Refine
Year of publication
Document Type
- Article (625)
- Conference Proceeding (296)
- Book (113)
- Part of a Book (61)
- Patent (15)
- Report (9)
- Other (8)
- Contribution to a Periodical (6)
- Course Material (6)
- Doctoral Thesis (6)
- Bachelor Thesis (1)
- Video (1)
- Poster (1)
- Review (1)
- Talk (1)
Language
- English (693)
- German (456)
- Multiple languages (1)
Keywords
- Multimediamarkt (7)
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Gamification (4)
- Serious Game (4)
- Auslenkung (3)
- Digitale Transformation (3)
- Digitalisierung (3)
- Education (3)
- Javasimulation (3)
- Literaturanalyse (3)
- Optimization (3)
- Powertrain (3)
- Referenzmodellierung (3)
- Robotic Process Automation (3)
- Technical Operations Research (3)
- Telecommunication (3)
- Amplitude (2)
- Autonomous mobile robots (2)
- Competence Developing Games (2)
- Content Management (2)
- Energy efficiency (2)
- Experimental validation (2)
- Feder (2)
- Forschungsprozess (2)
- Hot S-parameter (2)
- Industry 4.0 (2)
- Machine Learning (2)
- Mathematik (2)
- Multi-robot systems (2)
- Optimal Topology (2)
- Process engineering (2)
- Prozessautomatisierung (2)
- Pump System (2)
- Simulation (2)
- Smart Building (2)
- Smart factory (2)
- TM Forum (2)
- Text Analytics (2)
- Ventilation System (2)
- Virtuelle Realität (2)
- Water (2)
- Water distribution system (2)
- autonomous driving (2)
- eTOM (2)
- enhanced Telecom Operations Map (eTOM) (2)
- mathematical optimization (2)
- robotic process automation (2)
- 3-D printing (1)
- 3D object detection (1)
- Advanced driver assistance systems (ADAS/AD) (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomalieerkennung (1)
- Anomaly detection (1)
- Antennen (1)
- Anwendungsorientierter Forschungsansatz (1)
- Arbeit 4.0 (1)
- Artificial Intelligence (1)
- Automated driving (1)
- Automation (1)
- Automotive application (1)
- Awareness (1)
- BEV (1)
- BIM (1)
- Benchmark (1)
- Besetzungsinversion (1)
- Bewertungsframework (1)
- Bloom’s Taxonomy (1)
- Booster Stations (1)
- Buffering Capacity (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- Bändermodell (1)
- CAV (1)
- CCD-Bildwandler (1)
- CDG (1)
- CMS (1)
- CO2 (1)
- Calcium oxides (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Chance Constraint (1)
- Change culture (1)
- Chaostheorie (1)
- Charging stations (1)
- Chatbots (1)
- Circuit simulation (1)
- Competence Developing Gam (1)
- Competence Developing Game (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Controller Parameter (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Experience Management (1)
- Customer Journeys (1)
- Customer Orientation (1)
- Cyber-physical systems (1)
- Cybersecurity (1)
- Cybersicherheit (1)
- Datasets (1)
- Deep learning (1)
- Design Science Research (1)
- DiggiTwin (1)
- Digital Age (1)
- Digital Game Based Learning (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Digitale Lehre (1)
- Discrete Optimisation (1)
- Dreidimensionale Bildverarbeitung (1)
- Drinking Water Supply (1)
- E-Learning (1)
- E-carsharing (1)
- E-mobility (1)
- EBSCO Discovery Service (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electron-phonon coupling (1)
- Elektrische Leitung (1)
- Elektronengas (1)
- Elektrotechnik (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Engineering Application (1)
- Engineering optimisation (1)
- Enhanced Telecom Operations Map (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- FPGA (1)
- Feldsimulation (1)
- Festkörper (1)
- Forschung (1)
- Forschungsinformationssystem (1)
- Frequency Doubler (1)
- Fully connected car (1)
- Furnace (1)
- Fusion (1)
- Future Skills (1)
- GPU (1)
- Game-based learning (1)
- Gearbox (1)
- Geschäftsmodelle (1)
- Geschäftsprozessmanagement (1)
- Gleichspannungswandler (1)
- Global optimization (1)
- Graduiertentagung (1)
- Graph Theory (1)
- HDTV (1)
- Harmonic Radar (1)
- He-Ne Laser (1)
- He-Ne Schema (1)
- Helium-Neon-Laser (1)
- Heuristic algorithms (1)
- High Definition Media Services (1)
- High Quality Streaming (1)
- Hochfrequenztechnik (1)
- Home Assistant (1)
- Home Automation Platform (1)
- IBM Watson Explorer (1)
- ICS (1)
- IP-based networks (1)
- ISO 26262 (1)
- IT security education (1)
- IT-Marketing (1)
- IT-Sicherheit (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Impulstechnik (1)
- Incremental Encoder (1)
- IndraMotion (1)
- Inductive charging (1)
- Industrial optimisation (1)
- Information and communication technology (1)
- Informationsgetriebene Geschäftsmodelle (1)
- Informationssicherheit (1)
- Informationssicherheitsmanagement (1)
- Integrated mobility (1)
- Intelligentes Parken (1)
- Interactive process mining (1)
- Interdisciplinarity (1)
- Internet der Dinge (1)
- IoT (1)
- Keyword analysis (1)
- Klassifikator <Informatik> (1)
- Kommerzielle Interaktionen (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- Leaderboard (1)
- Lean thinking (1)
- Level Control System (1)
- LiDAR (1)
- Lichtabsorption (1)
- Lichtbetrachtung (1)
- Lichtemission (1)
- Lichtquelle (1)
- Lidar (1)
- Literatur-analyse-prozess (1)
- Literaturdaten (1)
- Literature review (1)
- Literaturrecherche (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MILP (1)
- MPC (1)
- MPEG 4 (1)
- MPEG 7 (1)
- MPEG-Standard (1)
- Machine learning (1)
- Malicious model (1)
- Management (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- McLuhan, Marshall (1)
