@inproceedings{LimpertSchifferFerrein2015, author = {Limpert, Nicolas and Schiffer, Stefan and Ferrein, Alexander}, title = {A Local Planner for Ackermann-Driven Vehicles in ROS SBPL}, series = {Proceedings of the International Conference on Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech), 2015}, booktitle = {Proceedings of the International Conference on Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech), 2015}, doi = {10.1109/RoboMech.2015.7359518}, pages = {172 -- 177}, year = {2015}, language = {en} } @article{LeingartnerMaurerFerreinetal.2016, author = {Leingartner, Max and Maurer, Johannes and Ferrein, Alexander and Steinbauer, Gerald}, title = {Evaluation of Sensors and Mapping Approaches for Disasters in Tunnels}, series = {Journal of Field Robotics}, volume = {33}, journal = {Journal of Field Robotics}, number = {8}, publisher = {Wiley-VCH}, address = {Weinheim}, issn = {1556-4967}, doi = {10.1002/rob.21611}, pages = {1037 -- 1057}, year = {2016}, abstract = {Ground or aerial robots equipped with advanced sensing technologies, such as three-dimensional laser scanners and advanced mapping algorithms, are deemed useful as a supporting technology for first responders. A great deal of excellent research in the field exists, but practical applications at real disaster sites are scarce. Many projects concentrate on equipping robots with advanced capabilities, such as autonomous exploration or object manipulation. In spite of this, realistic application areas for such robots are limited to teleoperated reconnaissance or search. In this paper, we investigate how well state-of-the-art and off-the-shelf components and algorithms are suited for reconnaissance in current disaster-relief scenarios. The basic idea is to make use of some of the most common sensors and deploy some widely used algorithms in a disaster situation, and to evaluate how well the components work for these scenarios. We acquired the sensor data from two field experiments, one from a disaster-relief operation in a motorway tunnel, and one from a mapping experiment in a partly closed down motorway tunnel. Based on these data, which we make publicly available, we evaluate state-of-the-art and off-the-shelf mapping approaches. In our analysis, we integrate opinions and replies from first responders as well as from some algorithm developers on the usefulness of the data and the limitations of the deployed approaches, respectively. We discuss the lessons we learned during the two missions. These lessons are interesting for the community working in similar areas of urban search and rescue, particularly reconnaissance and search.}, language = {en} } @inproceedings{FerreinMaierMuehlbacheretal.2015, author = {Ferrein, Alexander and Maier, Christopher and M{\"u}hlbacher, Clemens and Niemueller, Tim and Steinbauer, Gerald and Vassos, Stravros}, title = {Controlling Logistics Robots with the Action-based Language YAGI}, series = {Proceedings of the 2015 IROS Workshop on Workshop on Task Planning for Intelligent Robots in Service and Manufacturing}, booktitle = {Proceedings of the 2015 IROS Workshop on Workshop on Task Planning for Intelligent Robots in Service and Manufacturing}, year = {2015}, language = {en} } @book{GalleyMinoggioSchubaetal.2016, author = {Galley, Birgit and Minoggio, Ingo and Schuba, Marko and Bischoff, Barbara and H{\"o}fken, Hans-Wilhelm}, title = {Unternehmenseigene Ermittlungen : Recht - Kriminalistik - IT}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, isbn = {978-3-503-16531-5}, pages = {XIII, 372 S.}, year = {2016}, language = {de} } @inproceedings{BraunHoefkenSchubaetal.2015, author = {Braun, Sebastian and H{\"o}fken, Hans-Wilhelm and Schuba, Marko and Breuer, Michael}, title = {Forensische Sicherung von DSLRoutern}, series = {Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015}, booktitle = {Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015}, pages = {11 S.}, year = {2015}, language = {de} } @inproceedings{BischofEyKucketal.2015, author = {Bischof, Michael and Ey, Ludger and Kuck, Alexander and Rahier, Michael and Ritz, Thomas}, title = {Nutzerzentrierte Gestaltung und Entwicklung eines kontextsensitiven HMI}, series = {Mensch und Computer 2015 : Workshop}, booktitle = {Mensch und Computer 2015 : Workshop}, editor = {Weisbecker, Anette}, publisher = {De Gruyter Oldenbourg}, address = {Berlin}, isbn = {978-3-11-044333-2}, pages = {467 -- 474}, year = {2015}, language = {de} } @inproceedings{FuchsRitz2014, author = {Fuchs, Britta and Ritz, Thomas}, title = {Usability for Blended Shopping - Solving Major Flaws by Applying Usability Engineering and Proven Integration Technologies}, series = {Proceedings of the 11th International Conference on e-Business, ICE-B 2014, Vienna, Austria}, booktitle = {Proceedings of the 11th International Conference on e-Business, ICE-B 2014, Vienna, Austria}, isbn = {978-989-758-043-7}, doi = {10.5220/0005113502160223}, pages = {216 -- 223}, year = {2014}, language = {en} } @inproceedings{Huening2016, author = {H{\"u}ning, Felix}, title = {Power Semiconductors for the automotive 48V board net}, series = {PCIM Europe 2016 Conference Proceedings}, booktitle = {PCIM Europe 2016 Conference Proceedings}, publisher = {VDE Verl.}, address = {Berlin}, isbn = {978-3-8007-4186-1}, pages = {1963 -- 1969}, year = {2016}, language = {en} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{BonneyNagelSchuba2016, author = {Bonney, Gregor and Nagel, Stefan and Schuba, Marko}, title = {Risiko Smart Home - Angriff auf ein Babymonitorsystem}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {371 -- 378}, year = {2016}, abstract = {Unser Zuhause wird zunehmend intelligenter. Smart Homes bieten uns die Steuerung von Haus- oder Unterhaltungstechnik bequem vom Smartphone aus. Junge Familien nutzen die Technologie, um mittels vernetzten Babymonitorsystemen ihren Nachwuchs von {\"u}berall aus im Blick zu haben. Davon auszugehen, dass solche Systeme mit einem Fokus auf Sicherheit entwickelt wurden, um die sehr pers{\"o}nlichen Daten zu sch{\"u}tzen, ist jedoch ein Trugschluss. Die Untersuchung eines handels{\"u}blichen und keineswegs billigen Systems zeigt, dass die Ger{\"a}te sehr einfach kompromittiert und missbraucht werden k{\"o}nnen.}, language = {de} }