TY - CHAP A1 - Fuchs, Britta A1 - Ritz, Thomas T1 - Usability for Blended Shopping - Solving Major Flaws by Applying Usability Engineering and Proven Integration Technologies T2 - Proceedings of the 11th International Conference on e-Business, ICE-B 2014, Vienna, Austria Y1 - 2014 SN - 978-989-758-043-7 U6 - http://dx.doi.org/10.5220/0005113502160223 SP - 216 EP - 223 ER - TY - CHAP A1 - Hüning, Felix T1 - Power Semiconductors for the automotive 48V board net T2 - PCIM Europe 2016 Conference Proceedings Y1 - 2016 SN - 978-3-8007-4186-1 SP - 1963 EP - 1969 PB - VDE Verl. CY - Berlin ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin ED - Stephanidis, C. T1 - The pyramid assessment framework for ‘competence developing games’ T2 - Communications in Computer and Information Science Y1 - 2016 SN - 978-331940541-4 U6 - http://dx.doi.org/10.1007/978-3-319-40542-1_37 SN - 1865-0929 N1 - 18th International Conference on Posters’ Extended Abstracts, HCI International 2016; Toronto; Canada; 17 July 2016 through 22 July 2016 VL - 618 SP - 232 EP - 237 PB - Springer ER - TY - CHAP A1 - Ferrein, Alexander A1 - Maier, Christopher A1 - Mühlbacher, Clemens A1 - Niemüller, Tim A1 - Steinbauer, Gerald A1 - Vassos, Stravros T1 - Controlling logistics robots with the action-based language YAGI T2 - Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I Y1 - 2016 SN - 978-3-319-43505-3 (Print) SN - 978-3-319-43506-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-319-43506-0_46 N1 - Series: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) VL - 9834 SP - 525 EP - 537 PB - Springer ER - TY - CHAP A1 - Neumann, Tobias A1 - Dülberg, Enno A1 - Schiffer, Stefan A1 - Ferrein, Alexander T1 - A rotating platform for swift acquisition of dense 3D point clouds T2 - Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I Y1 - 2016 SN - 978-3-319-43505-3 (Print) SN - 978-3-319-43506-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-319-43506-0_22 N1 - Series: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) VL - 9834 SP - 257 EP - 268 PB - Springer ER - TY - CHAP A1 - Harzheim, Thomas A1 - Heuermann, Holger A1 - Marso, Michel T1 - An Adaptive Biasing Method for SRD Comb Generators T2 - 2016 German Microwave Conference (GeMiC) Y1 - 2016 U6 - http://dx.doi.org/10.1109/GEMIC.2016.7461613 N1 - GeMiC 2016 ; March 14–16, 2016, Bochum, Germany SP - 289 EP - 292 PB - IEEE ER - TY - CHAP A1 - Broenner, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Streamlining extraction and analysis of android RAM images T2 - Proceedings of the 2nd international conference on information systems security and privacy Y1 - 2016 SN - 978-989-758-167-0 U6 - http://dx.doi.org/10.5220/0005652802550264 SP - 255 EP - 264 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Bitz, Andreas A1 - Klomp, D.W. A1 - Ladd, M.E. T1 - Experimental and numerical determination of SAR and temperature distribution of a human endorectal coil for MR imaging of the prostate at 7T (903.) T2 - 16th annual ISMRM scientific meeting and exhibition 2008 : Toronto, Ontario, Canada, 3 - 9 May 2008 Y1 - 2009 SN - 978-1-61567-196-0 PB - Curran CY - Red Hook, NY ER - TY - CHAP A1 - Bitz, Andreas A1 - El Ouardi, A. A1 - Streckert, J. A1 - Hansen, V. T1 - Efficient calculation of human exposure in front of base station antennas by a combination of the FDTD and Hybrid(2)-method T2 - Proceedings of the 16th International Zurich Symposium on Electromagnetic Compatibility, Topical Meeting on Biomedical EMC, Zurich, Switzerland, February 2005 Y1 - 2005 SN - 3-9521199-9-7 SP - 115 EP - 118 PB - ETH Zentrum CY - Zürich ER -