Fachbereich Elektrotechnik und Informationstechnik
Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1286)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (60)
- ECSM European Center for Sustainable Mobility (31)
- Fachbereich Luft- und Raumfahrttechnik (6)
- Fachbereich Maschinenbau und Mechatronik (6)
- Fachbereich Energietechnik (4)
- Fachbereich Wirtschaftswissenschaften (4)
- IaAM - Institut für angewandte Automation und Mechatronik (3)
- Fachbereich Architektur (2)
- Fachbereich Bauingenieurwesen (2)
Language
- English (809)
- German (476)
- Multiple languages (1)
Document Type
- Article (617)
- Conference Proceeding (390)
- Book (115)
- Part of a Book (71)
- Conference: Meeting Abstract (23)
- Patent (19)
- Other (9)
- Report (9)
- Doctoral Thesis (8)
- Contribution to a Periodical (7)
Keywords
- wearable computing (8)
- Multimediamarkt (7)
- MINLP (6)
- augmented reality (6)
- spatial audio (6)
- Enterprise Architecture (5)
- Gamification (5)
- mobile devices (5)
- Engineering optimization (4)
- Serious Game (4)
Methods and devices for providing a media description of a media stream to a client are described. The client is subscribed to a media description delivery service. The media description delivery service comprises a media description delivery rule. A request for a media description delivery is sent to a media server. From the media server a media description is received. It is verified that the received media description complies with the media description delivery rule and if the verification is in the affirmative, a delivery of the media description is initiated to the client.
Im Forschungsprojekt „ILSe“ wurde ein intelligenter Sensor entwickelt, der den Füllstand von Laubfangkörben im Straßenabfluss messen, mittels der LoRaWAN-Funktechnologie übertragen und auf einem Dashboard anzeigen kann. Auf Basis dieser Daten können die Laubfangkörbe gezielt gereinigt werden, um den Wasserabfluss, insbesondere bei starken Regenfällen, zu maximieren. So können Überschwemmungen reduziert bzw. vermieden werden. Zudem wird die Infrastruktur geschützt und die Sicherheit des Verkehrs erhöht. Des Weiteren können Betriebsabläufe durch die bedarfsgerechte Reinigung der Laubfangkörbe effizienter gestaltet werden.
A method for controlling the transmission of a media stream comprising a plurality of consecutive stream elements Is described. The method comprises the step of obtaining (32) a media description of the media stream, the media description indicating an initial element of the stream elements. A request for the initial stream element is sent (34) and a session control procedure is initiated (36) for a session. The media stream is associated (38) with the session in the session control procedure. The transmission of a subsequent element of the stream elements is controlled in accordance with a control rule of the session. Devices and further methods embodying the invention are also described.
The increasing complexity of information security threats and ever more stringent legal requirements mean that more and more organizations are setting themselves the goal of implementing an effective and efficient information security management system (ISMS). This paper examines the ways in which artificial intelligence (AI) in the form of a chatbot can support the development and operation of an ISMS. In particular, it evaluates how a chatbot can be integrated into standard setup and operating processes within an ISMS. In addition, various possible applications are shown and advantages, disadvantages and limitations are discussed. It turns out that the use of a chatbot as a supporting tool has many advantages and, in the hands of specialist personnel, offers a useful addition to established methods. Consequently, chatbots open up the possibility for organizations to optimize their organizational and operational processes.
Phishing remains one of the most common and effective forms of social engineering, with cybercriminals constantly refining their tactics to exploit human vulnerabilities. The sheer volume of phishing attacks is staggering: almost 1.2% of all emails sent are malicious. This equates to around 3.4 billion phishing emails per day. The effectiveness of phishing attacks is also underlined by numerous studies. Phishing is identified as the leading initial attack vector, responsible for 41% of security incidents. This means that practically every company is threatened by phishing attacks.In parallel, there have been rapid advances in the field of artificial intelligence (AI) in recent years, giving the general public access to powerful tools that can handle complex tasks with ease. However, alongside these benefits, the potential for abuse has also become a major concern. The integration of AI into social engineering attacks has significantly increased the opportunities for cybercriminals. Research has shown that AI-generated phishing emails are difficult for humans to distinguish from real messages. According to one study, phishing emails written by AI were opened by 78% of recipients, with 21% clicking on malicious content such as links or attachments. Although the click-through rate is still lower compared to human-crafted emails, generative AI tools (GenAI) can help cybercriminals compose phishing emails at least 40% faster, which can lead to a significant increase in phishing success rates. The increasing potential to use public AI tools for abusive purposes has also been recognized by the developers of AI models. Thus, publicly available AI tools often have built-in mechanisms to detect and prevent misuse. This paper examines the potential for misuse of publicly available AI in the context of phishing attacks, focusing on the content generation phase. In particular, the study examines the effectiveness of existing abuse prevention mechanisms implemented by AI platforms like fine-tuning, filters, rejection sampling, system prompts and dataset filtering. To this end, it is explored how prompts to the AI need to be altered for circumventing the misuse preventing mechanisms. While in some cases the simple request to write a phishing email succeeds, other AI tools implement more sophisticated mechanisms. In the end, however, all prevention safeguards could be circumvented. The findings highlight the significant threat posed by AI-powered social engineering attacks and emphasize the urgent need for robust defense in depth strategies against phishing attacks and increased awareness to mitigate the risks in the evolving digital landscape.In addition, the paper demonstrates that the quality of the AI tool varies in terms of the phishing emails generated. To this end, the phishing emails generated by circumventing the protection mechanisms of the AI are (subjectively) compared and evaluated by the authors. The preliminary conclusion is that automatically generated phishing emails of some public AI tools can certainly match that of manually generated emails. While the objective confirmation of this hypothesis requires further study even the subjective quality of the generated phishing emails shows the dimension of the problem.
Traditionally, agent architectures based on the Belief- Desire-Intention (BDI) model make use of precompiled plans, or if they do generate plans, the plans do not involve stochastic actions nor probabilistic observations. Plans that do involve these kinds of actions and observations are generated by partially observable Markov decision process (POMDP) planners. In particular for POMDP planning, we make use of a POMDP planner which is implemented in the robot programming and plan language Golog. Golog is very suitable for integrating beliefs, as it is based on the situation calculus and we can draw upon previous research on this. However, a POMDP planner on its own cannot cope well with dynamically changing environments and complicated goals. This is exactly a strength of the BDI model; the model is for reasoning over goals dynamically. Therefore, in this paper, we propose an architecture that will lay the groundwork for architectures that combine the advantages of a POMDP planner written in the situation calculus, and the BDI model of agency. We show preliminary results which can be seen as a proof of concept for integrating a POMDP into a BDI architecture.
Looking back on 20 years of RoboCup : Interview with Hans-Arthur Marsiske, writer and journalist
(2016)
We present golog++, a high-level agent programming and interfacing framework that offers a temporal constraint language to explicitly model layer-penetrating contingencies in low-level platform behavior. It can be used to maintain a clear separation between an agent's domain model and certain quirks of its execution platform that affect problem solving behavior. Our system reasons about the execution of an abstract (i.e. exclusively domain-bound) plan on a particular execution platform. This way, we avoid compounding the complexity of the planning problem while improving the modularity of both golog++ and the user code. On a run-through example from the well-known blocksworld domain, we demonstrate the entire process from domain modeling and platform modeling to plan transformation and platform-specific plan execution. © 2021 by SCITEPRESS - Science and Technology Publications, Lda.
This paper explores the basic concepts of Operational Design Domains (ODDs) in the field of autonomous driving. We address the intricacies of different scenario descriptions and promote the communication of system requirements and operational constraints in the context of Automated Driving Systems (ADSs).