Refine
Year of publication
- 2017 (25) (remove)
Document Type
- Conference Proceeding (17)
- Article (5)
- Part of a Book (2)
- Book (1)
Language
- English (25) (remove)
Keywords
- Autonomous mobile robots (1)
- Competence Developing Games (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- Gamification (1)
- Image Database (1)
- Image Forensics (1)
- Industry 4.0 (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Mobile Phones (1)
- Multi-robot systems (1)
- Optimal Topology (1)
- Piecewise Linearization (1)
- Process design (1)
- Process reference model (1)
- Reference modelling (1)
- RoboCup (1)
- Serious Games (1)
- Similarity Theory (1)
- Smart factory (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (25) (remove)
SAR Simulations & Safety
(2017)
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.
Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.
Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos.