TY - JOUR A1 - Köhler, Klemens A1 - Wolf, Martin R. T1 - Organisatorische Maßnahmen zu Erhöhung der IT Sicherheit – Empfehlungen aus der Perspektive der Konflikttheorie N2 - Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden. Y1 - 2020 IS - Preprint ER - TY - JOUR A1 - Köhler, Klemens T1 - A conflict theory perspective of IT attacks – consequences for IT security education N2 - Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games. Y1 - 2020 IS - Preprint ER - TY - CHAP A1 - Reke, Michael A1 - Peter, Daniel A1 - Schulte-Tigges, Joschua A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Walter, Thomas A1 - Matheis, Dominik T1 - A Self-Driving Car Architecture in ROS2 T2 - 2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa N2 - In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions. Y1 - 2020 SN - 978-1-7281-4162-6 U6 - https://doi.org/10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020 N1 - 2020 International SAUPEC/RobMech/PRASA Conference, 29-31 Jan. 2020, Cape Town, South Africa SP - 1 EP - 6 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Dinghofer, Kai A1 - Hartung, Frank T1 - Analysis of Criteria for the Selection of Machine Learning Frameworks T2 - 2020 International Conference on Computing, Networking and Communications (ICNC) N2 - With the many achievements of Machine Learning in the past years, it is likely that the sub-area of Deep Learning will continue to deliver major technological breakthroughs [1]. In order to achieve best results, it is important to know the various different Deep Learning frameworks and their respective properties. This paper provides a comparative overview of some of the most popular frameworks. First, the comparison methods and criteria are introduced and described with a focus on computer vision applications: Features and Uses are examined by evaluating papers and articles, Adoption and Popularity is determined by analyzing a data science study. Then, the frameworks TensorFlow, Keras, PyTorch and Caffe are compared based on the previously described criteria to highlight properties and differences. Advantages and disadvantages are compared, enabling researchers and developers to choose a framework according to their specific needs. Y1 - 2020 U6 - https://doi.org/10.1109/ICNC47757.2020.9049650 N1 - 2020 International Conference on Computing, Networking and Communications (ICNC), 17-20 February 2020, Big Island, HI, USA SP - 373 EP - 377 PB - IEEE CY - New York, NY ER - TY - JOUR A1 - Köhler, Klemens A1 - Röpke, René A1 - Wolf, Martin R. T1 - Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security JF - ISAGA 2019: Simulation Gaming Through Times and Disciplines N2 - Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved. KW - IT security education KW - Competence Developing Games KW - Game-based learning KW - Keyword analysis KW - Bloom’s Taxonomy Y1 - 2021 U6 - https://doi.org/10.1007/978-3-030-72132-9_6 N1 - ISAGA 2019 - International Simulation and Gaming Association Conference. 26-30 August 2019. Warsaw, Poland. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11988) SP - 61 EP - 73 PB - Springer CY - Cham ER - TY - JOUR A1 - Limpert, Nicolas A1 - Wiesen, Patrick A1 - Ferrein, Alexander A1 - Kallweit, Stephan A1 - Schiffer, Stefan T1 - The ROSIN Project and its Outreach to South Africa JF - R&D Journal Y1 - 2019 VL - 35 SP - 1 EP - 6 ER - TY - CHAP A1 - Alhwarin, Faraj A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Scholl, Ingrid T1 - An Optimized Method for 3D Body Scanning Applications Based on KinectFusion T2 - Communications in Computer and Information Science Y1 - 2019 U6 - https://doi.org/10.1007/978-3-030-29196-9_6 SN - 1865-0929 N1 - 11th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2018; Funchal; Portugal; 19 January 2018 through 21 January 2018 VL - 1024 SP - 100 EP - 113 PB - Springer ER - TY - CHAP A1 - Rao, Deepak A1 - Pathrose, Plato A1 - Hüning, Felix A1 - Sid, Jithin T1 - An Approach for Validating Safety of Perception Software in Autonomous Driving Systems T2 - Model-Based Safety and Assessment: 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16–18, 2019, Proceedings N2 - The increasing complexity of Advanced Driver Assistance Systems (ADAS) presents a challenging task to validate safe and reliable performance of these systems under varied conditions. The test and validation of ADAS/AD with real test drives, although important, involves huge costs and time. Simulation tools provide an alternative with the added advantage of reproducibility but often use ideal sensors, which do not reflect real sensor output accurately. This paper presents a new validation methodology using fault injection, as recommended by the ISO 26262 standard, to test software and system robustness. In our work, we investigated and developed a tool capable of inserting faults at different software and system levels to verify its robustness. The scope of this paper is to cover the fault injection test for the Visteon’s DriveCore™ system, a centralized domain controller for Autonomous driving which is sensor agnostic and SoC agnostic. With this new approach, the validation of safety monitoring functionality and its behavior can be tested using real-world data instead of synthetic data from simulation tools resulting in having better confidence in system performance before proceeding with in-vehicle testing. KW - Advanced driver assistance systems (ADAS/AD) KW - ISO 26262 KW - Safety-critical systems validation KW - Safety of the intended functionality (SOTIF) Y1 - 2019 SN - 978-3-030-32872-6 U6 - https://doi.org/10.1007/978-3-030-32872-6_20 SP - 303 EP - 316 PB - Springer CY - Cham ER - TY - BOOK ED - Wolf, Martin R. ED - Barton, Thomas ED - Herrmann, Frank ED - Meister, Vera G. ED - Müller, Christian ED - Seel, Christian T1 - Angewandte Forschung in der Wirtschaftsinformatik BT - Tagungsband zur 32. AKWI-Jahrestagung vom 15.09.2019 bis 18.09.2019 an der Fachhochschule für Angewandte Wissenschaften Aachen Y1 - 2019 SN - 978-3-944330-62-4 N1 - Buch ist in der Bereichsbibliothek Eupener Str. vorhanden. Signatur: 21 QGT 95-2019 PB - Mana-Buch CY - Heide ER - TY - JOUR A1 - Orzada, Stephan A1 - Solbach, Klaus A1 - Gratz, Marcel A1 - Brunheim, Sascha A1 - Fiedler, Thomas M. A1 - Johst, Sören A1 - Bitz, Andreas A1 - Shooshtary, Samaneh A1 - Abuelhaija, Asjraf A1 - Voelker, Maximilian N. A1 - Rietsch, Stefan H. G. A1 - Kraff, Oliver A1 - Maderwald, Stefan A1 - Flöser, Martina A1 - Oehmingen, Mark A1 - Quick, Harald H. A1 - Ladd, Mark E. T1 - A 32-channel parallel transmit system add-on for 7T MRI JF - Plos one Y1 - 2019 U6 - https://doi.org/10.1371/journal.pone.0222452 ER -