TY - JOUR A1 - Schulte-Tigges, Joschua A1 - Förster, Marco A1 - Nikolovski, Gjorgji A1 - Reke, Michael A1 - Ferrein, Alexander A1 - Kaszner, Daniel A1 - Matheis, Dominik A1 - Walter, Thomas T1 - Benchmarking of various LiDAR sensors for use in self-driving vehicles in real-world environments JF - Sensors N2 - Abstract In this paper, we report on our benchmark results of the LiDAR sensors Livox Horizon, Robosense M1, Blickfeld Cube, Blickfeld Cube Range, Velodyne Velarray H800, and Innoviz Pro. The idea was to test the sensors in different typical scenarios that were defined with real-world use cases in mind, in order to find a sensor that meet the requirements of self-driving vehicles. For this, we defined static and dynamic benchmark scenarios. In the static scenarios, both LiDAR and the detection target do not move during the measurement. In dynamic scenarios, the LiDAR sensor was mounted on the vehicle which was driving toward the detection target. We tested all mentioned LiDAR sensors in both scenarios, show the results regarding the detection accuracy of the targets, and discuss their usefulness for deployment in self-driving cars. KW - Lidar KW - Benchmark KW - Self-driving Y1 - 2022 U6 - http://dx.doi.org/10.3390/s22197146 SN - 1424-8220 N1 - This article belongs to the Special Issue "Sensor Fusion for Vehicles Navigation and Robotic Systems" VL - 22 IS - 19 PB - MDPI CY - Basel ER - TY - JOUR A1 - Coll-Perales, Baldomero A1 - Schulte-Tigges, Joschua A1 - Rondinone, Michele A1 - Gozalvez, Javier A1 - Reke, Michael A1 - Matheis, Dominik A1 - Walter, Thomas T1 - Prototyping and evaluation of infrastructure-assisted transition of control for cooperative automated vehicles JF - IEEE Transactions on Intelligent Transportation Systems N2 - Automated driving is now possible in diverse road and traffic conditions. However, there are still situations that automated vehicles cannot handle safely and efficiently. In this case, a Transition of Control (ToC) is necessary so that the driver takes control of the driving. Executing a ToC requires the driver to get full situation awareness of the driving environment. If the driver fails to get back the control in a limited time, a Minimum Risk Maneuver (MRM) is executed to bring the vehicle into a safe state (e.g., decelerating to full stop). The execution of ToCs requires some time and can cause traffic disruption and safety risks that increase if several vehicles execute ToCs/MRMs at similar times and in the same area. This study proposes to use novel C-ITS traffic management measures where the infrastructure exploits V2X communications to assist Connected and Automated Vehicles (CAVs) in the execution of ToCs. The infrastructure can suggest a spatial distribution of ToCs, and inform vehicles of the locations where they could execute a safe stop in case of MRM. This paper reports the first field operational tests that validate the feasibility and quantify the benefits of the proposed infrastructure-assisted ToC and MRM management. The paper also presents the CAV and roadside infrastructure prototypes implemented and used in the trials. The conducted field trials demonstrate that infrastructure-assisted traffic management solutions can reduce safety risks and traffic disruptions. KW - Automated driving KW - automated vehicles KW - connected automated vehicles KW - CAV KW - experimental evaluation Y1 - 2021 U6 - http://dx.doi.org/10.1109/TITS.2021.3061085 SN - 1524-9050 (Print) SN - 1558-0016 (Online) VL - 23 IS - 7 SP - 6720 EP - 6736 PB - IEEE ER - TY - CHAP A1 - Nikolovski, Gjorgji A1 - Limpert, Nicolas A1 - Nessau, Hendrik A1 - Reke, Michael A1 - Ferrein, Alexander T1 - Model-predictive control with parallelised optimisation for the navigation of autonomous mining vehicles T2 - 2023 IEEE Intelligent Vehicles Symposium (IV) N2 - The work in modern open-pit and underground mines requires the transportation of large amounts of resources between fixed points. The navigation to these fixed points is a repetitive task that can be automated. The challenge in automating the navigation of vehicles commonly used in mines is the systemic properties of such vehicles. Many mining vehicles, such as the one we have used in the research for this paper, use steering systems with an articulated joint bending the vehicle’s drive axis to change its course and a hydraulic drive system to actuate axial drive components