@article{KrauseMeurerKlee1988, author = {Krause, Gregor and Meurer, D. and Klee, D.}, title = {Space Charge Formation Related to the Morphology of Polymers}, series = {ISE 6 : 6th International symposium on electrets : Papers}, journal = {ISE 6 : 6th International symposium on electrets : Papers}, publisher = {IEEE}, address = {Piscataway, NY}, pages = {XIX, 688 S. : graph. Darst.}, year = {1988}, language = {en} } @article{KrauseMeurerKlee1989, author = {Krause, Gregor and Meurer, D. and Klee, D.}, title = {Space charge formation related to the morphology of polymers}, series = {IEEE Transaction on Electrical Insulation. Vol. 24 (1989), H. No. 3}, journal = {IEEE Transaction on Electrical Insulation. Vol. 24 (1989), H. No. 3}, pages = {215 -- 222}, year = {1989}, language = {en} } @article{KrauseMoellerMeurer1989, author = {Krause, Gregor and M{\"o}ller, K. and Meurer, D.}, title = {Dielectric phenomena in semicrystalline polymers}, series = {IEEE Transaction on Electrical Insulation. Vol. 24 (1989), H. No. 2}, journal = {IEEE Transaction on Electrical Insulation. Vol. 24 (1989), H. No. 2}, pages = {215 -- 222}, year = {1989}, language = {en} } @article{KrauseNeubertPietsch1990, author = {Krause, Gregor and Neubert, R. and Pietsch, R.}, title = {Investigations of Electrical Aging in Polymers under High AC-Field Strength}, series = {1990 annual report : October 28 - October 31, 1990 / sponsored by the IEEE Dielectrics and Electrical Insulation Society}, journal = {1990 annual report : October 28 - October 31, 1990 / sponsored by the IEEE Dielectrics and Electrical Insulation Society}, publisher = {IEEE Service Center}, address = {Piscataway, N.J}, pages = {716 S : Ill., graph. Darst.}, year = {1990}, language = {en} } @article{KrauseRodriguezStopicetal.2007, author = {Krause, Gregor and Rodriguez, Jackson and Stopic, Srecko and Friedrich, Bernd}, title = {Feasibility assessment of electrocoagulation towards a new sustainable wastewater treatment / Rodriguez, Jackson ; Stopic, Srecko ; Krause Gregor ; Friedrich, Bernd}, series = {Environmental Science and Pollution Research. 14 (2007), H. 7}, journal = {Environmental Science and Pollution Research. 14 (2007), H. 7}, isbn = {0944-1344}, pages = {477 -- 482}, year = {2007}, language = {en} } @article{KrauseSchuppeSaureetal.1988, author = {Krause, Gregor and Schuppe, W.D. and Saure, M. and Andress, H.}, title = {Sensitive Analytical and Physical Methods for Diagnosis of Variations in Polyolefin Plaques and Cable Insulations / W.D. Schuppe, M. Saure, H. Andress, K. M{\"o}ller, D. Meurer, G. Krause}, series = {Proceedings of the 32nd session : 28th August - 3rd September.}, journal = {Proceedings of the 32nd session : 28th August - 3rd September.}, year = {1988}, language = {en} } @inproceedings{KrueckelNoldenFerreinetal.2015, author = {Kr{\"u}ckel, Kai and Nolden, Florian and Ferrein, Alexander and Scholl, Ingrid}, title = {Intuitive visual teleoperation for UGVs using free-look augmented reality displays}, series = {2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA}, booktitle = {2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA}, doi = {10.1109/ICRA.2015.7139809}, pages = {4412 -- 4417}, year = {2015}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @inproceedings{KoellenspergerBragardPlumetal.2007, author = {K{\"o}llensperger, P. and Bragard, Michael and Plum, T. and De Doncker, R. W.}, title = {The dual GCT : a new high-power device using optimized GCT technology}, series = {Conference record of the 2007 IEEE Industry Applications Conference : 42. IAS annual meeting ; September 23 - 27, 2007, New Orleans, Louisiana, USA}, booktitle = {Conference record of the 2007 IEEE Industry Applications Conference : 42. IAS annual meeting ; September 23 - 27, 2007, New Orleans, Louisiana, USA}, publisher = {IEEE Operations Center}, address = {Piscataway, NJ}, isbn = {978-1-4244-1260-0 (Online)}, doi = {10.1109/07IAS.2007.76}, pages = {358 -- 365}, year = {2007}, language = {en} } @article{KoellenspergerBragardPlumetal.2009, author = {K{\"o}llensperger, P. and Bragard, Michael and Plum, T. and De Doncker, R. W.