Conference Proceeding
Refine
Year of publication
- 2017 (87) (remove)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (23)
- Fachbereich Luft- und Raumfahrttechnik (21)
- Fachbereich Medizintechnik und Technomathematik (16)
- IfB - Institut für Bioengineering (14)
- Fachbereich Energietechnik (11)
- Fachbereich Maschinenbau und Mechatronik (11)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (9)
- ECSM European Center for Sustainable Mobility (3)
- Fachbereich Bauingenieurwesen (3)
- INB - Institut für Nano- und Biotechnologien (3)
Document Type
- Conference Proceeding (87) (remove)
Keywords
- Gamification (2)
- MASCOT (2)
- Ausfachungsmauerwerk (1)
- Automated Optimization (1)
- Bewertungsframework (1)
- Competence Developing Gam (1)
- Competence Developing Games (1)
- Digitale Transformation (1)
- Diversity (1)
- Diversity Management (1)
- Education (1)
- Erdbeben (1)
- GOSSAMER-1 (1)
- Geschäftsmodelle (1)
- Gossamer (1)
- INSYSME (1)
- Image Database (1)
- Image Forensics (1)
- Innovation (1)
- Innovation Management (1)
- Leadership (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Mobile Phones (1)
- Multiphase (1)
- Optimal Topology (1)
- PHILAE (1)
- Piecewise Linearization (1)
- Process design (1)
- Process reference model (1)
- Sequence-Search (1)
- Serious Game (1)
- Serious Games (1)
- Similarity Theory (1)
- Small Solar System Body Lander (1)
- Small Spacecraft (1)
- Solar Power Sail (1)
- Stahlbetonrahmen (1)
- Trajectory Optimization (1)
- Unternehmensarchitekturen (1)
- Unternehmensarchitekturen Internet der Dinge (1)
- Ventilation System (1)
- Wertschöpfungskettenanalyse (1)
- Ziegelmauerwerk (1)
- asteroid sample return (1)
- collaboration of architects and structural engineers (1)
- education (1)
- elastomeric bearing (1)
- enhanced Telecom Operations Map (eTOM) (1)
- friction pendulum bearing (1)
- interdisciplinary student projects (1)
- learning theories (1)
- liquid storage tank (1)
- motivation theories (1)
- multiple NEA rendezvous (1)
- perception of structures (1)
- seismic isolation (1)
- simplified approach (1)
- solar sail (1)
- structural systems (1)
- teaching of structures (1)
Is part of the Bibliography
- no (87)
Biomechanical simulation of different prosthetic meshes for repairing uterine/vaginal vault prolapse
(2017)
Research collaborations provide opportunities for both practitioners and researchers: practitioners need solutions for difficult business challenges and researchers are looking for hard problems to solve and publish. Nevertheless, research collaborations carry the risk that practitioners focus on quick solutions too much and that researchers tackle theoretical problems, resulting in products which do not fulfill the project requirements.
In this paper we introduce an approach extending the ideas of agile and lean software development. It helps practitioners and researchers keep track of their common research collaboration goal: a scientifically enriched software product which fulfills the needs of the practitioner’s business model.
This approach gives first-class status to application-oriented metrics that measure progress and success of a research collaboration continuously. Those metrics are derived from the collaboration requirements and help to focus on a commonly defined goal.
An appropriate tool set evaluates and visualizes those metrics with minimal effort, and all participants will be pushed to focus on their tasks with appropriate effort. Thus project status, challenges and progress are transparent to all research collaboration members at any time.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.