Conference Proceeding
Refine
Year of publication
- 2024 (6)
- 2023 (30)
- 2022 (43)
- 2021 (50)
- 2020 (55)
- 2019 (91)
- 2018 (74)
- 2017 (85)
- 2016 (71)
- 2015 (78)
- 2014 (55)
- 2013 (74)
- 2012 (81)
- 2011 (70)
- 2010 (67)
- 2009 (63)
- 2008 (48)
- 2007 (44)
- 2006 (53)
- 2005 (29)
- 2004 (25)
- 2003 (22)
- 2002 (25)
- 2001 (18)
- 2000 (14)
- 1999 (15)
- 1998 (21)
- 1997 (10)
- 1996 (7)
- 1995 (6)
- 1994 (4)
- 1993 (11)
- 1992 (6)
- 1991 (3)
- 1990 (2)
- 1989 (5)
- 1988 (3)
- 1987 (1)
- 1986 (2)
- 1985 (4)
- 1984 (3)
- 1983 (3)
- 1981 (2)
- 1980 (1)
- 1979 (1)
- 1978 (3)
- 1977 (2)
- 1975 (3)
- 1974 (1)
- 1973 (3)
Document Type
- Conference Proceeding (1393) (remove)
Has Fulltext
- no (1393) (remove)
Keywords
- Enterprise Architecture (5)
- Gamification (5)
- Energy storage (4)
- Natural language processing (4)
- Power plants (4)
- hydrogen (4)
- solar sail (4)
- Associated liquids (3)
- Concentrated solar power (3)
- Hybrid energy system (3)
- MASCOT (3)
- Out-of-plane load (3)
- Serious Game (3)
- earthquakes (3)
- Additive manufacturing (2)
- Adjacent buildings (2)
- BIM (2)
- Case Study (2)
- Clustering (2)
- Deep learning (2)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (280)
- Fachbereich Energietechnik (226)
- Fachbereich Luft- und Raumfahrttechnik (192)
- Fachbereich Maschinenbau und Mechatronik (188)
- Solar-Institut Jülich (164)
- Fachbereich Medizintechnik und Technomathematik (148)
- IfB - Institut für Bioengineering (113)
- Fachbereich Bauingenieurwesen (101)
- ECSM European Center for Sustainable Mobility (57)
- Fachbereich Wirtschaftswissenschaften (53)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (44)
- INB - Institut für Nano- und Biotechnologien (41)
- Fachbereich Chemie und Biotechnologie (33)
- Nowum-Energy (22)
- Kommission für Forschung und Entwicklung (16)
- Fachbereich Architektur (13)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (8)
- Fachbereich Gestaltung (3)
- IaAM - Institut für angewandte Automation und Mechatronik (3)
- Institut fuer Angewandte Polymerchemie (2)
Risk management for structures with a risk of explosion should be considered very carefully when performing a risk analysis according to IEC 62305-2. In contrast to the 2006 edition of the standard, the 2010 edition describes the topic “Structures with a risk of explosion” in more detail. Moreover, in Germany separate procedures and parameters are defined for the risk analysis of structures with a risk of explosion (Supplement 3 of the German DIN EN 62305-2 standard). This paper describes the contents and the relevant calculations of this Supplement 3, together with a numerical example.
The quest for life on other planets is closely connected with the search for water in liquid state. Recent discoveries of deep oceans on icy moons like Europa and Enceladus have spurred an intensive discussion about how these waters can be accessed. The challenge of this endeavor lies in the unforeseeable requirements on instrumental characteristics both with respect to the scientific and technical methods. The TRIPLE/nanoAUV initiative is aiming at developing a mission concept for exploring exo-oceans and demonstrating the achievements in an earth-analogue context, exploring the ocean under the ice shield of Antarctica and lakes like Dome-C on the Antarctic continent.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.
KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.