}, title = {The dual GCT : new high-power device using optimized GCT technology}, series = {IEEE transactions on industry applications}, volume = {45}, journal = {IEEE transactions on industry applications}, number = {5}, issn = {0093-9994}, doi = {10.1109/TIA.2009.2027364}, pages = {1754 -- 1762}, year = {2009}, language = {en} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{KoenigWolf2016, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The pyramid assessment framework for 'competence developing games'}, series = {Communications in Computer and Information Science}, volume = {618}, booktitle = {Communications in Computer and Information Science}, editor = {Stephanidis, C.}, publisher = {Springer}, isbn = {978-331940541-4}, issn = {1865-0929}, doi = {10.1007/978-3-319-40542-1_37}, pages = {232 -- 237}, year = {2016}, language = {en} } @article{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training}, series = {International Journal on Advances in Security}, volume = {11}, journal = {International Journal on Advances in Security}, number = {3 \& 4}, publisher = {IARIA Journals}, issn = {1942-2636}, pages = {274 -- 287}, year = {2018}, abstract = {To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.}, language = {en} } @inproceedings{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {Cybersecurity awareness training provided by the competence developing game GHOST}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {81 -- 87}, year = {2018}, abstract = {This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game}, language = {en} } @incollection{KuemmellHillgaertner2015, author = {K{\"u}mmell, Steffen and Hillg{\"a}rtner, Michael}, title = {Inductive charging comfortable and nonvisible charging stations for urbanised areas}, series = {E-Mobility in Europe : trends and good practice}, booktitle = {E-Mobility in Europe : trends and good practice}, publisher = {Springer}, address = {Cham [u.a.]}, isbn = {978-3-319-13193-1}, doi = {10.1007/978-3-319-13194-8_16}, pages = {297 -- 309}, year = {2015}, abstract = {For a wide acceptance of E-Mobility, a well-developed charging infrastructure is needed. Conductive charging stations, which are today's state of the art, are of limited suitability for urbanised areas, since they cause a significant diversification in townscape. Furthermore, they might be destroyed by vandalism. Besides for those urbanistic reasons, inductive charging stations are a much more comfortable alternative, especially in urbanised areas. The usage of conductive charging stations requires more or less bulky charging cables. The handling of those standardised charging cables, especially during poor weather conditions, might cause inconvenience, such as dirty clothing etc. Wireless charging does not require visible and vandalism vulnerable charge sticks. No wired connection between charging station and vehicle is needed, which enable the placement below the surface of parking spaces or other points of interest. Inductive charging seems to be the optimal alternative for E-Mobility, as a high power transfer can be realised with a manageable technical and financial effort. For a well-accepted and working public charging infrastructure in urbanised areas it is essential that the infrastructure fits the vehicles' needs. Hence, a well-adjusted standardisation of the charging infrastructure is essential. This is carried out by several IEC (International Electrotechnical Commission) and national standardisation committees. To ensure an optimised technical solution for future's inductive charging infrastructures, several field tests had been carried out and are planned in near future.}, language = {en} } @inproceedings{KueppersSchubaNeugebaueretal.2023, author = {K{\"u}ppers, Malte and Schuba, Marko and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Security analysis of the KNX smart building protocol}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, doi = {10.1145/3600160.3605167}, pages = {1 -- 7}, year = {2023}, abstract = {KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.}, language = {en} } @article{LagemaatBreukelsVosetal.2016, author = {Lagemaat, Miriam W. and Breukels, Vincent and Vos, Eline K. and B., Adam and Uden, Mark J. van and Orzada, Stephan and Bitz, Andreas and Maas, Marnix C. and Scheenen, Tom W. J.