@inproceedings{BegingPoghossianMlyneketal.2010, author = {Beging, Stefan and Poghossian, Arshak and Mlynek, D. and Hataihimakul, S. and Pedraza, A. and Dhawan, S. and Laube, N. and Kleinen, Lisa and Baldsiefen, Gerhard and Busch, Heinrich von and Sch{\"o}ning, Michael Josef}, title = {Ion-selective sensors for the determination of the risk of urinary stone formation}, series = {Micro- and Nanosystems in biochemical diagnosis : Principles and applications}, booktitle = {Micro- and Nanosystems in biochemical diagnosis : Principles and applications}, address = {Warsaw}, pages = {74 -- 80}, year = {2010}, language = {en} } @inproceedings{LindenlaufHoefkenSchuba2015, author = {Lindenlauf, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Cold Boot Attacks on DDR2 and DDR3 SDRAM}, series = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, booktitle = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, doi = {10.1109/ARES.2015.28}, pages = {287 -- 292}, year = {2015}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{GligorevicJostWalter2009, author = {Gligorevic, Snjezana and Jost, T. and Walter, Michael}, title = {Scatterer based airport surface channel model}, series = {IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla.}, booktitle = {IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla.}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {978-1-4244-4078-8}, pages = {4C2-1 -- 4C2-10}, year = {2009}, language = {en} } @inproceedings{SchifferFerreinLakemeyer2011, author = {Schiffer, Stefan and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Fuzzy representations and control for domestic service robots in Golog}, series = {Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102)}, booktitle = {Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102)}, publisher = {ACM}, address = {New York}, isbn = {978-3-642-25486-4}, doi = {10.1007/978-3-642-25489-5_24}, pages = {241 -- 250}, year = {2011}, abstract = {In the RoboCup@Home domestic service robot competition, complex tasks such as "get the cup from the kitchen and bring it to the living room" or "find me this and that object in the apartment" have to be accomplished. At these competitions the robots may only be instructed by natural language. As humans use qualitative concepts such as "near" or "far", the robot needs to cope with them, too. For our domestic robot, we use the robot programming and plan language Readylog, our variant of Golog. In previous work we extended the action language Golog, which was developed for the high-level control of agents and robots, with fuzzy concepts and showed how to embed fuzzy controllers in Golog. In this paper, we demonstrate how these notions can be fruitfully applied to two domestic service robotic scenarios. In the first application, we demonstrate how qualitative fluents based on a fuzzy set semantics can be deployed. In the second program, we show an example of a fuzzy controller for a follow-a-person task.}, language = {en} } @inproceedings{LogenHoefkenSchuba2012, author = {Logen, Steffen and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework}, series = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, booktitle = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, publisher = {IEEE}, address = {New York}, isbn = {978-1-4673-2244-7}, doi = {10.1109/ARES.2012.12}, pages = {620 -- 624}, year = {2012}, abstract = {The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database.}, language = {en} } @inproceedings{SchollBartellaMoluluoetal.2019, author = {Scholl, Ingrid and Bartella, Alexander K. and Moluluo, Cem and Ertural, Berat and Laing, Frederic and Suder, Sebastian}, title = {MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality}, series = {Bildverarbeitung f{\"u}r die Medizin 2019 : Algorithmen - Systeme - Anwendungen}, booktitle = {Bildverarbeitung f{\"u}r die Medizin 2019 : Algorithmen - Systeme - Anwendungen}, publisher = {Springer Vieweg}, address = {Wiesbaden}, isbn = {978-3-658-25326-4}, doi = {10.1007/978-3-658-25326-4_32}, pages = {152 -- 157}, year = {2019}, language = {en} } @inproceedings{GrundmannBauerBorchersetal.2019, author = {Grundmann, Jan Thimo and Bauer, Waldemar and Borchers, Kai and Dumont, Etienne and Grimm, Christian D. and Ho, Tra-Mi and Jahnke, Rico and Koch, Aaron D. and Lange, Caroline and Maiwald, Volker and Meß, Jan-Gerd and Mikulz, Eugen and Quantius, Dominik and Reershemius, Siebo and Renger, Thomas and Sasaki, Kaname and Seefeldt, Patric and Spietz, Peter and Spr{\"o}witz, Tom and Sznajder, Maciej and Toth, Norbert and Ceriotti, Matteo and McInnes, Colin and Peloni, Alessandro and Biele, Jens and Krause, Christian and Dachwald, Bernd and Hercik, David and Lichtenheldt, Roy and Wolff, Friederike and Koncz, Alexander and Pelivan, Ivanka and Schmitz, Nicole and Boden, Ralf and Riemann, Johannes and Seboldt, Wolfgang and Wejmo, Elisabet and Ziach, Christian and Mikschl, Tobias and Montenegro, Sergio and Ruffer, Michael and Cordero, Federico and Tardivel, Simon}, title = {Solar sails for planetary defense \& high-energy missions}, series = {IEEE Aerospace Conference Proceedings}, booktitle = {IEEE Aerospace Conference Proceedings}, doi = {10.1109/AERO.2019.8741900}, pages = {1 -- 21}, year = {2019}, abstract = {20 years after the successful ground deployment test of a (20 m) 2 solar sail at DLR Cologne, and in the light of the upcoming U.S. NEAscout mission, we provide an overview of the progress made since in our mission and hardware design studies as well as the hardware built in the course of our solar sail technology development. We outline the most likely and most efficient routes to develop solar sails for useful missions in science and applications, based on our developed `now-term' and near-term hardware as well as the many practical and managerial lessons learned from the DLR-ESTEC Gossamer Roadmap. Mission types directly applicable to planetary defense include single and Multiple NEA Rendezvous ((M)NR) for precursor, monitoring and follow-up scenarios as well as sail-propelled head-on retrograde kinetic impactors (RKI) for mitigation. Other mission types such as the Displaced L1 (DL1) space weather advance warning and monitoring or Solar Polar Orbiter (SPO) types demonstrate the capability of near-term solar sails to achieve asteroid rendezvous in any kind of orbit, from Earth-coorbital to extremely inclined and even retrograde orbits. Some of these mission types such as SPO, (M)NR and RKI include separable payloads. For one-way access to the asteroid surface, nanolanders like MASCOT are an ideal match for solar sails in micro-spacecraft format, i.e. in launch configurations compatible with ESPA and ASAP secondary payload platforms. Larger landers similar to the JAXA-DLR study of a Jupiter Trojan asteroid lander for the OKEANOS mission can shuttle from the sail to the asteroids visited and enable multiple NEA sample-return missions. The high impact velocities and re-try capability achieved by the RKI mission type on a final orbit identical to the target asteroid's but retrograde to its motion enables small spacecraft size impactors to carry sufficient kinetic energy for deflection.}, language = {en} }