@inproceedings{AltherrDoeringFrauenrathetal.2024, author = {Altherr, Lena and D{\"o}ring, Bernd and Frauenrath, Tobias and Groß, Rolf and Mohan, Nijanthan and Oyen, Marc and Schnittcher, Lukas and Voß, Norbert}, title = {DiggiTwin: ein interdisziplin{\"a}res Projekt zur Nutzung digitaler Zwillinge auf dem Weg zu einem klimaneutralen Geb{\"a}udebestand}, series = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, booktitle = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-02-3}, doi = {10.33968/2024.67}, pages = {341 -- 346}, year = {2024}, abstract = {Im Hinblick auf die Klimaziele der Bundesrepublik Deutschland konzentriert sich das Projekt Diggi Twin auf die nachhaltige Geb{\"a}udeoptimierung. Grundlage f{\"u}r eine ganzheitliche Geb{\"a}ude{\"u}berwachung und -optimierung bildet dabei die Digitalisierung und Automation im Sinne eines Smart Buildings. Das interdisziplin{\"a}re Projekt der FH Aachen hat das Ziel, ein bestehendes Hochschulgeb{\"a}ude und einen Neubau an klimaneutrale Standards anzupassen. Im Rahmen des Projekts werden bekannte Verfahren, wie das Building Information Modeling (BIM), so erweitert, dass ein digitaler Geb{\"a}udezwilling entsteht. Dieser kann zur Optimierung des Geb{\"a}udebetriebs herangezogen werden, sowie als Basis f{\"u}r eine Erweiterung des Bewertungssystems Nachhaltiges Bauen (BNB) dienen. Mithilfe von Sensortechnologie und k{\"u}nstlicher Intelligenz kann so ein pr{\"a}zises Monitoring wichtiger Geb{\"a}udedaten erfolgen, um ungenutzte Energieeinsparpotenziale zu erkennen und zu nutzen. Das Projekt erforscht und setzt methodische Erkenntnisse zu BIM und digitalen Geb{\"a}udezwillingen praxisnah um, indem es spezifische Fragen zur Energie- und Ressourceneffizienz von Geb{\"a}uden untersucht und konkrete L{\"o}sungen f{\"u}r die Geb{\"a}udeoptimierung entwickelt.}, language = {de} } @inproceedings{WittigRuettersBragard2024, author = {Wittig, M. and R{\"u}tters, Ren{\´e} and Bragard, Michael}, title = {Application of RL in control systems using the example of a rotatory inverted pendulum}, series = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, booktitle = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-02-3}, doi = {10.33968/2024.53}, pages = {241 -- 248}, year = {2024}, abstract = {In this paper, the use of reinforcement learning (RL) in control systems is investigated using a rotatory inverted pendulum as an example. The control behavior of an RL controller is compared to that of traditional LQR and MPC controllers. This is done by evaluating their behavior under optimal conditions, their disturbance behavior, their robustness and their development process. All the investigated controllers are developed using MATLAB and the Simulink simulation environment and later deployed to a real pendulum model powered by a Raspberry Pi. The RL algorithm used is Proximal Policy Optimization (PPO). The LQR controller exhibits an easy development process, an average to good control behavior and average to good robustness. A linear MPC controller could show excellent results under optimal operating conditions. However, when subjected to disturbances or deviations from the equilibrium point, it showed poor performance and sometimes instable behavior. Employing a nonlinear MPC Controller in real time was not possible due to the high computational effort involved. The RL controller exhibits by far the most versatile and robust control behavior. When operated in the simulation environment, it achieved a high control accuracy. When employed in the real system, however, it only shows average accuracy and a significantly greater performance loss compared to the simulation than the traditional controllers. With MATLAB, it is not yet possible to directly post-train the RL controller on the Raspberry Pi, which is an obstacle to the practical application of RL in a prototyping or teaching setting. Nevertheless, RL in general proves to be a flexible and powerful control method, which is well suited for complex or nonlinear systems where traditional controllers struggle.}, language = {en} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChajanSchulteTiggesRekeetal.2021, author = {Chajan, Eduard and Schulte-Tigges, Joschua and Reke, Michael and Ferrein, Alexander and Matheis, Dominik and Walter, Thomas}, title = {GPU based model-predictive path control for self-driving vehicles}, series = {IEEE Intelligent Vehicles Symposium (IV)}, booktitle = {IEEE Intelligent Vehicles Symposium (IV)}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-1-7281-5394-0}, doi = {10.1109/IV48863.2021.9575619}, pages = {1243 -- 1248}, year = {2021}, abstract = {One central challenge for self-driving cars is a proper path-planning. Once a trajectory has been found, the next challenge is to accurately and safely follow the precalculated path. The model-predictive controller (MPC) is a common approach for the lateral control of autonomous vehicles. The MPC uses a vehicle dynamics model to predict the future states of the vehicle for a given prediction horizon. However, in order to achieve real-time path control, the computational load is usually large, which leads to short prediction horizons. To deal with the computational load, the control algorithm can be parallelized on the graphics processing unit (GPU). In contrast to the widely used stochastic methods, in this paper we propose a deterministic approach based on grid search. Our approach focuses on systematically discovering the search area with different levels of granularity. To achieve this, we split the optimization algorithm into multiple iterations. The best sequence of each iteration is then used as an initial solution to the next iteration. The granularity increases, resulting in smooth and predictable steering angle sequences. We present a novel GPU-based algorithm and show its accuracy and realtime abilities with a number of real-world experiments.}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{StoebeHoefkenSchubaetal.2013, author = {St{\"o}be, Rolf and H{\"o}fken, Hans-Wilhelm and Schuba, Marko and Breuer, Michael}, title = {Artificial ageing of mobile devices using a simulated GSM/GPRS network}, series = {Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg}, booktitle = {Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg}, publisher = {IEEE}, pages = {493 -- 497}, year = {2013}, language = {en} } @inproceedings{RekePeterSchulteTiggesetal.2020, author = {Reke, Michael and Peter, Daniel and Schulte-Tigges, Joschua and Schiffer, Stefan and Ferrein, Alexander and Walter, Thomas and Matheis, Dominik}, title = {A Self-Driving Car Architecture in ROS2}, series = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, booktitle = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-1-7281-4162-6}, doi = {10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020}, pages = {1 -- 6}, year = {2020}, abstract = {In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions.}, language = {en} } @inproceedings{SchnellBrandesGligorevicetal.2008, author = {Schnell, Michael and Brandes, Sinja and Gligorevic, Snjezana and Walter, Michael and Rihacek, Christoph and Sajatovic, Miodrag and Haindl, Bernhard}, title = {Interference mitigation for broadband L-DACS}, series = {27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn.}, booktitle = {27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn.}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {978-1-4244-2207-4 ; 978-1-4244-2208-1}, pages = {2B2-1 -- 2B2-12}, year = {2008}, language = {en} } @inproceedings{LindenlaufHoefkenSchuba2015, author = {Lindenlauf, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Cold Boot Attacks on DDR2 and DDR3 SDRAM}, series = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, booktitle = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, doi = {10.1109/ARES.2015.28}, pages = {287 -- 292}, year = {2015}, language = {en} } @inproceedings{BonneyHoefkenPaffenetal.2015, author = {Bonney, Gregor and H{\"o}fken, Hans-Wilhelm and Paffen, Benedikt and Schuba, Marko}, title = {ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC}, series = {1st International Conference on Information Systems Security and Privacy : ICISSP 2015}, booktitle = {1st International Conference on Information Systems Security and Privacy : ICISSP 2015}, organization = {International Conference on Information Systems Security and Privacy <1, 2015, Angers>}, pages = {1 -- 6}, year = {2015}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{GligorevicJostWalter2009, author = {Gligorevic, Snjezana and Jost, T. and Walter, Michael}, title = {Scatterer based airport surface channel model}, series = {IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla.}, booktitle = {IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla.}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {978-1-4244-4078-8}, pages = {4C2-1 -- 4C2-10}, year = {2009}, language = {en} } @inproceedings{BraunHoefkenSchubaetal.2015, author = {Braun, Sebastian and H{\"o}fken, Hans-Wilhelm and Schuba, Marko and Breuer, Michael}, title = {Forensische Sicherung von DSLRoutern}, series = {Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015}, booktitle = {Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015}, pages = {11 S.