@incollection{Stapenhorst2017, author = {Stapenhorst, Carolin}, title = {Robustheit}, series = {Hiatus. Architekturen f{\"u}r die gebrauchte Stadt}, booktitle = {Hiatus. Architekturen f{\"u}r die gebrauchte Stadt}, editor = {Frank, Ute and Lindenmayer, Verena and Loewenberg, Patrick and Rocneanu, Carla}, publisher = {Birkh{\"a}user}, address = {Basel}, isbn = {978-3-0356-1386-5}, pages = {155 -- 164}, year = {2017}, language = {de} } @article{EnningPfaff2017, author = {Enning, Manfred and Pfaff, Raphael}, title = {G{\"u}terwagen 4.0 - Mehr als nur technischer Fortschritt}, series = {Privatbahn-Magazin}, journal = {Privatbahn-Magazin}, number = {2}, publisher = {Bahn Media}, address = {Suhlendorf}, issn = {1865-0163}, pages = {21 -- 25}, year = {2017}, abstract = {Lokomotiven sind dank modernster Konzepte der Antriebstechnik heute energiesparend und umweltfreundlich. Eine Ausr{\"u}stung mit Telematik und Assistenzfunktionen ist Standard. Auf der Strecke zeigt sich moderne Technik in Form elektronischer Stellwerke und Zugsicherungssysteme und in Rangier- und Abstellanlagen als EOW-Technik. Am G{\"u}terwagen hingegen ist der technische Fortschritt komplett vorbeigegangen. Auch beim modernsten Wagen (Abb. 1) ist die einzige „Automatik"-Funktion die zentral {\"u}ber die Hauptluftleitung (HL) versorgte und bet{\"a}tigte Luftbremse.}, language = {de} } @article{FiedlerLaddBitz2017, author = {Fiedler, Thomas M. and Ladd, Mark E. and Bitz, Andreas}, title = {SAR Simulations \& Safety}, series = {NeuroImage}, journal = {NeuroImage}, number = {Epub ahead of print}, publisher = {Elsevier}, address = {Amsterdam}, issn = {1053-8119}, doi = {10.1016/j.neuroimage.2017.03.035}, year = {2017}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{PetersonRoethUibel2017, author = {Peterson, Leif Arne and R{\"o}th, Thilo and Uibel, Thomas}, title = {Holzwerkstoffe in Karosseriestrukturen}, series = {Tagungsband Aachener Holzbautagung 2017}, booktitle = {Tagungsband Aachener Holzbautagung 2017}, editor = {Uibel, Thomas and Peterson, Leif Arne and Baumann, Marcus}, issn = {2197-4489}, pages = {34 -- 45}, year = {2017}, language = {de} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @article{OrzadaBitzJohstetal.2017, author = {Orzada, Stephan and Bitz, Andreas and Johst, S{\"o}ren and Gratz, Marcel and V{\"o}lker, Maximilian N. and Kraff, Oliver and Abuelhaija, Ashraf and Fiedler, Thomas M. and Solbach, Klaus and Quick, Harald H. and Ladd, Mark E.}, title = {Analysis of an integrated 8-Channel Tx/Rx body array for use as a body coil in 7-Tesla MRI}, series = {Frontiers in Physics}, volume = {5}, journal = {Frontiers in Physics}, number = {Jun}, issn = {2296-424X}, doi = {10.3389/fphy.2017.00017}, year = {2017}, language = {en} } @article{FiedlerLaddBitz2017, author = {Fiedler, Thomas M. and Ladd, Mark E. and Bitz, Andreas}, title = {RF safety assessment of a bilateral four-channel transmit/receive 7 Tesla breast coil: SAR versus temperature limits}, series = {Medical Physics}, volume = {44}, journal = {Medical Physics}, number = {1}, doi = {10.1002/mp.12034}, pages = {143 -- 157}, year = {2017}, language = {en} }