TY - CHAP A1 - Hartung, Frank A1 - Hillgärtner, Michael A1 - Schmitz, Günter A1 - Schuba, Marko A1 - Adolphs, Fabian A1 - Hoffend, Jens A1 - Theis, Jochen T1 - IT-Sicherheit im Automobil T2 - AmE 2014 : Automotive meets Electronics, Beiträge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78) Y1 - 2014 SN - 978-3-8007-3580-8 SP - CD-ROM PB - VDE-Verl. CY - Berlin ER - TY - CHAP A1 - Becker, Sebastian A1 - Höfken, Hans-Wilhelm A1 - Schütz, Philip A1 - Schuba, Marko ED - Schartner, P. T1 - IT-forensische Erkennung modifizierter Android-Apps T2 - Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016 N2 - Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbehörden immer häufiger gegenüberstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden geführt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei müssen die Ermittler möglichst schnell und gezielt erkennen können, ob eine App tatsächlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber für die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen berücksichtigt und so für den Einsatz in der Strafverfolgung in Frage kommt. Y1 - 2016 SP - 120 EP - 125 ER - TY - CHAP A1 - Brockmann, Carsten A1 - Sultanow, Eldar A1 - Czarnecki, Christian ED - Draude, Claude ED - Lange, Martin ED - Sick, Bernhard T1 - Is enterprise architecture still relevant in the digital age? T2 - GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beiträge KW - Preface KW - Enterprise Architecture KW - Digital Age Y1 - 2019 SN - 9783885796893 U6 - http://dx.doi.org/10.18420/inf2019_ws01 SN - 1617-5468 N1 - 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft. 16. September, Kassel SP - 21 EP - 21 PB - Köllen CY - Bonn ER - TY - CHAP A1 - Schopp, Christoph A1 - Heuermann, Holger A1 - Holtrup, S. T1 - Investigation on efficacy optimization of RF-driven automotive D-lamps T2 - 44th European Microwave Conference (EuMC),2014, Rome Y1 - 2014 U6 - http://dx.doi.org/10.1109/EuMC.2014.6986645 SP - 1154 EP - 1157 ER - TY - CHAP A1 - Nötzold, K. A1 - Uphues, A. A1 - Wegener, R. A1 - Fink, K. A1 - Bragard, Michael A1 - Griessel, R. A1 - Soter, S. T1 - Inverter based test setup for LVRT verification of a full-scale 2 MW wind power converter T2 - 15th European Conference on Power Electronics and Applications (EPE), 2013 : 2 - 6 Sept. 2013, Lille, France / [EPE Association; PELS, IEEE Power Electronics Society] Y1 - 2013 SN - 978-1-4799-0115-9 (Online-Ausg.) U6 - http://dx.doi.org/10.1109/EPE.2013.6634752 SP - 1037 EP - 1042 PB - IEEE CY - Piscataway, NJ ER - TY - CHAP A1 - Nötzold, K. A1 - Uphues, A. A1 - Wegener, R. A1 - Soter, S. A1 - Fink, K. A1 - Bragard, Michael A1 - Griessel, R. T1 - Inverter based test setup for LVRT verification of a full-scale 2 MW wind power converter T2 - EPE Joint Wind Energy and T&D Chapters Seminar : 28th and 29th of June 2012, in the Utzon Centre, Aalborg, Denmark ; papers, posters, presentations. - Session 2: Grid connection, compliance Y1 - 2012 PB - EPE Association CY - Brussels ER - TY - CHAP A1 - Krückel, Kai A1 - Nolden, Florian A1 - Ferrein, Alexander A1 - Scholl, Ingrid T1 - Intuitive visual teleoperation for UGVs using free-look augmented reality displays T2 - 2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA Y1 - 2015 U6 - http://dx.doi.org/10.1109/ICRA.2015.7139809 SP - 4412 EP - 4417 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Ringbeck, Thorsten A1 - Schwarte, Rudolf A1 - Buxbaum, Bernd ED - Korevaar, Eric John T1 - Introduction of a new opto-electrical phase-locked loop in CMOS technology: the PMD-PLL T2 - Optical wireless communications II / [SPIE Conference on Optical Wireless Communications II], 22 September 1999, Boston, Massachusetts. - (SPIE proceedings series ; 3850) Y1 - 1999 SN - 0-8194-3443-4 SN - 0038-7355 SN - 0361-0748 SN - 0277-786X N1 - Conference on Optical Wireless Communications <2, 1999, Boston, Mass. SP - 108 EP - 116 PB - SPIE CY - Bellingham, Wash. ER - TY - CHAP A1 - Bragard, Michael A1 - Sube, Maike A1 - Schneider, Maike A1 - Jungemann, Christoph T1 - Introducing a Cross-University Bachelor’s Programme with Orientation Semester - Enabling a Permeable Academic Education System T2 - 2019 20th International Conference on Research and Education in Mechatronics (REM) Y1 - 2019 SN - 978-1-5386-9257-8 U6 - http://dx.doi.org/10.1109/REM.2019.8744132 SP - 1 EP - 6 ER -