}, year = {2015}, language = {de} } @inproceedings{SchifferFerreinLakemeyer2011, author = {Schiffer, Stefan and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Fuzzy representations and control for domestic service robots in Golog}, series = {Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102)}, booktitle = {Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102)}, publisher = {ACM}, address = {New York}, isbn = {978-3-642-25486-4}, doi = {10.1007/978-3-642-25489-5_24}, pages = {241 -- 250}, year = {2011}, abstract = {In the RoboCup@Home domestic service robot competition, complex tasks such as "get the cup from the kitchen and bring it to the living room" or "find me this and that object in the apartment" have to be accomplished. At these competitions the robots may only be instructed by natural language. As humans use qualitative concepts such as "near" or "far", the robot needs to cope with them, too. For our domestic robot, we use the robot programming and plan language Readylog, our variant of Golog. In previous work we extended the action language Golog, which was developed for the high-level control of agents and robots, with fuzzy concepts and showed how to embed fuzzy controllers in Golog. In this paper, we demonstrate how these notions can be fruitfully applied to two domestic service robotic scenarios. In the first application, we demonstrate how qualitative fluents based on a fuzzy set semantics can be deployed. In the second program, we show an example of a fuzzy controller for a follow-a-person task.}, language = {en} } @inproceedings{LogenHoefkenSchuba2012, author = {Logen, Steffen and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework}, series = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, booktitle = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, publisher = {IEEE}, address = {New York}, isbn = {978-1-4673-2244-7}, doi = {10.1109/ARES.2012.12}, pages = {620 -- 624}, year = {2012}, abstract = {The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database.}, language = {en} } @inproceedings{TreulingCzarneckiWolf2023, author = {Treuling, Clemens and Czarnecki, Christian and Wolf, Martin R.}, title = {Projekt WiLMo - Wirtschaftsinformatik Lehr- und Lernmodule}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2023 : Tagungsband zur 36. AKWI-Jahrestagung}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2023 : Tagungsband zur 36. AKWI-Jahrestagung}, pages = {161 -- 169}, year = {2023}, abstract = {Die potenziellen Auswirkungen der Digitalisierung auf die Lehre sind seit langem Gegenstand ausf{\"u}hrlicher Diskussionen innerhalb der Wirtschaftsinformatik (WI) (z. B. in Auth et al. 2021, Barton et al. 2019, Klotz et al. 2019). Nicht zuletzt der in nahezu allen Wirtschaftszweigen bestehende Mangel an qualifizierten Fachkr{\"a}ften lenkt den Diskurs auf einen verbesserten Zugang zu Bildung und gleichen Bildungschancen. Aus dieser Vision heraus und dem Schub der Digitalisierung entstehen Bildungskonzepte wie Open Educational Resources (OER), die gesellschaftlichen Problemen, wie dem des Fachkr{\"a}ftemangels, entgegenwirken sollen. Im Rahmen dieses Kurzbeitrags wird das Projekt WiLMo - "Wirtschaftsinformatik Lehr- und Lernmodule" vorgestellt. WiLMo wird im Rahmen von OERContent.nrw unter Beteiligung von sechs Hochschulen entwickelt und gef{\"o}rdert. Alle Projektbeteiligten arbeiten gemeinsam daran, einheitliche digitale Lehr- und Lernmaterialien im OER-Format f{\"u}r die Kernmodule der Wirtschaftsinformatik zu entwickeln und in garantiert hoher Qualit{\"a}t zur Verf{\"u}gung zu stellen.}, language = {de} } @inproceedings{VladovaUllrichSultanowetal.2023, author = {Vladova, Gergana and Ullrich, Andr{\´e} and Sultanow, Eldar and Tobolla, Marinho and Sebrak, Sebastian and Czarnecki, Christian and Brockmann, Carsten}, title = {Visual analytics for knowledge management}, series = {INFORMATIK 2023 - Designing Futures: Zuk{\"u}nfte gestalten}, booktitle = {INFORMATIK 2023 - Designing Futures: Zuk{\"u}nfte gestalten}, publisher = {GI - Gesellschaft f{\"u}r Informatik}, address = {Bonn}, isbn = {978-3-88579-731-9}, issn = {1617-5468}, doi = {10.18420/inf2023_187}, pages = {1851 -- 1870}, year = {2023}, abstract = {The management of knowledge in organizations considers both established long-term processes and cooperation in agile project teams. Since knowledge can be both tacit and explicit, its transfer from the individual to the organizational knowledge base poses a challenge in organizations. This challenge increases when the fluctuation of knowledge carriers is exceptionally high. Especially in large projects in which external consultants are involved, there is a risk that critical, company-relevant knowledge generated in the project will leave the company with the external knowledge carrier and thus be lost. In this paper, we show the advantages of an early warning system for knowledge management to avoid this loss. In particular, the potential of visual analytics in the context of knowledge management systems is presented and discussed. We present a project for the development of a business-critical software system and discuss the first implementations and results.