or the movements of tippers if available. To address the difficulties of controlling such a vehicle, we present a model-predictive approach for controlling the vehicle. While the control optimisation based on a parallel error minimisation of the predicted state has already been established in the past, we provide insight into the design and implementation of an MPC for an articulated mining vehicle and show the results of real-world experiments in an open-pit mine environment. KW - Mpc KW - Control KW - Path-following KW - Navigation KW - Automation Y1 - 2023 SN - 979-8-3503-4691-6 (Online) SN - 979-8-3503-4692-3 (Print) U6 - http://dx.doi.org/10.1109/IV55152.2023.10186806 N1 - IEEE Symposium on Intelligent Vehicle, 4.-7. June 2023, Anchorage, AK, USA. PB - IEEE ER - TY - JOUR A1 - Elsen, Ingo A1 - Kraiss, Karl-Friedrich T1 - System concept and realization of a scalable neurocomputing architecture JF - Systems Analysis Modelling Simulation N2 - This paper describes the realization of a novel neurocomputer which is based on the concepts of a coprocessor. In contrast to existing neurocomputers the main interest was the realization of a scalable, flexible system, which is capable of computing neural networks of arbitrary topology and scale, with full independence of special hardware from the software's point of view. On the other hand, computational power should be added, whenever needed and flexibly adapted to the requirements of the application. Hardware independence is achieved by a run time system which is capable of using all available computing power, including multiple host CPUs and an arbitrary number of neural coprocessors autonomously. The realization of arbitrary neural topologies is provided through the implementation of the elementary operations which can be found in most neural topologies. Y1 - 1999 SN - 0232-9298 SN - 1029-4902 VL - 35 IS - 4 SP - 399 EP - 419 PB - Gordon and Breach Science Publishers CY - Amsterdam ER - TY - JOUR A1 - Elsen, Ingo A1 - Kraiss, Karl-Friedrich A1 - Krumbiegel, Dirk A1 - Walter, Peter A1 - Wickel, Jochen T1 - Visual information retrieval for 3D product identification: a midterm report JF - KI - Künstliche Intelligenz Y1 - 1999 SN - 1610-1987 SN - 0933-1875 VL - 13 IS - 1 SP - 64 EP - 67 PB - Springer CY - Berlin ER - TY - CHAP A1 - Elsen, Ingo T1 - A pixel based approach to view based object recognition with self-organizing neural networks T2 - IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society N2 - This paper addresses the pixel based classification of three dimensional objects from arbitrary views. To perform this task a coding strategy, inspired by the biological model of human vision, for pixel data is described. The coding strategy ensures that the input data is invariant against shift, scale and rotation of the object in the input domain. The image data is used as input to a class of self organizing neural networks, the Kohonen-maps or self-organizing feature maps (SOFM). To verify this approach two test sets have been generated: the first set, consisting of artificially generated images, is used to examine the classification properties of the SOFMs; the second test set examines the clustering capabilities of the SOFM when real world image data is applied to the network after it has been preprocessed to be invariant against shift, scale and rotation. It is shown that the clustering capability of the SOFM is strongly dependant on the invariance coding of the images. Y1 - 1998 SN - 0-7803-4503-7 U6 - http://dx.doi.org/10.1109/IECON.1998.724032 N1 - Aachen, 31 August 1998 - 04 September 1998 SP - 2040 EP - 2044 PB - IEEE CY - New York ER - TY - CHAP A1 - Elsen, Ingo A1 - Kraiss, Karl-Friedrich A1 - Krumbiegel, Dirk T1 - Pixel based 3D object recognition with bidirectional associative memories T2 - International Conference on Neural Networks 1997 N2 - This paper addresses the pixel based recognition of 3D objects with bidirectional associative memories. Computational power and memory requirements for this approach are identified and compared to the performance of current computer architectures by benchmarking different processors. It is shown, that the performance of special purpose hardware, like neurocomputers, is between one and two orders of magnitude higher than the performance of mainstream hardware. On the other hand, the calculation of small neural networks is performed more