TY - CHAP A1 - Galdi, Chiara A1 - Hartung, Frank A1 - Dugelay, Jean-Luc T1 - Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones T2 - Electronic Imaging N2 - Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos. KW - Image Forensics KW - Mobile Phones KW - Image Database Y1 - 2017 U6 - http://dx.doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-331 SN - 2470-1173 N1 - IS&T International Symposium on Electronic Imaging 2017 Media Watermarking, Security, and Forensics 2017 SP - 100 EP - 103 PB - Society for Imaging Science and Technology CY - Springfield, Virginia ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Marco, Heather G. A1 - Ferrein, Alexander T1 - AGNES: The African-German Network of Excellence in Science T2 - Proceedings of the 2nd Developing World Robotics Forum, Workshop at IEEE AFRICON 2017 Y1 - 2017 SP - 1 EP - 2 ER - TY - CHAP A1 - Niemueller, Tim A1 - Neumann, Tobias A1 - Henke, Christoph A1 - Schönitz, Sebastian A1 - Reuter, Sebastian A1 - Ferrein, Alexander A1 - Jeschke, Sabina A1 - Lakemeyer, Gerhard T1 - Improvements for a robust production in the RoboCup logistics league 2016 T2 - RoboCup 2016: Robot World Cup XX. RoboCup 2016. Y1 - 2017 SN - 978-3-319-68792-6 U6 - http://dx.doi.org/10.1007/978-3-319-68792-6_49 SP - 589 EP - 600 PB - Springer CY - Cham ER - TY - CHAP A1 - Niemueller, Tim A1 - Neumann, Tobias A1 - Henke, Christoph A1 - Schönitz, Sebastian A1 - Reuter, Sebastian A1 - Ferrein, Alexander A1 - Jeschke, Sabina A1 - Lakemeyer, Gerhard T1 - International Harting Open Source Award 2016: Fawkes for the RoboCup Logistics League T2 - RoboCup 2016: RoboCup 2016: Robot World Cup XX. RoboCup 2016 Y1 - 2017 SN - 978-3-319-68792-6 U6 - http://dx.doi.org/10.1007/978-3-319-68792-6_53 N1 - Lecture Notes in Computer Science, LNCS, Vol 9776 SP - 634 EP - 642 PB - Springer CY - Cham ER - TY - CHAP A1 - Niemueller, Tim A1 - Zwilling, Frederik A1 - Lakemeyer, Gerhard A1 - Löbach, Matthias A1 - Reuter, Sebastian A1 - Jeschke, Sabina A1 - Ferrein, Alexander T1 - Cyber-Physical System Intelligence T2 - Industrial Internet of Things N2 - Cyber-physical systems are ever more common in manufacturing industries. Increasing their autonomy has been declared an explicit goal, for example, as part of the Industry 4.0 vision. To achieve this system intelligence, principled and software-driven methods are required to analyze sensing data, make goal-directed decisions, and eventually execute and monitor chosen tasks. In this chapter, we present a number of knowledge-based approaches to these problems and case studies with in-depth evaluation results of several different implementations for groups of autonomous mobile robots performing in-house logistics in a smart factory. We focus on knowledge-based systems because besides providing expressive languages and capable reasoning techniques, they also allow for explaining how a particular sequence of actions came about, for example, in the case of a failure. KW - Smart factory KW - Industry 4.0 KW - Multi-robot systems KW - Autonomous mobile robots KW - RoboCup Y1 - 2017 SN - 978-3-319-42559-7 U6 - http://dx.doi.org/10.1007/978-3-319-42559-7_17 N1 - Springer Series in Wireless Technology SP - 447 EP - 472 PB - Springer CY - Cham ER - TY - JOUR A1 - Noureddine, Yacine A1 - Kraff, Oliver A1 - Ladd, Mark E. A1 - Wrede, Karsten H. A1 - Chen, Bixia A1 - Quick, Harald H. A1 - Schaefers, Gregor A1 - Bitz, Andreas T1 - In vitro and in silico assessment of RF-induced heating around intracranial aneurysm clips at 7 Tesla JF - Magnetic Resonance in Medicine Y1 - 2017 U6 - http://dx.doi.org/10.1002/mrm.26650 SN - 1522-2594 IS - Early view PB - Wiley CY - Weinheim ER - TY - JOUR A1 - Orzada, Stephan A1 - Bitz, Andreas A1 - Johst, Sören A1 - Gratz, Marcel A1 - Völker, Maximilian N. A1 - Kraff, Oliver A1 - Abuelhaija, Ashraf A1 - Fiedler, Thomas M. A1 - Solbach, Klaus A1 - Quick, Harald H. A1 - Ladd, Mark E. T1 - Analysis of an integrated 8-Channel Tx/Rx body array for use as a body coil in 7-Tesla MRI JF - Frontiers in Physics Y1 - 2017 U6 - http://dx.doi.org/10.3389/fphy.2017.00017 SN - 2296-424X N1 - Article number 17 VL - 5 IS - Jun ER - TY - JOUR A1 - Rietsch, Stefan H. G. A1 - Pfaffenrot, Viktor A1 - Bitz, Andreas A1 - Orzada, Stephan A1 - Brunheim, Sascha A1 - Lazik-Palm, Andrea A1 - Theysohn, Jens M. A1 - Ladd, Mark E. A1 - Quick, Harald H. A1 - Kraff, Oliver T1 - An 8-channel transceiver 7-channel receive RF coil setup for high SNR ultrahigh-field MRI of the shoulder at 7T JF - Medical Physics Y1 - 2017 U6 - http://dx.doi.org/10.1002/mp.12612 SN - 0094-2405 IS - Article in press PB - Wiley CY - Hoboken ER - TY - CHAP A1 - Schiffer, Stefan A1 - Ferrein, Alexander T1 - A System Layout for Cognitive Service Robots T2 - Cognitive Robot Architectures. Proceedings of EUCognition 2016 Y1 - 2017 SN - 1613-0073 N1 - CEUR-WS Vol-1855 SP - 44 EP - 45 ER - TY - CHAP A1 - Schopp, Christoph A1 - Heuermann, Holger A1 - Marso, Michel T1 - Multiphysical Study of an Atmospheric Microwave Argon Plasma Jet T2 - IEEE Transactions on Plasma Science Y1 - 2017 U6 - http://dx.doi.org/10.1109/TPS.2017.2692735 SN - 1939-9375 VL - 45 IS - 6 SP - 932 EP - 937 PB - IEEE ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Stopforth, Riaan A1 - Davrajh, Shaniel A1 - Ferrein, Alexander T1 - South African robotics entity for a collaboration initiative T2 - Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2016 Y1 - 2017 SN - 978-1-5090-3335-5 U6 - http://dx.doi.org/10.1109/RoboMech.2016.7813144 N1 - PRASA-RobMech, Nov. 30 2016-Dec. 2 2016, Stellenbosch, South Africa SP - 1 EP - 6 PB - IEEE ER - TY - CHAP A1 - Stopforth, Riaan A1 - Davrajh, Shaniel A1 - Ferrein, Alexander T1 - Design considerations of the duo fugam dual rotor UAV T2 - 2017 Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech) Y1 - 2017 SN - 978-1-5386-2314-5 U6 - http://dx.doi.org/10.1109/RoboMech.2017.8261115 SP - 7 EP - 13 ER - TY - CHAP A1 - Walenta, Robert A1 - Schellekens, Twan A1 - Ferrein, Alexander A1 - Schiffer, Stefan T1 - A decentralised system approach for controlling AGVs with ROS T2 - AFRICON, Proceedings Y1 - 2017 SN - 978-1-5386-2775-4 U6 - http://dx.doi.org/10.1109/AFRCON.2017.8095693 SN - 2153-0033 N1 - AFRICON <2017, 18-20 Sept., Cape Town, South Africa> SP - 1436 EP - 1441 PB - IEEE ER - TY - CHAP A1 - Zug, Sebastian A1 - Niemueller, Tim A1 - Hochgeschwender, Nico A1 - Seidensticker, Kai A1 - Seidel, Martin A1 - Friedrich, Tim A1 - Neumann, Tobias A1 - Karras, Ulrich A1 - Kraetzschmar, Gerhard K. A1 - Ferrein, Alexander T1 - An Integration Challenge to Bridge the Gap Among Industry-Inspired RoboCup Leagues T2 - RoboCup 2016: Robot World Cup XX. RoboCup 2016. Y1 - 2017 SN - 978-3-319-68792-6 U6 - http://dx.doi.org/10.1007/978-3-319-68792-6_13 N1 - Lecture Notes in Computer Science, LNCS, Vol 9776 SP - 157 EP - 168 PB - Springer CY - Cham ER -