}, language = {en} } @inproceedings{ChircuCzarneckiFriedmannetal.2023, author = {Chircu, Alina and Czarnecki, Christian and Friedmann, Daniel and Pomaskow, Johanna and Sultanow, Eldar}, title = {Towards a Digital Twin of Society}, series = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, booktitle = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, publisher = {University of Hawai'i}, address = {Honolulu}, isbn = {978-0-9981331-6-4}, pages = {6748 -- 6757}, year = {2023}, abstract = {This paper describes the potential for developing a digital twin of society- a dynamic model that can be used to observe, analyze, and predict the evolution of various societal aspects. Such a digital twin can help governmental agencies and policy makers in interpreting trends, understanding challenges, and making decisions regarding investments or policies necessary to support societal development and ensure future prosperity. The paper reviews related work regarding the digital twin paradigm and its applications. The paper presents a motivating case study- an analysis of opportunities and challenges faced by the German federal employment agency, Bundesagentur f¨ur Arbeit (BA), proposes solutions using digital twins, and describes initial proofs of concept for such solutions.}, language = {en} } @inproceedings{FeuerriegelPookWerschetal.2012, author = {Feuerriegel, Uwe and Pook, Michael and Wersch, Gregor and Wittenhorst, Simon and Becker, J{\"u}rgen and Ecker, Markus and Hoffmann, Ulrich and Kunz, Ulrich}, title = {Simulation von W{\"a}rme{\"u}bertragungsprozessen}, year = {2012}, abstract = {Mit freundlicher Genehmigung der Autoren und des Oldenbourg Industrieverlags https://www.oldenbourg-industrieverlag.de/de/9783835633223-33223 erschienen als Beitrag im Tagungsband zur AALE-Tagung 2012. 9. Fachkonferenz 4.-5. Mai 2012, Aachen, Fachhochschule. ISBN 9783835633223 S 5-1 S. 127-135 Es werden Ergebnisse unterschiedlicher Projekte aus dem Bereich der Simulation von W{\"a}rme{\"u}bertragungsprozessen mit Excel-VBA vorgestellt. - Thermische Behandlung hochviskoser Fruchtzubereitungen, verschiedene Projekte und Kooperationen mit der Zentis GmbH \& Co. KG, Aachen (J. Becker, U. Feuerriegel, G. Wersch). - Untersuchung des dynamischen Verhaltens von dampfbeheizten Ethylen-Verdampfern. Projekt mit der TGE Gas Engineering GmbH, Bonn (M. Ecker, U. Feuerriegel, U. Hoffmann, S. Wittenhorst). - Dynamische Simulation des axialen Temperaturverlaufs von elektrisch beheizten Rohrreaktoren. Kooperation mit dem Institut f{\"u}r Chemische Verfahrenstechnik, TU Clausthal (U. Feuerriegel, U. Kunz, M. Pook, S. Wittenhorst).}, subject = {W{\"a}rme{\"u}bertragung}, language = {de} } @inproceedings{SchollBartellaMoluluoetal.2019, author = {Scholl, Ingrid and Bartella, Alexander K. and Moluluo, Cem and Ertural, Berat and Laing, Frederic and Suder, Sebastian}, title = {MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality}, series = {Bildverarbeitung f{\"u}r die Medizin 2019 : Algorithmen - Systeme - Anwendungen}, booktitle = {Bildverarbeitung f{\"u}r die Medizin 2019 : Algorithmen - Systeme - Anwendungen}, publisher = {Springer Vieweg}, address = {Wiesbaden}, isbn = {978-3-658-25326-4}, doi = {10.1007/978-3-658-25326-4_32}, pages = {152 -- 157}, year = {2019}, language = {en} } @inproceedings{BroennerHoefkenSchuba2016, author = {Broenner, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Streamlining extraction and analysis of android RAM images}, series = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP}, publisher = {SciTePress}, address = {Set{\´u}bal}, organization = {ICISSP International Conference on Information Systems Security and Privacy <2, 2016, Rome, Italy>}, isbn = {978-989-758-167-0}, doi = {10.5220/0005652802550264}, pages = {255 -- 264}, year = {2016}, abstract = {The Android operating system powers the majority of the world's mobile devices and has been becoming increasingly important in day-to-day digital forensics. Therefore, technicians and analysts are in need of reliable methods for extracting and analyzing memory images from live Android systems. This paper takes different existing, extraction methods and derives a universal, reproducible, reliably documented method for both extraction and analysis. In addition the VOLIX II front-end for the Volatility Framework is extended with additional functionality to make the analysis of Android memory images easier for technically non-adept users.}, language = {en} } @inproceedings{SchuetzBreuerHoefkenetal.2013, author = {Sch{\"u}tz, P. and Breuer, M. and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Malware proof on mobile phone exhibits based on GSM/GPRS traces}, series = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia}, booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia}, publisher = {The Society of Digital Information and Wireless Communication}, isbn = {978-0-9853483-7-3}, pages = {89 -- 96}, year = {2013}, language = {en} }