@inproceedings{HartungHillgaertnerSchmitzetal.2014, author = {Hartung, Frank and Hillg{\"a}rtner, Michael and Schmitz, G{\"u}nter and Schuba, Marko and Adolphs, Fabian and Hoffend, Jens and Theis, Jochen}, title = {IT-Sicherheit im Automobil}, series = {AmE 2014 : Automotive meets Electronics, Beitr{\"a}ge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78)}, booktitle = {AmE 2014 : Automotive meets Electronics, Beitr{\"a}ge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78)}, publisher = {VDE-Verl.}, address = {Berlin}, organization = {VDE/VDI-Gesellschaft Mikroelektronik, Mikrosystem- und Feinwerktechnik (GMM)}, isbn = {978-3-8007-3580-8}, pages = {CD-ROM}, year = {2014}, language = {de} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{BrockmannSultanowCzarnecki2019, author = {Brockmann, Carsten and Sultanow, Eldar and Czarnecki, Christian}, title = {Is enterprise architecture still relevant in the digital age?}, series = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, booktitle = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, editor = {Draude, Claude and Lange, Martin and Sick, Bernhard}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796893}, issn = {1617-5468}, doi = {10.18420/inf2019_ws01}, pages = {21 -- 21}, year = {2019}, language = {en} } @inproceedings{SchoppHeuermannHoltrup2014, author = {Schopp, Christoph and Heuermann, Holger and Holtrup, S.}, title = {Investigation on efficacy optimization of RF-driven automotive D-lamps}, series = {44th European Microwave Conference (EuMC),2014, Rome}, booktitle = {44th European Microwave Conference (EuMC),2014, Rome}, doi = {10.1109/EuMC.2014.6986645}, pages = {1154 -- 1157}, year = {2014}, language = {en} } @inproceedings{NoetzoldUphuesWegeneretal.2013, author = {N{\"o}tzold, K. and Uphues, A. and Wegener, R. and Fink, K. and Bragard, Michael and Griessel, R. and Soter, S.}, title = {Inverter based test setup for LVRT verification of a full-scale 2 MW wind power converter}, series = {15th European Conference on Power Electronics and Applications (EPE), 2013 : 2 - 6 Sept. 2013, Lille, France / [EPE Association; PELS, IEEE Power Electronics Society]}, booktitle = {15th European Conference on Power Electronics and Applications (EPE), 2013 : 2 - 6 Sept. 2013, Lille, France / [EPE Association; PELS, IEEE Power Electronics Society]}, publisher = {IEEE}, address = {Piscataway, NJ}, isbn = {978-1-4799-0115-9 (Online-Ausg.)}, doi = {10.1109/EPE.2013.6634752}, pages = {1037 -- 1042}, year = {2013}, language = {en} } @inproceedings{NoetzoldUphuesWegeneretal.2012, author = {N{\"o}tzold, K. and Uphues, A. and Wegener, R. and Soter, S. and Fink, K. and Bragard, Michael and Griessel, R.}, title = {Inverter based test setup for LVRT verification of a full-scale 2 MW wind power converter}, series = {EPE Joint Wind Energy and T\&D Chapters Seminar : 28th and 29th of June 2012, in the Utzon Centre, Aalborg, Denmark ; papers, posters, presentations. - Session 2: Grid connection, compliance}, booktitle = {EPE Joint Wind Energy and T\&D Chapters Seminar : 28th and 29th of June 2012, in the Utzon Centre, Aalborg, Denmark ; papers, posters, presentations. - Session 2: Grid connection, compliance}, publisher = {EPE Association}, address = {Brussels}, year = {2012}, language = {en} } @inproceedings{KrueckelNoldenFerreinetal.2015, author = {Kr{\"u}ckel, Kai and Nolden, Florian and Ferrein, Alexander and Scholl, Ingrid}, title = {Intuitive visual teleoperation for UGVs using free-look augmented reality displays}, series = {2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA}, booktitle = {2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA}, doi = {10.1109/ICRA.2015.7139809}, pages = {4412 -- 4417}, year = {2015}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{RingbeckSchwarteBuxbaum1999, author = {Ringbeck, Thorsten and Schwarte, Rudolf and Buxbaum, Bernd}, title = {Introduction of a new opto-electrical phase-locked loop in CMOS technology: the PMD-PLL}, series = {Optical wireless communications II / [SPIE Conference on Optical Wireless Communications II], 22 September 1999, Boston, Massachusetts. - (SPIE proceedings series ; 3850)}, booktitle = {Optical wireless communications II / [SPIE Conference on Optical Wireless Communications II], 22 September 1999, Boston, Massachusetts. - (SPIE proceedings series ; 3850)}, editor = {Korevaar, Eric John}, publisher = {SPIE}, address = {Bellingham, Wash.}, isbn = {0-8194-3443-4}, issn = {0038-7355}, pages = {108 -- 116}, year = {1999}, language = {en} } @inproceedings{BragardSubeSchneideretal.2019, author = {Bragard, Michael and Sube, Maike and Schneider, Maike and Jungemann, Christoph}, title = {Introducing a Cross-University Bachelor's Programme with Orientation Semester - Enabling a Permeable Academic Education System}, series = {2019 20th International Conference on Research and Education in Mechatronics (REM)}, booktitle = {2019 20th International Conference on Research and Education in Mechatronics (REM)}, isbn = {978-1-5386-9257-8}, doi = {10.1109/REM.2019.8744132}, pages = {1 -- 6}, year = {2019}, language = {en} }