Conference Proceeding
Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (228) (remove)
Has Fulltext
- no (228) (remove)
Language
- English (228) (remove)
Document Type
- Conference Proceeding (228) (remove)
Keywords
- Enterprise Architecture (5)
- Engineering education (2)
- Engineering optimization (2)
- MINLP (2)
- Machine Learning (2)
- Robotic Process Automation (2)
- Serious Game (2)
- Ventilation System (2)
- Water distribution system (2)
- autonomous driving (2)
- 3D object detection (1)
- Accuracy (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomaly detection (1)
- Artificial Intelligence (1)
- Automation (1)
- Awareness (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- CDG (1)
- CO2 (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Competence Developing Game (1)
- Competence Developing Games (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Control engineering (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Orientation (1)
- DC machines (1)
- Data analysis (1)
- Data visualization (1)
- Datasets (1)
- Deep learning (1)
- Digital Age (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Discrete Optimisation (1)
- Drinking Water Supply (1)
- Education (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electronic learning (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Energy efficiency (1)
- Engineering optimisation (1)
- Experimental validation (1)
- FPGA (1)
- Frequency Doubler (1)
- Future Skills (1)
- GPU (1)
- Gamification (1)
- Graph Theory (1)
- Harmonic Radar (1)
- Heuristic algorithms (1)
- Home Assistant (1)
- Home Automation Platform (1)
- ICS (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Incremental Encoder (1)
- Industrial optimisation (1)
- Interdisciplinarity (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- LiDAR (1)
- Literature review (1)
- Low voltage (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MPC (1)
- Malicious model (1)
- Manifolds (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Matlab (1)
- Minimum Risk Manoeuvre (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Monitoring (1)
- Mpc (1)
- Navigation (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Online services (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Topology (1)
- Optimization (1)
- PPO (1)
- Path-following (1)
- Performance (1)
- Personality (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Player Types (1)
- Position Encoder (1)
- Power dissipation (1)
- Powertrain (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process engineering (1)
- Process optimization (1)
- Process reference model (1)
- Prototype (1)
- Pump System (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Reference Process Model (1)
- Reinforcement Learning (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- Secure multi-party computation (1)
- Sensors comparison (1)
- Serious Games (1)
- Similarity Theory (1)
- Smart Building (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software packages (1)
- Solver Per- formance (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Sustainability (1)
- Synchronous machines (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Teamwork (1)
- Technical Operations Research (1)
- Telecommunication (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Throughput (1)
- Time-series synchronization (1)
- Training (1)
- Transdisciplinarity (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Water (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wiegand Effect (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- business analytics (1)
- business simulation (1)
- competence developing games (1)
- cybersecurity (1)
- decision analytics (1)
- digital economy (1)
- do-it-yourself (1)
- eTOM (1)
- education (1)
- embedded hardware (1)
- enhanced Telecom Operations Map (eTOM) (1)
- fault detection (1)
- honeynet (1)
- honeypot (1)
- information systems (1)
- lab work (1)
- learning theories (1)
- mathematical optimization (1)
- metrological characterization (1)
- model-predictive control (1)
- motivation theories (1)
- passive inter-modulation (1)
- power integrity (1)
- professional skills (1)
- requirements (1)
- sensor networks (1)
- signal integrity (1)
- software engineering (1)
- systematic literature review (1)
- tablet game (1)
- water supply system (1)
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.
KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.
Existing residential buildings have an average lifetime of 100 years. Many of these buildings will exist for at least another 50 years. To increase the efficiency of these buildings while keeping costs at reasonable rates, they can be retrofitted with sensors that deliver information to central control units for heating, ventilation and electricity. This retrofitting process should happen with minimal intervention into existing infrastructure and requires new approaches for sensor design and data transmission. At FH Aachen University of Applied Sciences, students of different disciplines work together to learn how to design, build, deploy and operate such sensors. The presented teaching project already created a low power design for a combined CO2, temperature and humidity measurement device that can be easily integrated into most home automation systems
The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database.