TY - JOUR A1 - Wilke, Thomas T1 - Newly found plans for the chapel of the Holy Shroud JF - Studi Piemontesi Y1 - 2017 SN - 0392-7261 VL - XLVI IS - 1 SP - 75 EP - 85 ER - TY - JOUR A1 - Wilson, Ian D. A1 - Wilson, Claire E. A1 - Scheer, Nico A1 - Dickie, A.P. A1 - Schreiter, K. A1 - Wilson, E. M. A1 - Riley, R. J. A1 - Wehr, R. A1 - Bial, J. T1 - The Pharmacokinetics and Metabolism of Lumiracoxib in Chimeric Humanized and Murinized FRG Mice JF - Biochemical pharmacology Y1 - 2017 U6 - https://doi.org/10.1016/j.bcp.2017.03.015 SN - 1873-2968 VL - Volume 135 SP - 139 EP - 150 PB - Elsevier CY - Amsterdam ER - TY - CHAP A1 - Samuelsson, K. A1 - Scheer, Nico A1 - Wilson, I. A1 - Wolf, C.R. A1 - Henderson, C.J. ED - Chackalamannil, Samuel T1 - Genetically Humanized Animal Models T2 - Comprehensive Medicinal Chemistry III. 3rd Edition N2 - Genetically humanized mice for proteins involved in drug metabolism and toxicity and mice engrafted with human hepatocytes are emerging as promising in vivo models for improved prediction of the pharmacokinetic, drug–drug interaction, and safety characteristics of compounds in humans. This is an overview on the genetically humanized and chimeric liver-humanized mouse models, which are illustrated with examples of their utility in drug metabolism and toxicity studies. The models are compared to give guidance for selection of the most appropriate model by highlighting advantages and disadvantages to be carefully considered when used for studies in drug discovery and development. KW - Chimeric liver-humanized mice KW - Drug distribution KW - Drug metabolism KW - Toxicology KW - Knockout mice Y1 - 2017 SN - 978-0-12-803201-5 U6 - https://doi.org/10.1016/B978-0-12-409547-2.12376-5 SP - 130 EP - 149 PB - Elsevier CY - Saint Louis ER - TY - JOUR A1 - Engelmann, Ulrich M. A1 - Buhl, Eva Miriam A1 - Baumann, Martin A1 - Schmitz-Rode, Thomas A1 - Slabu, Ioana T1 - Agglomeration of magnetic nanoparticles and its effects on magnetic hyperthermia JF - Current Directions in Biomedical Engineering Y1 - 2017 U6 - https://doi.org/10.1515/cdbme-2017-0096 SN - 2364-5504 VL - 3 IS - 2 SP - 457 EP - 460 PB - De Gruyter CY - Berlin ER - TY - JOUR A1 - Chen, Chao A1 - Jost, Peter A1 - Volker, Hanno A1 - Kaminski, Marvin A1 - Wirtssohn, Matti R. A1 - Engelmann, Ulrich M. A1 - Krüger, K. A1 - Schlich, Franziska F. A1 - Schlockermann, Carl A1 - Lobo, Ricardo P.S.M. A1 - Wuttig, Matthias T1 - Dielectric properties of amorphous phase-change materials JF - Physical Review B Y1 - 2017 U6 - https://doi.org/10.1103/PhysRevB.95.094111 SN - 2469-9950 VL - 95 IS - 9 SP - Article number 094111 ER - TY - JOUR A1 - Sousa, Marcos A. M. A1 - Siqueira, Jose R. Jr. A1 - Vercik, Andres A1 - Schöning, Michael Josef A1 - Oliveira, Osvaldo N. Jr. T1 - Determining the optimized layer-by-layer film architecture with dendrimer/carbon nanotubes for field-effect sensors JF - IEEE Sensors Journal N2 - The capacitive electrolyte–insulator–semiconductor (EIS) structure is a typical device based on a field-effect sensor platform. With a simple silicon-based structure, EIS have been useful for several sensing applications, especially with incorporation of nanostructured films to modulate the ionic transport and the flat-band potential. In this paper, we report on ion transport and changes in flat-band potential in EIS sensors made with layer-by-layer films containing poly(amidoamine) (PAMAM) dendrimer and single-walled carbon nanotubes (SWNTs) adsorbed on p-Si/SiO 2 /Ta 2 O 5 chips with an Al ohmic contact. The impedance spectra were fitted using an equivalent circuit model, from which we could determine parameters such as the double-layer capacitance. This capacitance decreased with the number of bilayers owing to space charge accumulated at the electrolyte–insulator interface, up to three PAMAM/SWNTs bilayers, after which it stabilized. The charge-transfer resistance was also minimum for three bilayers, thus indicating that this is the ideal architecture for an optimized EIS performance. The understanding of the influence of nanostructures and the fine control of operation parameters pave the way for optimizing the design and performance of new EIS sensors. Y1 - 2017 U6 - https://doi.org/10.1109/JSEN.2017.2653238 SN - 1558-1748 VL - 17 IS - 6 SP - 1735 EP - 1740 PB - IEEE CY - New York ER - TY - CHAP A1 - Schreiber, Marc A1 - Kraft, Bodo A1 - Zündorf, Albert ED - Bilof, Randall T1 - Metrics driven research collaboration: focusing on common project goals continuously T2 - Proceedings : 2017 IEEE/ACM 4th International Workshop on Software Engineering Research and Industrial Practice : SER&IP 2017 : 21 May 2017 Buenos Aires, Argentina Y1 - 2017 SN - 978-1-5386-2797-6 U6 - https://doi.org/10.1109/SER-IP.2017..6 SP - 41 EP - 47 PB - IEEE Press CY - Piscataway, NJ ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - GEN A1 - Nobisrath, Ulrich A1 - Zündorf, Albert A1 - George, Tobias A1 - Ruben, Jubeh A1 - Kraft, Bodo T1 - Software Stories Guide N2 - Software Stories are a simple graphical notation for requirements analysis and design in agile software projects. Software Stories are based on example scenarios. Example scenarios facilitate the communication between lay people or domain experts and software experts. Y1 - 2017 ER -