@incollection{SchwarteHeinolBuxbaumetal.1999, author = {Schwarte, Rudolf and Heinol, Horst-Guenther and Buxbaum, Bernd and Ringbeck, Thorsten and [u.a.],}, title = {Principles of three-dimensional imaging techniques}, series = {Sensors and imaging. - (Handbook of computer vision and applications ; Vol. 1)}, booktitle = {Sensors and imaging. - (Handbook of computer vision and applications ; Vol. 1)}, editor = {J{\"a}hne, Bernd}, publisher = {Academic Press}, address = {San Diego}, isbn = {0-12-379771-3 (Einzelbd.)}, pages = {463 -- 485}, year = {1999}, language = {en} } @inproceedings{SchwarteBuxbaumHeinoletal.1998, author = {Schwarte, Rudolf and Buxbaum, Bernd and Heinol, Horst-Guenther and Xu, Zhanping and Ringbeck, Thorsten and Zang, Zhigang}, title = {Novel 3D-vision systems based on layout optimized PMD-structures}, series = {Proceedings / OPTO 98, Internationaler Kongress und Fachausstellung f{\"u}r Optische Sensorik, Messtechnik und Elektronik, 18. - 20. Mai 1998, Kongreßzentrum Erfurt}, booktitle = {Proceedings / OPTO 98, Internationaler Kongress und Fachausstellung f{\"u}r Optische Sensorik, Messtechnik und Elektronik, 18. - 20. Mai 1998, Kongreßzentrum Erfurt}, publisher = {ACS Organisations GmbH}, address = {Wunsdorf}, pages = {197 -- 202}, year = {1998}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{SchulteTiggesMatheisRekeetal.2023, author = {Schulte-Tigges, Joschua and Matheis, Dominik and Reke, Michael and Walter, Thomas and Kaszner, Daniel}, title = {Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain}, series = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, booktitle = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, editor = {Kr{\"o}mker, Heidi}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35677-3 (Print)}, doi = {10.1007/978-3-031-35678-0_12}, pages = {200 -- 210}, year = {2023}, abstract = {Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle's software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany.}, language = {en} } @article{SchulteTiggesFoersterNikolovskietal.2022, author = {Schulte-Tigges, Joschua and F{\"o}rster, Marco and Nikolovski, Gjorgji and Reke, Michael and Ferrein, Alexander and Kaszner, Daniel and Matheis, Dominik and Walter, Thomas}, title = {Benchmarking of various LiDAR sensors for use in self-driving vehicles in real-world environments}, series = {Sensors}, volume = {22}, journal = {Sensors}, number = {19}, publisher = {MDPI}, address = {Basel}, issn = {1424-8220}, doi = {10.3390/s22197146}, pages = {20 Seiten}, year = {2022}, abstract = {Abstract In this paper, we report on our benchmark results of the LiDAR sensors Livox Horizon, Robosense M1, Blickfeld Cube, Blickfeld Cube Range, Velodyne Velarray H800, and Innoviz Pro. The idea was to test the sensors in different typical scenarios that were defined with real-world use cases in mind, in order to find a sensor that meet the requirements of self-driving vehicles. For this, we defined static and dynamic benchmark scenarios. In the static scenarios, both LiDAR and the detection target do not move during the measurement. In dynamic scenarios, the LiDAR sensor was mounted on the vehicle which was driving toward the detection target. We tested all mentioned LiDAR sensors in both scenarios, show the results regarding the detection accuracy of the targets, and discuss their usefulness for deployment in self-driving cars.}, language = {en} } @article{SchubertScholl2011, author = {Schubert, Nicole and Scholl, Ingrid}, title = {Comparing GPU-based multi-volume ray casting techniques}, series = {Computer Science - Research and Development}, volume = {26}, journal = {Computer Science - Research and Development}, number = {12}, publisher = {Springer}, address = {Berlin}, isbn = {1865-2042}, pages = {39 -- 50}, year = {2011}, language = {en} } @article{SchubaWronaZavagli2001, author = {Schuba, Marko and Wrona, Konrad and Zavagli, Guido}, title = {Mobile Payments - State of the Art and Open Problems / Wrona, Konrad ; Schuba, Marko ; Zavagli, Guido}, series = {Electronic commerce : second international workshop ; proceedings / WELCOM 2001, Heidelberg, Germany, November 16-17, 2001. Ludger Fiege ... (ed.)}, journal = {Electronic commerce : second international workshop ; proceedings / WELCOM 2001, Heidelberg, Germany, November 16-17, 2001. Ludger Fiege ... (ed.)