efficiently on mainstream processors. Based on these results a novel concept is developed, which is tailored for the efficient calculation of bidirectional associative memories. The computational efficiency is further enhanced by the application of algorithms and storage techniques which are matched to characteristics of the application at hand. Y1 - 1997 SN - 0-7803-4122-8 N1 - June 9 - 12, 1997, Westin Galleria Hotel Houston, Texas, USA. SP - 1679 EP - 1684 PB - IEEE CY - New York ER - TY - CHAP A1 - Dey, Thomas A1 - Elsen, Ingo A1 - Ferrein, Alexander A1 - Frauenrath, Tobias A1 - Reke, Michael A1 - Schiffer, Stefan ED - Makedon, Fillia T1 - CO2 Meter: a do-it-yourself carbon dioxide measuring device for the classroom T2 - PETRA 2021: The 14th PErvasive Technologies Related to Assistive Environments Conference N2 - In this paper we report on CO2 Meter, a do-it-yourself carbon dioxide measuring device for the classroom. Part of the current measures for dealing with the SARS-CoV-2 pandemic is proper ventilation in indoor settings. This is especially important in schools with students coming back to the classroom even with high incidents rates. Static ventilation patterns do not consider the individual situation for a particular class. Influencing factors like the type of activity, the physical structure or the room occupancy are not incorporated. Also, existing devices are rather expensive and often provide only limited information and only locally without any networking. This leaves the potential of analysing the situation across different settings untapped. Carbon dioxide level can be used as an indicator of air quality, in general, and of aerosol load in particular. Since, according to the latest findings, SARS-CoV-2 can be transmitted primarily in the form of aerosols, carbon dioxide may be used as a proxy for the risk of a virus infection. Hence, schools could improve the indoor air quality and potentially reduce the infection risk if they actually had measuring devices available in the classroom. Our device supports schools in ventilation and it allows for collecting data over the Internet to enable a detailed data analysis and model generation. First deployments in schools at different levels were received very positively. A pilot installation with a larger data collection and analysis is underway. KW - embedded hardware KW - sensor networks KW - information systems KW - education KW - do-it-yourself Y1 - 2021 SN - 9781450387927 U6 - http://dx.doi.org/10.1145/3453892.3462697 N1 - PETRA '21: The 14th PErvasive Technologies Related to Assistive Environments Conference Corfu Greece 29 June 2021- 2 July 2021 SP - 292 EP - 299 PB - Association for Computing Machinery CY - New York ER - TY - JOUR A1 - Elsen, Ingo A1 - Hartung, Frank A1 - Horn, Uwe A1 - Kampmann, Markus A1 - Peters, Liliane ED - Voas, Jeffrey T1 - Streaming technology in 3G mobile communication systems JF - Computer : innovative technology for computer professionals N2 - Third-generation mobile communication systems will combine standardized streaming with a range of unique services to provide high-quality Internet content that meets the specific needs of the rapidly growing mobile market. Y1 - 2001 SN - 0018-9162 SN - 1558-0814 VL - 34 IS - 9 Seiten SP - 46 EP - 52 PB - IEEE CY - New York ER - TY - CHAP A1 - Walter, Peter A1 - Elsen, Ingo A1 - Müller, Holger A1 - Kraiss, Karl-Friedrich T1 - 3D object recognition with a specialized mixtures of experts architecture T2 - IJCNN'99. International Joint Conference on Neural Networks. Proceedings N2 - Aim of the AXON2 project (Adaptive Expert System for Object Recogniton using Neuml Networks) is the development of an object recognition system (ORS) capable of recognizing isolated 3d objects from arbitrary views. Commonly, classification is based on a single feature extracted from the original image. Here we present an architecture adapted from the Mixtures of Eaqerts algorithm which uses multiple neuml networks to integmte different features. During tmining each neural network specializes in a subset of objects or object views appropriate to the properties of the corresponding feature space. In recognition mode the system dynamically chooses the most relevant features and combines them with maximum eficiency. The remaining less relevant features arz not computed and do therefore not decelerate the-recognition process. Thus, the