}, title = {¹H MR spectroscopic imaging of the prostate at 7T using spectral-spatial pulses}, series = {Magnetic Resonance in Medicine}, volume = {75}, journal = {Magnetic Resonance in Medicine}, number = {3}, publisher = {International Society for Magnetic Resonance in Medicine}, issn = {1522-2594}, doi = {10.1002/mrm.25569}, pages = {933 -- 945}, year = {2016}, abstract = {Purpose To assess the feasibility of prostate ¹H MR spectroscopic imaging (MRSI) using low-power spectral-spatial (SPSP) pulses at 7T, exploiting accurate spectral selection and spatial selectivity simultaneously. Methods A double spin-echo sequence was equipped with SPSP refocusing pulses with a spectral selectivity of 1 ppm. Three-dimensional prostate ¹H-MRSI at 7T was performed with the SPSP-MRSI sequence using an 8-channel transmit array coil and an endorectal receive coil in three patients with prostate cancer and in one healthy subject. No additional water or lipid suppression pulses were used. Results Prostate ¹H-MRSI could be obtained well within specific absorption rate (SAR) limits in a clinically feasible time (10 min). Next to the common citrate signals, the prostate spectra exhibited high spermine signals concealing creatine and sometimes also choline. Residual lipid signals were observed at the edges of the prostate because of limitations in spectral and spatial selectivity. Conclusion It is possible to perform prostate ¹H-MRSI at 7T with a SPSP-MRSI sequence while using separate transmit and receive coils. This low-SAR MRSI concept provides the opportunity to increase spatial resolution of MRSI within reasonable scan times.}, language = {en} } @article{LagemaatMaasVosetal.2015, author = {Lagemaat, Miriam W. and Maas, Marnix C. and Vos, Eline K. and Bitz, Andreas and Orzada, Stephan and Weiland, Elisabeth and Uden, Mark J. van and Kobus, Thiele and Heerschap, Arend and Scheenen, Tom W. J.}, title = {(31) P MR spectroscopic imaging of the human prostate at 7 T: T1 relaxation times, Nuclear Overhauser Effect, and spectral characterization}, series = {Magnetic Resonance in Medicine}, volume = {73}, journal = {Magnetic Resonance in Medicine}, number = {3}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.25209}, pages = {909 -- 920}, year = {2015}, language = {en} } @article{LagemaatVosMaasetal.2014, author = {Lagemaat, Miriam W. and Vos, Eline K. and Maas, Marnix C. and Bitz, Andreas and Orzada, Stephan and Uden, Mark J. van and Kobus, Thiele and Heerschap, Arend and Scheenen, Tom W. J.}, title = {Phosphorus magnetic resonance spectroscopic imaging at 7 T in patients with prostate cancer}, series = {Investigative Radiology}, volume = {49}, journal = {Investigative Radiology}, number = {5}, publisher = {Lippincott Williams \& Wilkins}, address = {Philadelphia, Pa.}, issn = {1536-0210}, doi = {10.1097/RLI.0000000000000012}, pages = {363 -- 372}, year = {2014}, abstract = {Objectives The aim of this study was to identify characteristics of phosphorus (³¹P) spectra of the human prostate and to investigate changes of individual phospholipid metabolites in prostate cancer through in vivo ³¹P magnetic resonance spectroscopic imaging (MRSI) at 7 T. Materials and Methods In this institutional review board-approved study, 15 patients with biopsy-proven prostate cancer underwent T₂-weighted magnetic resonance imaging and 3-dimensional ³¹P MRSI at 7 T. Voxels were selected at the tumor location, in normal-appearing peripheral zone tissue, normal-appearing transition zone tissue, and in the base of the prostate close to the seminal vesicles. Phosphorus metabolite ratios were determined and compared between tissue types. Results Signals of phosphoethanolamine (PE) and phosphocholine (PC) were present and well resolved in most ³¹P spectra in the prostate. Glycerophosphocholine signals were observable in 43\% of the voxels in malignant tissue, but in only 10\% of the voxels in normal-appearing tissue away from the seminal vesicles. In many spectra, independent of tissue type, 2 peaks resonated in the chemical shift range of inorganic phosphate, possibly representing 2 separate pH compartments. The PC/PE ratio in the seminal vesicles was highly elevated compared with the prostate in 5 patients. A considerable overlap of ³¹P metabolite ratios was found between prostate cancer and normal-appearing prostate tissue, preventing direct discrimination of these tissues. The only 2 patients with high Gleason scores tumors (≥4+5) presented with high PC and glycerophosphocholine levels in their cancer lesions. Conclusions Phosphorus MRSI at 7 T shows distinct features of phospholipid metabolites in the prostate gland and its surrounding structures. In this exploratory study, no differences in ³¹P metabolite ratios were observed between prostate cancer and normal-appearing prostate tissue possibly because of the partial volume effects of small tumor foci in large MRSI voxels.}, language = {en} }