TY - CHAP A1 - Schnell, Michael A1 - Brandes, Sinja A1 - Gligorevic, Snjezana A1 - Walter, Michael A1 - Rihacek, Christoph A1 - Sajatovic, Miodrag A1 - Haindl, Bernhard T1 - Interference mitigation for broadband L-DACS T2 - 27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn. Y1 - 2008 SN - 978-1-4244-2207-4 ; 978-1-4244-2208-1 SP - 2B2-1 EP - 2B2-12 ER - TY - CHAP A1 - Broenner, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Streamlining extraction and analysis of android RAM images T2 - Proceedings of the 2nd international conference on information systems security and privacy Y1 - 2016 SN - 978-989-758-167-0 U6 - https://doi.org/10.5220/0005652802550264 SP - 255 EP - 264 ER - TY - CHAP A1 - Lindenlauf, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Cold Boot Attacks on DDR2 and DDR3 SDRAM T2 - 10th International Conference on Availability, Reliability and Security (ARES) 2015 Y1 - 2015 U6 - https://doi.org/10.1109/ARES.2015.28 SP - 287 EP - 292 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Gligorevic, Snjezana A1 - Jost, T. A1 - Walter, Michael T1 - Scatterer based airport surface channel model T2 - IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla. Y1 - 2009 SN - 978-1-4244-4078-8 SP - 4C2-1 EP - 4C2-10 ER - TY - CHAP A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard T1 - Fuzzy representations and control for domestic service robots in Golog T2 - Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102) N2 - In the RoboCup@Home domestic service robot competition, complex tasks such as "get the cup from the kitchen and bring it to the living room" or "find me this and that object in the apartment" have to be accomplished. At these competitions the robots may only be instructed by natural language. As humans use qualitative concepts such as "near" or "far", the robot needs to cope with them, too. For our domestic robot, we use the robot programming and plan language Readylog, our variant of Golog. In previous work we extended the action language Golog, which was developed for the high-level control of agents and robots, with fuzzy concepts and showed how to embed fuzzy controllers in Golog. In this paper, we demonstrate how these notions can be fruitfully applied to two domestic service robotic scenarios. In the first application, we demonstrate how qualitative fluents based on a fuzzy set semantics can be deployed. In the second program, we show an example of a fuzzy controller for a follow-a-person task. Y1 - 2011 SN - 978-3-642-25486-4 U6 - https://doi.org/10.1007/978-3-642-25489-5_24 SP - 241 EP - 250 PB - ACM CY - New York ER - TY - CHAP A1 - Logen, Steffen A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework T2 - 2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic N2 - The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database. Y1 - 2012 SN - 978-1-4673-2244-7 U6 - https://doi.org/10.1109/ARES.2012.12 SP - 620 EP - 624 PB - IEEE CY - New York ER - TY - CHAP A1 - Scholl, Ingrid A1 - Bartella, Alexander K. A1 - Moluluo, Cem A1 - Ertural, Berat A1 - Laing, Frederic A1 - Suder, Sebastian T1 - MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality T2 - Bildverarbeitung für die Medizin 2019 : Algorithmen – Systeme – Anwendungen Y1 - 2019 SN - 978-3-658-25326-4 U6 - https://doi.org/10.1007/978-3-658-25326-4_32 SP - 152 EP - 157 PB - Springer Vieweg CY - Wiesbaden ER -