algorithm is well suited for ml-time applications. Y1 - 1999 SN - 0-7803-5529-6 U6 - http://dx.doi.org/10.1109/IJCNN.1999.836243 SN - 1098-7576 N1 - Washington, DC 10-16.07.1999 SP - 3563 EP - 3568 PB - IEEE CY - New York ER - TY - CHAP A1 - Eggert, Mathias A1 - Zähl, Philipp M. A1 - Wolf, Martin R. A1 - Haase, Martin ED - Cooper, Kendra M.L. ED - Bucchiarone, Antonio T1 - Applying leaderboards for quality improvement in software development projects T2 - Software Engineering for Games in Serious Contexts N2 - Software development projects often fail because of insufficient code quality. It is now well documented that the task of testing software, for example, is perceived as uninteresting and rather boring, leading to poor software quality and major challenges to software development companies. One promising approach to increase the motivation for considering software quality is the use of gamification. Initial research works already investigated the effects of gamification on software developers and come to promising. Nevertheless, a lack of results from field experiments exists, which motivates the chapter at hand. By conducting a gamification experiment with five student software projects and by interviewing the project members, the chapter provides insights into the changing programming behavior of information systems students when confronted with a leaderboard. The results reveal a motivational effect as well as a reduction of code smells. KW - Leaderboard KW - Gamification KW - Software testing KW - Software development Y1 - 2023 SN - 978-3-031-33337-8 (Print) SN - 978-3-031-33338-5 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-33338-5_11 SP - 243 EP - 263 PB - Springer CY - Cham ER - TY - CHAP A1 - Eichenbaum, Julian A1 - Nikolovski, Gjorgji A1 - Mülhens, Leon A1 - Reke, Michael A1 - Ferrein, Alexander A1 - Scholl, Ingrid T1 - Towards a lifelong mapping approach using Lanelet 2 for autonomous open-pit mine operations T2 - 2023 IEEE 19th International Conference on Automation Science and Engineering (CASE) N2 - Autonomous agents require rich environment models for fulfilling their missions. High-definition maps are a well-established map format which allows for representing semantic information besides the usual geometric information of the environment. These are, for instance, road shapes, road markings, traffic signs or barriers. The geometric resolution of HD maps can be as precise as of centimetre level. In this paper, we report on our approach of using HD maps as a map representation for autonomous load-haul-dump vehicles in open-pit mining operations. As the mine undergoes constant change, we also need to constantly update the map. Therefore, we follow a lifelong mapping approach for updating the HD maps based on camera-based object detection and GPS data. We show our mapping algorithm based on the Lanelet 2 map format and show our integration with the navigation stack of the Robot Operating System. We present experimental results on our lifelong mapping approach from a real open-pit mine. Y1 - 2023 SN - 979-8-3503-2069-5 (Online) SN - 979-8-3503-2070-1 (Print) U6 - http://dx.doi.org/10.1109/CASE56687.2023.10260526 N1 - 19th International Conference on Automation Science and Engineering (CASE), 26-30 August 2023, Auckland, New Zealand. PB - IEEE ER - TY - CHAP A1 - Tischbein, Franziska A1 - Kean, Kilian A1 - Vertgewall, Chris Martin A1 - Ulbig, Andreas A1 - Altherr, Lena T1 - Determination of the topology of low-voltage distribution grids using cluster methods T2 - 27th International Conference on Electricity Distribution (CIRED 2023) N2 - Due to the decarbonization of the energy sector, the electric distribution grids are undergoing a major transformation, which is expected to increase the load on the operating resources due to new electrical loads and distributed energy resources. Therefore, grid operators need to gradually move to active grid management in order to ensure safe and reliable grid operation. However, this requires knowledge of key grid variables, such as node voltages, which is why the mass integration of measurement technology (smart meters) is necessary. Another problem is the fact that a large part of the topology of the distribution grids is not sufficiently digitized and models are partly faulty, which means that active grid operation management today has to be carried out largely blindly. It is therefore