TY - BOOK A1 - Renckly, Sven A1 - Wählisch, Georg T1 - Technisches Zeichnen für Dummies Y1 - 2017 SN - 978-3-527-70966-3 PB - Wiley CY - Weinheim ER - TY - BOOK A1 - Labisch, Susanna A1 - Wählisch, Georg T1 - Technisches Zeichnen: Eigenständig lernen und effektiv üben Y1 - 2017 SN - 978-3-658-18313-4 U6 - https://doi.org/10.1007/978-3-658-18313-4 N1 - auch gedruckt in der Bereichsbibliothek Jülich unter der Signatur 61 WBA 6(5) PB - Springer Fachmedien CY - Wiesbaden ET - 5. Aufl. ER - TY - CHAP A1 - Schreiber, Marc A1 - Kraft, Bodo A1 - Zündorf, Albert ED - Bilof, Randall T1 - Metrics driven research collaboration: focusing on common project goals continuously T2 - Proceedings : 2017 IEEE/ACM 4th International Workshop on Software Engineering Research and Industrial Practice : SER&IP 2017 : 21 May 2017 Buenos Aires, Argentina Y1 - 2017 SN - 978-1-5386-2797-6 U6 - https://doi.org/10.1109/SER-IP.2017..6 SP - 41 EP - 47 PB - IEEE Press CY - Piscataway, NJ ER - TY - JOUR A1 - Bronder, Thomas A1 - Poghossian, Arshak A1 - Keusgen, Michael A1 - Schöning, Michael Josef T1 - Label-free detection of double-stranded DNA molecules with polyelectrolyte-modified capacitive field-effect sensors T1 - Markierungsfreie Detektion doppelsträngiger DNA Moleküle mit Hilfe von Polyelektrolyt-modifizierten kapazitiven Feldeffekt-Sensoren JF - tm - Technisches Messen N2 - In this study, polyelectrolyte-modified field-effect-based electrolyte-insulator-semiconductor (EIS) devices have been used for the label-free electrical detection of double-stranded deoxyribonucleic acid (dsDNA)molecules. The sensor-chip functionalization with a positively charged polyelectrolyte layer provides the possibility of direct adsorptive binding of negatively charged target DNA oligonucleotides onto theSiO2-chip surface.EIS sensors can be utilized as a tool to detect surface-charge changes; the electrostatic adsorption of oligonucleotides onto the polyelectrolyte layer leads to a measureable surface-potential change. Signals of 39mV have been recorded after the incubation with the oligonucleotide solution. Besides the electrochemical experiments, the successful adsorption of dsDNA onto the polyelectrolyte layer has been verified via fluorescence microscopy. The presented results demonstrate that the signal recording of EISchips, which are modified with a polyelectrolyte layer, canbe used as a favorable approach for a fast, cheap and simple detection method for dsDNA. Y1 - 2017 U6 - https://doi.org/10.1515/teme-2017-0015 VL - 84 IS - 10 SP - 628 EP - 634 PB - De Gruyter CY - Oldenbourg ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - GEN A1 - Nobisrath, Ulrich A1 - Zündorf, Albert A1 - George, Tobias A1 - Ruben, Jubeh A1 - Kraft, Bodo T1 - Software Stories Guide N2 - Software Stories are a simple graphical notation for requirements analysis and design in agile software projects. Software Stories are based on example scenarios. Example scenarios facilitate the communication between lay people or domain experts and software experts. Y1 - 2017 ER - TY - BOOK A1 - Pieper, Martin T1 - Mathematische Optimierung: Eine Einführung in die kontinuierliche Optimierung mit Beispielen Y1 - 2017 SN - 978-3-658-16975-6 U6 - https://doi.org/10.1007/978-3-658-16975-6 PB - Springer Fachmedien CY - Wiesbaden ER - TY - CHAP A1 - Thurn, Laura A1 - Gebhardt, Andreas T1 - Arousing Enthusiasm for STEM: Teaching 3D Printing Technology T2 - Conference Proceedings: New Perspectives in Science Education Y1 - 2017 SN - 978-88-6292-847-2 SP - 87 EP - 92 PB - liberiauniversitaria.it CY - Padua ER - TY - JOUR A1 - Balzer, Hermann A1 - Streit, Daniel T1 - Das Translationsrisiko multinationaler Konzerne in Deutschland: Eine explorative Analyse von Verständnis, Bedeutung und Management-Praxis mit Hilfe der Critical Incident Technique JF - Schmalenbachs Zeitschrift für betriebswirtschaftliche Forschung Y1 - 2017 U6 - https://doi.org/10.1007/s41471-017-0029-x SN - 2366-6153 N1 - Arbeitskreis Finanzierung der Schmalenbach-Gesellschaft e.V. IS - Online first SP - 1 EP - 40 PB - Springer CY - Berlin ER -