}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-540-42878-7}, pages = {88 -- 100}, year = {2001}, language = {en} } @article{SchubaWrona1999, author = {Schuba, Marko and Wrona, Konrad}, title = {Electronic Commerce Transactions in a Wireless Environment / Schuba, Marko. ; Wrona, Konrad}, pages = {1 -- 9}, year = {1999}, language = {en} } @article{SchubaWrona2000, author = {Schuba, Marko and Wrona, Konrad}, title = {Mobile Chip Electronic Commerce: Enabling Credit Card Payment for Mobile Devices / Schuba, Marko ; Wrona, Konrad}, pages = {1 -- 6}, year = {2000}, language = {en} } @article{SchubaWrona2001, author = {Schuba, Marko and Wrona, Konrad}, title = {Security for Mobile Commerce Applications / Schuba, Marko ; Wrona, Konrad}, pages = {1 -- 8}, year = {2001}, language = {en} } @article{SchubaSpaniol1999, author = {Schuba, Marko and Spaniol, Otto}, title = {Interconnection of Local Area Networks via ATM / Spaniol, Otto ; Schuba, Marko}, series = {High performance networks for multimedia applications / edited by Andr{\´e} Danthine ...}, journal = {High performance networks for multimedia applications / edited by Andr{\´e} Danthine ...}, publisher = {Kluwer Academic Publ.}, address = {Dordrecht}, isbn = {0-7923-8274-9}, pages = {1 -- 10}, year = {1999}, language = {en} } @article{SchubaSchneiderHaverkort1998, author = {Schuba, Marko and Schneider, Gaby and Haverkort, Boudewijn R.}, title = {QNA-MC: A Performance Evaluation Tool for Communication Networks with Multicast Data Streams / Schneider, G. ; Schuba, M. ; Haverkort, B. R.}, series = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, journal = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, publisher = {Springer}, address = {Berlin}, isbn = {3-540-64949-2}, pages = {105 -- 116}, year = {1998}, language = {en} } @article{SchubaReichlKesdoganetal.1998, author = {Schuba, Marko and Reichl, Peter and Kesdogan, Dogan and Jungh{\"a}rtchen, Klaus}, title = {Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks / Reichl, P. ; Kesdogan, D. ; Jungh{\"a}rtchen, K. ; Schuba, M.}, series = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, journal = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, publisher = {Springer}, address = {Berlin}, isbn = {3-540-64949-2}, pages = {105 -- 116}, year = {1998}, language = {en} } @article{SchubaReichlHoff1997, author = {Schuba, Marko and Reichl, Peter and Hoff, Simon}, title = {How to Model Complex Periodic Traffic with TES / Reichl, Peter ; Schuba, Marko ; Hoff, Simon}, series = {Proc. of 13th United Kingdom Workshop on Performance Engineering, Edinburgh, UK, July 1997}, journal = {Proc. of 13th United Kingdom Workshop on Performance Engineering, Edinburgh, UK, July 1997}, pages = {17/1 -- 17/11}, year = {1997}, language = {en} } @article{SchubaReichl1996, author = {Schuba, Marko and Reichl, Peter}, title = {How to Place Connectionless Servers in ATM Networks / Schuba, Marko ; Reichl, Peter}, series = {Proc. of Fourth IFIP Workshop on Performance Modelling and Evaluation of ATM Networks}, journal = {Proc. of Fourth IFIP Workshop on Performance Modelling and Evaluation of ATM Networks}, pages = {09/1 -- 09/10}, year = {1996}, language = {en} } @article{SchubaReichl1998, author = {Schuba, Marko and Reichl, Peter}, title = {On large-scale reliable multicast protocols / Schuba, M. ; Reichl, P.}, series = {6th IEE Conference on Telecommunications}, journal = {6th IEE Conference on Telecommunications}, isbn = {0-85296-700-4}, pages = {133 -- 137}, year = {1998}, language = {en} } @article{SchubaReichl1998, author = {Schuba, Marko and Reichl, Peter}, title = {An Analysis of Retransmission Strategies for Reliable Multicast Protocols / Schuba, M. ; Reichl, P.}, series = {Performance of information and communication systems : IFIP TC 6,WG 6.3 Seventh International Conference on Performance of Information and Communication Systems (PICS '98), 25 - 28 May, Lund, Sweden / ed. by Ulf K{\"o}rner ...}, journal = {Performance of information and communication systems : IFIP TC 6,WG 6.3 Seventh International Conference on Performance of Information and Communication Systems (PICS '98), 25 - 28 May, Lund, Sweden / ed. by Ulf K{\"o}rner ...}, publisher = {Chapman Hall}, address = {London}, isbn = {0-412-83730-7}, pages = {1 -- 12}, year = {1998}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @article{SchubaHermanns1995, author = {Schuba, Marko and Hermanns, Oliver}, title = {Performance Investigations of the IP Multicast Architecture / Hermanns, Oliver ; Schuba, Marko}, series = {Performance of the IP Multicast Achitecture . Proceedings JENC 6. Proceedings of the 6th Joint European Networking Conference, Tel Aviv}, journal = {Performance of the IP Multicast Achitecture . Proceedings JENC 6. Proceedings of the 6th Joint European Networking Conference, Tel Aviv}, pages = {121-1 -- 121-8}, year = {1995}, language = {en} } @article{SchubaHaverkortSchneider2000, author = {Schuba, Marko and Haverkort, Boudewijn R. and Schneider, Gaby}, title = {Performance evaluation of multicast communication in packet-switched networks / Schuba, Marko ; Haverkort, Boudewijn R. ; Schneider, Gaby}, series = {Performance Evaluation. 39 (2000), H. 1-4}, journal = {Performance Evaluation. 39 (2000), H. 1-4}, isbn = {0166-5316}, pages = {61 -- 80}, year = {2000}, language = {en} }