part of current research to develop methods for determining unknown grid topologies based on measurement data. In this paper, different clustering algorithms are presented and their performance of topology detection of low voltage grids is compared. Furthermore, the influence of measurement uncertainties is investigated in the form of a sensitivity analysis. Y1 - 2023 SN - 978-1-83953-855-1 U6 - http://dx.doi.org/10.1049/icp.2023.0478 N1 - 27th International Conference on Electricity Distribution (CIRED 2023), 12-15 June 2023, Rome, Italy. SP - 1 EP - 5 PB - IEEE ER - TY - CHAP A1 - Neth, Jannik A1 - Schuba, Marko A1 - Brodkorb, Karsten A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Digital forensics triage app for android T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator – without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format. KW - Android KW - Digital triage KW - Triage-app Y1 - 2023 SN - 9798400707728 U6 - http://dx.doi.org/10.1145/3600160.3605017 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. PB - ACM ER - TY - CHAP A1 - Zähl, Philipp M. A1 - Theis, Sabine A1 - Wolf, Martin A1 - Köhler, Klemens ED - Chen, Jessie Y. C. ED - Fragomeni, Gino T1 - Teamwork in software development and what personality has to do with it - an overview T2 - Virtual, Augmented and Mixed Reality N2 - Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person’s personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality. KW - Teamwork KW - Software KW - Personality KW - Performance KW - Elicit Y1 - 2023 SN - 978-3-031-35633-9 (Print) SN - 978-3-031-35634-6 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-35634-6_10 N1 - Virtual, Augmented and Mixed Reality: 15th International Conference. VAMR 2023. Held as Part of the 25th HCI International Conference. HCII 2023. Copenhagen, Denmark. July 23–28, 2023. SP - 130 EP - 153 PB - Springer CY - Cham ER - TY - CHAP A1 - Viehmann, Tarik A1 - Limpert, Nicolas A1 - Hofmann, Till A1 - Henning, Mike A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard ED - Eguchi, Amy ED - Lau, Nuno ED - Paetzel-Prüsmann, Maike ED - Wanichanon, Thanapat T1 - Winning the RoboCup logistics league with visual servoing and centralized goal reasoning T2 - RoboCup 2022 N2 - The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot’s perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019. Y1 - 2023 SN - 978-3-031-28468-7 (Print) SN - 978-3-031-28469-4 (Online) U6 - http://dx.doi.org/https://doi.org/10.1007/978-3-031-28469-4_25 N1 - Robot World Cup, RoboCup 2022. 17. July 2023. Bangkok, Thailand. Part of the Lecture Notes in Computer Science book series (LNAI,volume 13561) SP - 300 EP - 312 PB - Springer CY - Cham ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - http://dx.doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER - TY - CHAP A1 - Schulte-Tigges, Joschua A1 - Matheis, Dominik A1 - Reke, Michael A1 - Walter, Thomas A1 - Kaszner, Daniel ED - Krömker, Heidi T1 - Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain T2 - HCII 2023: HCI in Mobility, Transport, and Automotive Systems N2 - Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle’s software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany. KW - V2X KW - Transiton of Control KW - Minimum Risk Manoeuvre KW - Operational Design Domain KW - Connected Automated Vehicle Y1 - 2023 SN - 978-3-031-35677-3 (Print) SN - 978-3-031-35678-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-35678-0_12 N1 - 5th International Conference, MobiTAS 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023. SP - 200 EP - 210 PB - Springer CY - Cham ER - TY - CHAP A1 - Galdi, Chiara A1 - Hartung, Frank A1 - Dugelay, Jean-Luc T1 - Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones T2 - Electronic Imaging N2 - Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos. KW - Image Forensics KW - Mobile Phones KW - Image Database Y1 - 2017 U6 - http://dx.doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-331 SN - 2470-1173 N1 - IS&T International Symposium on Electronic Imaging 2017 Media Watermarking, Security, and Forensics 2017 SP - 100 EP - 103 PB - Society for Imaging Science and Technology CY - Springfield, Virginia ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - http://dx.doi.org/10.1145/3600160.3605167 N1 - Article No.: 87 ARES 2023, August 29–September 01, 2023, Benevento, Italy SP - 1 EP - 7 PB - ACM ER -