- Methodology (1)
- Minimum Risk Manoeuvre (1)
- Mixed Integer Programming (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear black-box optimization (1)
- Mixed-integer nonlinear problem (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Mobility management (1)
- Mode converter (1)
- Modeling (1)
- Monetarisierung (1)
- Motion-Logic System (1)
- Mpc (1)
- Multi-criteria optimization (1)
- Multimedia-Dienst (1)
- NGN (1)
- Navigation (1)
- Network (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Objective data (1)
- Objekterkennung (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Closed Loop (1)
- PPO (1)
- Paper recycling (1)
- Path-following (1)
- Pendel (1)
- Performance (1)
- Personality (1)
- Phonons (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Plasma (1)
- Plasma diagnostics (1)
- Plasmatechnik (1)
- Player Types (1)
- Position Encoder (1)
- Praxisprojekte (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process optimization (1)
- Process reference model (1)
- Process virtualization (1)
- Product bundling (1)
- Product family optimization (1)
- Projektbeispiele (1)
- Prototype (1)
- Prozessabläufe (1)
- Prozessagilität (1)
- Prozessmodellierung (1)
- Prozessstandardisierung (1)
- Pulselektroniklabor (1)
- Pumping systems (1)
- Qualitative Wertschöpfungsanalyse (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Radar (1)
- Reference Process Model (1)
- Reference modelling (1)
- Referenzmodelle (1)
- Reinforcement Learning (1)
- Relaxation (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Resonator (1)
- RoboCup (1)
- Robotic process automation (1)
- Rotary encoder (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- SPS (1)
- Safety of the intended functionality (SOTIF) (1)
- Safety-critical systems validation (1)
- Secure multi-party computation (1)
- Self-driving (1)
- Sensors comparison (1)
- Serious Games (1)
- Serviceintegration (1)
- Services (1)
- Signalquelle (1)
- Similarity Theory (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software development (1)
- Software testing (1)
- Softwareroboter (1)
- Solver Per- formance (1)
- Speicherprogrammierte Steuerung (1)
- Stochastic Programming (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Supraleitung (1)
- Sustainability (1)
- System Design (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Teamwork (1)
- Technical Operation Research (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text Analytics (1)
- Text Mining (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Time-series synchronization (1)
- Transdisciplinarity (1)
- Transformation (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- Uncertainty (1)
- Unternehmensarchitektur (1)
- Unternehmensarchitekturen (1)
- Unternehmensarchitekturen Internet der Dinge (1)
- Unternehmensstrukturen (1)
- Unternehmenstransformation (1)
- Urban areas (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Vorverarbeitung (1)
- WLTP (1)
- Water Distribution (1)
- Water Supply Networks (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wertschöpfungskettenanalyse (1)
- Wiegand Effect (1)
- Wiegand sensor (1)
- Wissenstransfer (1)
- Wärmeübertragung (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- applications (1)
- artificial intelligence (1)
- automated vehicles (1)
- availability (1)
- batteries and fuel cells (1)
- body imaging at 7 T MRI (1)
- business analytics (1)
- business process automation (1)
- business simulation (1)
- commercial offthe- shelf solutions (1)
- competence developing games (1)
- connected automated vehicles (1)
- culpability (1)
- cybersecurity (1)
- decision analytics (1)
- design of technical systems (1)
- digital economy (1)
- do-it-yourself (1)
- education (1)
- electrospinning (1)
- embedded hardware (1)
- energy efficiency (1)
- energy transfer (1)
- experimental evaluation (1)
- fault detection (1)
- fibers (1)
- genetic algorithm (1)
- global optimization (1)
- harmonic radar (1)
- harmonic radar tags (1)
- heating system (1)
- honeynet (1)
- honeypot (1)
- ignition (1)
- information systems (1)
- irradiation (1)
- lab work (1)
- learning theories (1)
- legal obligations (1)
- liability (1)
- management (1)
- metrological characterization (1)
- microplasma (1)
- microwave (MW) plasma (1)
- microwave measurements (1)
- mixed-integer linear programming (1)
- model-predictive control (1)
- motivation theories (1)
- next generation network (1)
- nonlinear VNA measurements (1)
- optimization (1)
- passive inter-modulation (1)
- plasma jet (1)
- porous materials (1)
- power integrity (1)
- product bundling (1)
- product liability (1)
- professional skills (1)
- programming (1)
- remote sensing (1)
- requirements (1)
- research framework (1)
- resilience (1)
- sensor networks (1)
- signal integrity (1)
- slum classification (1)
- software engineering (1)
- software evaluation (1)
- software selection (1)
- stochastic optimization (1)
- sustainability (1)
- system optimization (1)
- system synthesis (1)
- systematic literature review (1)
- tablet game (1)
- technical operations research (1)
- technology (1)
- telecommunication (1)
- thermal dose (1)
- tissue temperature (1)
- transmit antenna arrays (1)
- water supply design (1)
- water supply system (1)
- Überwachung & Optimierung (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1150) (remove)
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.