TY - GEN A1 - Wiegner, Jonas A1 - Volker, Hanno A1 - Mainz, Fabian A1 - Backes, Andreas A1 - Löken, Michael A1 - Hüning, Felix T1 - Wiegand-Effect-Powered Wireless IT Sensor Node N2 - With the growing interest in small distributed sensors for the “Internet of Things”, more attention is being paid to energy harvesting techologies. Reducing or eliminating the need for external power sources or batteries make devices more self-sufficient, more reliable, and reduces maintenance requirements. The Wiegand effect is a proven technology for harvesting small amounts of electrical power from mechanical motion. Y1 - 2022 N1 - PSMA International Energy Harvesting Workshop ~ 5-7 April 2022, Raleigh, NC, USA ER - TY - JOUR A1 - Ferrein, Alexander T1 - Robot controllers for highly dynamic environments with real-time constraints JF - Künstliche Intelligenz : KI N2 - In this extended abstract we describe the robot programming and planning language READYLOG, a GOLOG dialect which was developed to support the decision making of robots acting in dynamic real-time domains like robotic soccer. The formal framework of READYLOG, which is based on the situation calculus, features imperative control structures like loops and procedures, allows for decision-theoretic planning, and accounts for a continuously changing world. We developed high-level controllers in READYLOG for our soccer robots in RoboCup’s Middle-size league, but also for service robots and for autonomous agents in interactive computer games. Y1 - 2010 U6 - https://doi.org/10.1007/s13218-010-0041-3 SN - 1610-1987 VL - 24 IS - 2 SP - 175 EP - 178 PB - Springer CY - Heidelberg ER - TY - JOUR A1 - Rens, Gavin A1 - Varzinczak, Ivan A1 - Meyer, Thomas A1 - Ferrein, Alexander T1 - A Logic for Reasoning about Actions and Explicit Observations JF - AI 2010: Advances in Artificial Intelligence 23rd Australasian Joint Conference, Adelaide, Australia, December 7-10, 2010. Proceedings Y1 - 2010 U6 - https://doi.org/10.1007/978-3-642-17432-2_40 N1 - Lecture Notes in Computer Science ; 6464 SP - 395 EP - 404 PB - Springer CY - Berlin ER - TY - JOUR A1 - Ferrein, Alexander T1 - golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems Y1 - 2010 SP - 20 EP - 28 PB - AAAI CY - Menlo Park ER - TY - CHAP A1 - Schnell, Michael A1 - Brandes, Sinja A1 - Gligorevic, Snjezana A1 - Walter, Michael A1 - Rihacek, Christoph A1 - Sajatovic, Miodrag A1 - Haindl, Bernhard T1 - Interference mitigation for broadband L-DACS T2 - 27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn. Y1 - 2008 SN - 978-1-4244-2207-4 ; 978-1-4244-2208-1 SP - 2B2-1 EP - 2B2-12 ER - TY - CHAP A1 - Broenner, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Streamlining extraction and analysis of android RAM images T2 - Proceedings of the 2nd international conference on information systems security and privacy Y1 - 2016 SN - 978-989-758-167-0 U6 - https://doi.org/10.5220/0005652802550264 SP - 255 EP - 264 ER - TY - CHAP A1 - Lindenlauf, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Cold Boot Attacks on DDR2 and DDR3 SDRAM T2 - 10th International Conference on Availability, Reliability and Security (ARES) 2015 Y1 - 2015 U6 - https://doi.org/10.1109/ARES.2015.28 SP - 287 EP - 292 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - JOUR A1 - Hagemann, Hans-Jürgen A1 - Bachmann, Peter K. A1 - Lade, H. A1 - Leers, D. T1 - Diamond chemical vapor deposition: gas compositions and film properties / Bachmann, P.K.; Hagemann, H.-J.; Lade, H; Leers, D.; Picht, F.; Wiechert, D.U.; Wilson, H. JF - Diamond, SiC and nitride wide bandgap semiconductors : symposium held April 4 - 8, 1994, San Francisco, California, U.S.A. / ed.: Calvin H. Carter, Jr. ... Y1 - 1994 SN - 1-55899-239-1 N1 - Materials Research Society symposium proceedings ; 339 SP - 267 EP - 277 CY - Pittsburgh, Penn. ER - TY - CHAP A1 - Gligorevic, Snjezana A1 - Jost, T. A1 - Walter, Michael T1 - Scatterer based airport surface channel model T2 - IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla. Y1 - 2009 SN - 978-1-4244-4078-8 SP - 4C2-1 EP - 4C2-10 ER -