TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm T1 - Cybersicherheit in Produktion, Automotive und intelligenten Gebäuden T2 - IT-Sicherheit - Technologien und Best Practices für die Umsetzung im Unternehmen Y1 - 2022 SN - 978-3-446-47223-5 SN - 978-3-446-47347-8 U6 - https://doi.org/10.3139/9783446473478.012 SP - 193 EP - 218 PB - Carl Hanser Verlag CY - München ER - TY - CHAP A1 - Engländer, Jacques A1 - Kaminski, Lars A1 - Schuba, Marko T1 - Informationssicherheitsmanagement T2 - Digitalisierungs- und Informationsmanagement N2 - Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen. In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können. KW - Informationssicherheitsmanagement KW - Cybersicherheit KW - Cybersecurity KW - Informationssicherheit KW - IT-Sicherheit Y1 - 2022 SN - 978-3-662-63757-9 SN - 978-3-662-63758-6 U6 - https://doi.org/10.1007/978-3-662-63758-6_15 SP - 373 EP - 398 PB - Springer Vieweg CY - Berlin ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - https://doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - CHAP A1 - Christian, Esser A1 - Montag, Tim A1 - Schuba, Marko A1 - Allhof, Manuel T1 - Future critical infrastructure and security - cyberattacks on charging stations T2 - 31st International Electric Vehicle Symposium & Exhibition and International Electric Vehicle Technology Conference (EVS31 & EVTeC 2018) Y1 - 2018 SN - 978-1-5108-9157-9 SP - 665 EP - 671 PB - Society of Automotive Engineers of Japan (JSAE) CY - Tokyo ER - TY - JOUR A1 - Fiedler, Thomas M. A1 - Orzada, Stephan A1 - Flöser, Martina A1 - Rietsch, Stefan H. G. A1 - Schmidt, Simon A1 - Stelter, Jonathan K. A1 - Wittrich, Marco A1 - Quick, Harald H. A1 - Bitz, Andreas A1 - Ladd, Mark E. T1 - Performance and safety assessment of an integrated transmit array for body imaging at 7 T under consideration of specificabsorption rate, tissue temperature, and thermal dose JF - NMR in Biomedicine N2 - In this study, the performance of an integrated body-imaging array for 7 T with 32 radiofrequency (RF) channels under consideration of local specific absorption rate (SAR), tissue temperature, and thermal dose limits was evaluated and the imaging performance was compared with a clinical 3 T body coil. Thirty-two transmit elements were placed in three rings between the bore liner and RF shield of the gradient coil. Slice-selective RF pulse optimizations for B1 shimming and spokes were performed for differently oriented slices in the body under consideration of realistic constraints for power and local SAR. To improve the B1+ homogeneity, safety assessments based on temperature and thermal dose were performed to possibly allow for higher input power for the pulse optimization than permissible with SAR limits. The results showed that using two spokes, the 7 T array outperformed the 3 T birdcage in all the considered regions of interest. However, a significantly higher SAR or lower duty cycle at 7 T is necessary in some cases to achieve similar B1+ homogeneity as at 3 T. The homogeneity in up to 50 cm-long coronal slices can particularly benefit from the high RF shim performance provided by the 32 RF channels. The thermal dose approach increases the allowable input power and the corresponding local SAR, in one example up to 100 W/kg, without limiting the exposure time necessary for an MR examination. In conclusion, the integrated antenna array at 7 T enables a clinical workflow for body imaging and comparable imaging performance to a conventional 3 T clinical body coil. KW - body imaging at 7 T MRI KW - thermal dose KW - tissue temperature KW - transmit antenna arrays Y1 - 2022 U6 - https://doi.org/10.1002/nbm.4656 SN - 0952-3480 (Print) SN - 1099-1492 (Online) VL - 35 IS - 5 SP - 1 EP - 17 PB - Wiley ER - TY - CHAP A1 - Alhaskir, Mohamed A1 - Tschesche, Matteo A1 - Linke, Florian A1 - Schriewer, Elisabeth A1 - Weber, Yvonne A1 - Wolking, Stefan A1 - Röhrig, Rainer A1 - Koch, Henner A1 - Kutafina, Ekaterina ED - Röhrig, Rainer ED - Grabe, Niels ED - Haag, Martin ED - Hübner, Ursula ED - Sax, Ulrich ED - Schmidt, Carsten Oliver ED - Sedlmayr, Martin ED - Zapf, Antonia T1 - ECG matching: an approach to synchronize ECG datasets for data quality comparisons T2 - Proceedings of the 68th Annual Meeting of the German Association of Medical Informatics, Biometry, and Epidemiology e.V. (gmds) 2023 N2 - Clinical assessment of newly developed sensors is important for ensuring their validity. Comparing recordings of emerging electrocardiography (ECG) systems to a reference ECG system requires accurate synchronization of data from both devices. Current methods can be inefficient and prone to errors. To address this issue, three algorithms are presented to synchronize two ECG time series from different recording systems: Binned R-peak Correlation, R-R Interval Correlation, and Average R-peak Distance. These algorithms reduce ECG data to their cyclic features, mitigating inefficiencies and minimizing discrepancies between different recording systems. We evaluate the performance of these algorithms using high-quality data and then assess their robustness after manipulating the R-peaks. Our results show that R-R Interval Correlation was the most efficient, whereas the Average R-peak Distance and Binned R-peak Correlation were more robust against noisy data. KW - Electrocardiography KW - Wearable electronic device KW - Sensors comparison KW - Time-series synchronization Y1 - 2023 SN - 978-1-64368-428-4 (Print) SN - 978-1-64368-429-1 (Online) U6 - https://doi.org/10.3233/SHTI230718 N1 - Proceedings of the 68th Annual Meeting of the German Association of Medical Informatics, Biometry, and Epidemiology e.V. (gmds) 2023, 17. - 21.9.23, Heilbronn, Germany Part of the series: Studies in Health Technology and Informatics VL - 307 SP - 225 EP - 232 PB - IOS Press ER - TY - CHAP A1 - Tischbein, Franziska A1 - Kean, Kilian A1 - Vertgewall, Chris Martin A1 - Ulbig, Andreas A1 - Altherr, Lena T1 - Determination of the topology of low-voltage distribution grids using cluster methods T2 - 27th International Conference on Electricity Distribution (CIRED 2023) N2 - Due to the decarbonization of the energy sector, the electric distribution grids are undergoing a major transformation, which is expected to increase the load on the operating resources due to new electrical loads and distributed energy resources. Therefore, grid operators need to gradually move to active grid management in order to ensure safe and reliable grid operation. However, this requires knowledge of key grid variables, such as node voltages, which is why the mass integration of measurement technology (smart meters) is necessary. Another problem is the fact that a large part of the topology of the distribution grids is not sufficiently digitized and models are partly faulty, which means that active grid operation management today has to be carried out largely blindly. It is therefore part of current research to develop methods for determining unknown grid topologies based on measurement data. In this paper, different clustering algorithms are presented and their performance of topology detection of low voltage grids is compared. Furthermore, the influence of measurement uncertainties is investigated in the form of a sensitivity analysis. Y1 - 2023 SN - 978-1-83953-855-1 U6 - https://doi.org/10.1049/icp.2023.0478 N1 - 27th International Conference on Electricity Distribution (CIRED 2023), 12-15 June 2023, Rome, Italy. SP - 1 EP - 5 PB - IEEE ER - TY - JOUR A1 - Coll-Perales, Baldomero A1 - Schulte-Tigges, Joschua A1 - Rondinone, Michele A1 - Gozalvez, Javier A1 - Reke, Michael A1 - Matheis, Dominik A1 - Walter, Thomas T1 - Prototyping and evaluation of infrastructure-assisted transition of control for cooperative automated vehicles JF - IEEE Transactions on Intelligent Transportation Systems N2 - Automated driving is now possible in diverse road and traffic conditions. However, there are still situations that automated vehicles cannot handle safely and efficiently. In this case, a Transition of Control (ToC) is necessary so that the driver takes control of the driving. Executing a ToC requires the driver to get full situation awareness of the driving environment. If the driver fails to get back the control in a limited time, a Minimum Risk Maneuver (MRM) is executed to bring the vehicle into a safe state (e.g., decelerating to full stop). The execution of ToCs requires some time and can cause traffic disruption and safety risks that increase if several vehicles execute ToCs/MRMs at similar times and in the same area. This study proposes to use novel C-ITS traffic management measures where the infrastructure exploits V2X communications to assist Connected and Automated Vehicles (CAVs) in the execution of ToCs. The infrastructure can suggest a spatial distribution of ToCs, and inform vehicles of the locations where they could execute a safe stop in case of MRM. This paper reports the first field operational tests that validate the feasibility and quantify the benefits of the proposed infrastructure-assisted ToC and MRM management. The paper also presents the CAV and roadside infrastructure prototypes implemented and used in the trials. The conducted field trials demonstrate that infrastructure-assisted traffic management solutions can reduce safety risks and traffic disruptions. KW - Automated driving KW - automated vehicles KW - connected automated vehicles KW - CAV KW - experimental evaluation Y1 - 2021 U6 - https://doi.org/10.1109/TITS.2021.3061085 SN - 1524-9050 (Print) SN - 1558-0016 (Online) VL - 23 IS - 7 SP - 6720 EP - 6736 PB - IEEE ER - TY - CHAP A1 - Schulte-Tigges, Joschua A1 - Matheis, Dominik A1 - Reke, Michael A1 - Walter, Thomas A1 - Kaszner, Daniel ED - Krömker, Heidi T1 - Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain T2 - HCII 2023: HCI in Mobility, Transport, and Automotive Systems N2 - Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle’s software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany. KW - V2X KW - Transiton of Control KW - Minimum Risk Manoeuvre KW - Operational Design Domain KW - Connected Automated Vehicle Y1 - 2023 SN - 978-3-031-35677-3 (Print) SN - 978-3-031-35678-0 (Online) U6 - https://doi.org/10.1007/978-3-031-35678-0_12 N1 - 5th International Conference, MobiTAS 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023. SP - 200 EP - 210 PB - Springer CY - Cham ER - TY - CHAP A1 - Galdi, Chiara A1 - Hartung, Frank A1 - Dugelay, Jean-Luc T1 - Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones T2 - Electronic Imaging N2 - Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos. KW - Image Forensics KW - Mobile Phones KW - Image Database Y1 - 2017 U6 - https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-331 SN - 2470-1173 N1 - IS&T International Symposium on Electronic Imaging 2017 Media Watermarking, Security, and Forensics 2017 SP - 100 EP - 103 PB - Society for Imaging Science and Technology CY - Springfield, Virginia ER -