020, author = {Kirsch, Maximilian and Matar{\´e}, Victor and Ferrein, Alexander and Schiffer, Stefan}, title = {Integrating golog++ and ROS for Practical and Portable High-level Control}, series = {12th International Conference on Agents and Artificial Intelligence}, booktitle = {12th International Conference on Agents and Artificial Intelligence}, doi = {10.5220/0008984406920699}, year = {2020}, language = {en} } @article{HueningDeMatteis2020, author = {H{\"u}ning, Felix and De Matteis, Stefan}, title = {Entwicklung eines taktilen HMI f{\"u}r sehbehinderte und blinde Nutzerinnen und Nutzer}, series = {Blind - sehbehindert}, volume = {140}, journal = {Blind - sehbehindert}, number = {2}, publisher = {Edition Bentheim}, address = {W{\"u}rzburg}, issn = {0176-7836}, pages = {9 -- 19}, year = {2020}, language = {de} } @inproceedings{DinghoferHartung2020, author = {Dinghofer, Kai and Hartung, Frank}, title = {Analysis of Criteria for the Selection of Machine Learning Frameworks}, series = {2020 International Conference on Computing, Networking and Communications (ICNC)}, booktitle = {2020 International Conference on Computing, Networking and Communications (ICNC)}, doi = {10.1109/ICNC47757.2020.9049650}, pages = {373 -- 377}, year = {2020}, language = {en} } @inproceedings{RekePeterSchulteTiggesetal.2020, author = {Reke, Michael and Peter, Daniel and Schulte-Tigges, Joschua and Schiffer, Stefan and Ferrein, Alexander and Walter, Thomas and Matheis, Dominik}, title = {A Self-Driving Car Architecture in ROS2}, series = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, booktitle = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, isbn = {978-1-7281-4162-6}, doi = {10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020}, pages = {1 -- 6}, year = {2020}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @book{Heuermann2020, author = {Heuermann, Holger}, title = {Mikrowellentechnik: Feldsimulation, nichtlineare Schaltungstechnik, Komponenten und Subsysteme, Plasmatechnik, Antennen und Ausbreitung}, publisher = {Springer Vieweg}, address = {Wiesbaden}, isbn = {978-3-658-29023-8 (eBook)}, doi = {10.1007/978-3-658-29023-8}, pages = {Online-Ressource (XIV, 385 S. 374 Abb., 22 Abb. in Farbe)}, year = {2020}, language = {de} } @inproceedings{ElgamalHeuermann2020, author = {Elgamal, Abdelrahman and Heuermann, Holger}, title = {Design and Development of a Hot S-Parameter Measurement System for Plasma and Magnetron Applications}, series = {2020 German Microwave Conference (GeMiC), Cottbus, Germany, 2020}, booktitle = {2020 German Microwave Conference (GeMiC), Cottbus, Germany, 2020}, isbn = {978-3-9820397-1-8}, pages = {124 -- 127}, year = {2020}, language = {en} } @article{RoepkeKoehlerDruryetal.2020, author = {Roepke, Rene and K{\"o}hler, Klemens and Drury, Vincent and Schroeder, Ulrik and Wolf, Martin and Meyer, Ulrike}, title = {A pond full of phishing games - analysis of learning games for anti-phishing education}, series = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, journal = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-62433-0}, doi = {10.1007/978-3-030-62433-0_32020}, pages = {41 -- 60}, year = {2020}, abstract = {Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom's Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.}, language = {en} }