@inproceedings{AlhwarinFerreinScholl2019, author = {Alhwarin, Faraj and Ferrein, Alexander and Scholl, Ingrid}, title = {An Efficient Hashing Algorithm for NN Problem in HD Spaces}, series = {Lecture Notes in Computer Science}, booktitle = {Lecture Notes in Computer Science}, isbn = {978-303005498-4}, doi = {10.1007/978-3-030-05499-1_6}, pages = {101 -- 115}, year = {2019}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ZugNiemuellerHochgeschwenderetal.2017, author = {Zug, Sebastian and Niemueller, Tim and Hochgeschwender, Nico and Seidensticker, Kai and Seidel, Martin and Friedrich, Tim and Neumann, Tobias and Karras, Ulrich and Kraetzschmar, Gerhard K. and Ferrein, Alexander}, title = {An Integration Challenge to Bridge the Gap Among Industry-Inspired RoboCup Leagues}, series = {RoboCup 2016: Robot World Cup XX. RoboCup 2016.}, booktitle = {RoboCup 2016: Robot World Cup XX. RoboCup 2016.}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-68792-6}, doi = {10.1007/978-3-319-68792-6_13}, pages = {157 -- 168}, year = {2017}, language = {en} } @inproceedings{AlhwarinSchifferFerreinetal.2019, author = {Alhwarin, Faraj and Schiffer, Stefan and Ferrein, Alexander and Scholl, Ingrid}, title = {An Optimized Method for 3D Body Scanning Applications Based on KinectFusion}, series = {Communications in Computer and Information Science}, volume = {1024}, booktitle = {Communications in Computer and Information Science}, publisher = {Springer}, issn = {1865-0929}, doi = {10.1007/978-3-030-29196-9_6}, pages = {100 -- 113}, year = {2019}, language = {en} } @inproceedings{DinghoferHartung2020, author = {Dinghofer, Kai and Hartung, Frank}, title = {Analysis of Criteria for the Selection of Machine Learning Frameworks}, series = {2020 International Conference on Computing, Networking and Communications (ICNC)}, booktitle = {2020 International Conference on Computing, Networking and Communications (ICNC)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.1109/ICNC47757.2020.9049650}, pages = {373 -- 377}, year = {2020}, abstract = {With the many achievements of Machine Learning in the past years, it is likely that the sub-area of Deep Learning will continue to deliver major technological breakthroughs [1]. In order to achieve best results, it is important to know the various different Deep Learning frameworks and their respective properties. This paper provides a comparative overview of some of the most popular frameworks. First, the comparison methods and criteria are introduced and described with a focus on computer vision applications: Features and Uses are examined by evaluating papers and articles, Adoption and Popularity is determined by analyzing a data science study. Then, the frameworks TensorFlow, Keras, PyTorch and Caffe are compared based on the previously described criteria to highlight properties and differences. Advantages and disadvantages are compared, enabling researchers and developers to choose a framework according to their specific needs.}, language = {en} } @inproceedings{CordesGligorevicBlicharski2019, author = {Cordes, Sven and Gligorevic, Snjezana and Blicharski, Peter}, title = {Analysis of sine precision influence on DOA estimation using the MUSIC algorithm}, series = {2019 20th International Radar Symposium (IRS)}, booktitle = {2019 20th International Radar Symposium (IRS)}, isbn = {978-3-7369-9860-5}, doi = {10.23919/IRS.2019.8768162}, pages = {1 -- 10}, year = {2019}, language = {en} } @inproceedings{ArndtConzenElsenetal.2023, author = {Arndt, Tobias and Conzen, Max and Elsen, Ingo and Ferrein, Alexander and Galla, Oskar and K{\"o}se, Hakan and Schiffer, Stefan and Tschesche, Matteo}, title = {Anomaly detection in the metal-textile industry for the reduction of the cognitive load of quality control workers}, series = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, booktitle = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, publisher = {ACM}, isbn = {9798400700699}, doi = {10.1145/3594806.3596558}, pages = {535 -- 542}, year = {2023}, abstract = {This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100\% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products.}, language = {en} } @inproceedings{WittigRuettersBragard2024, author = {Wittig, M. and R{\"u}tters, Ren{\´e} and Bragard, Michael}, title = {Application of RL in control systems using the example of a rotatory inverted pendulum}, series = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, booktitle = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-02-3}, doi = {10.33968/2024.53}, pages = {241 -- 248}, year = {2024}, abstract = {In this paper, the use of reinforcement learning (RL) in control systems is investigated using a rotatory inverted pendulum as an example. The control behavior of an RL controller is compared to that of traditional LQR and MPC controllers. This is done by evaluating their behavior under optimal conditions, their disturbance behavior, their robustness and their development process. All the investigated controllers are developed using MATLAB and the Simulink simulation environment and later deployed to a real pendulum model powered by a Raspberry Pi. The RL algorithm used is Proximal Policy Optimization (PPO). The LQR controller exhibits an easy development process, an average to good control behavior and average to good robustness. A linear MPC controller could show excellent results under optimal operating conditions. However, when subjected to disturbances or deviations from the equilibrium point, it showed poor performance and sometimes instable behavior. Employing a nonlinear MPC Controller in real time was not possible due to the high computational effort involved. The RL controller exhibits by far the most versatile and robust control behavior. When operated in the simulation environment, it achieved a high control accuracy. When employed in the real system, however, it only shows average accuracy and a significantly greater performance loss compared to the simulation than the traditional controllers. With MATLAB, it is not yet possible to directly post-train the RL controller on the Raspberry Pi, which is an obstacle to the practical application of RL in a prototyping or teaching setting. Nevertheless, RL in general proves to be a flexible and powerful control method, which is well suited for complex or nonlinear systems where traditional controllers struggle.}, language = {en} } @inproceedings{DammRahierRitzetal.2013, author = {Damm, Sebastian and Rahier, Michael and Ritz, Thomas and Sch{\"a}fer, Thomas}, title = {Architecture for platform- and hardware-independent mesh networks : how to unify the channels}, series = {ICSNC 2013 : The Eighth International Conference on Systems and Networks Communications ; October 27, 2013 to October 31, 2013, Venice Italy}, booktitle = {ICSNC 2013 : The Eighth International Conference on Systems and Networks Communications ; October 27, 2013 to October 31, 2013, Venice Italy}, editor = {Davoli, Renzo}, publisher = {Curran Associates}, address = {Red Hook, NY}, isbn = {978-1-61208-305-6}, pages = {131 -- 134}, year = {2013}, abstract = {This paper will prove that mesh networks among different platforms and hardware channels can help to channel valuable information even if public telecommunication infrastructure is not available due to arbitrary reasons. Therefore, results of a simulation for mesh networks on mass events will be provided, followed by the developed architecture and an outlook on future research. The developed architecture is currently being implemented and field tested on mass events.}, language = {en} } @inproceedings{StoebeHoefkenSchubaetal.2013, author = {St{\"o}be, Rolf and H{\"o}fken, Hans-Wilhelm and Schuba, Marko and Breuer, Michael}, title = {Artificial ageing of mobile devices using a simulated GSM/GPRS network}, series = {Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg}, booktitle = {Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg}, publisher = {IEEE}, pages = {493 -- 497}, year = {2013}, language = {en} }