@misc{Mertens2012, author = {Mertens, Konrad}, title = {"Aktueller Stand der Photovoltaiktechnik", Netzwerk Technikerschule, Technische Schulen Osnabr{\"u}cker Land, Osnabr{\"u}ck, 13.11.2012}, year = {2012}, language = {de} } @inproceedings{Mertens2018, author = {Mertens, K.}, title = {"Do Photovoltaics make sense in countries like Germany?", Invited Paper zur 7th International Energy and Sustainability Confrerence, Cologne Institute for Renewable Energy CIRE der TH K{\"o}ln, 17.05.2018, K{\"o}ln}, year = {2018}, language = {en} } @inproceedings{MayerPoddebniakFischeretal.2022, author = {Mayer, Peter and Poddebniak, Damian and Fischer, Konstantin and Brinkmann, Marcus and Somorovsky, Juraj and Schinzel, Sebastian and Volkamer, Melanie}, title = {"I don't know why I check this...'' - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks}, series = {Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)}, booktitle = {Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)}, publisher = {USENIX Association}, address = {Boston, MA}, isbn = {978-1-939133-30-4}, pages = {77 -- 96}, year = {2022}, abstract = {OpenPGP is one of the two major standards for end-to-end email security. Several studies showed that serious usability issues exist with tools implementing this standard. However, a widespread assumption is that expert users can handle these tools and detect signature spoofing attacks. We present a user study investigating expert users' strategies to detect signature spoofing attacks in Thunderbird. We observed 25 expert users while they classified eight emails as either having a legitimate signature or not. Studying expert users explicitly gives us an upper bound of attack detection rates of all users dealing with PGP signatures. 52\% of participants fell for at least one out of four signature spoofing attacks. Overall, participants did not have an established strategy for evaluating email signature legitimacy. We observed our participants apply 23 different types of checks when inspecting signed emails, but only 8 of these checks tended to be useful in identifying the spoofed or invalid signatures. In performing their checks, participants were frequently startled, confused, or annoyed with the user interface, which they found supported them little. All these results paint a clear picture: Even expert users struggle to verify email signatures, usability issues in email security are not limited to novice users, and developers may need proper guidance on implementing email signature GUIs correctly.}, language = {en} } @misc{Mertens2006, author = {Mertens, Konrad}, title = {"Lichtwellenleitertechnik im Handwerk", Innovationsforum Wachstumsmarkt Optische Technologien, Licht - Schl{\"u}sseltechnologie des 21. Jahrhunderts, Handwerkskammer M{\"u}nster, 02.11.06.}, year = {2006}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Lohnt sich der Bau einer Photovoltaikanlage noch?" Solarkampagne des Kreises Steinfurt, Wettringen, 05.04.2013}, year = {2013}, language = {de} } @misc{OPUS4-7342, title = {"Lohnt sich Solarstrom f{\"u}r mich als Hausbesitzer heute noch? - Chancen und Potentiale des Eigenverbrauchs", 1. Vortrag, Infoveranstaltung des Kreises Steinfurt, Emsdetten, 02.11.2015}, year = {2015}, language = {de} } @misc{Mertens2016, author = {Mertens, K.}, title = {"Lohnt sich Solarstrom f{\"u}r mich als Hausbesitzer heute noch? - Chancen und Potentiale des Eigenverbrauchs", 2. Vortrag, Infoveranstaltung des Kreises Steinfurt, Emsdetten, 25.01.2016}, year = {2016}, language = {de} } @misc{Mertens2008, author = {Mertens, Konrad}, title = {"Photovoltaik - Chancen f{\"u}r die Kunststoffindustrie", NetzWerk-Seminar des Kunststoffland NRW e.V., Kunststoffe in der Elektrotechnik und Elektronik, D{\"u}sseldorf, 5.9.08}, year = {2008}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Photovoltaik - eine der S{\"a}ulen der Energiewende", Innerwheel, Steinfurt, 07.10.2013}, year = {2013}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Photovoltaik - eine der S{\"a}ulen der Energiewende", {\"O}ffentliche Ringvorlesung zur Nachhaltigkeit, M{\"u}nster, 15.01.2013}, year = {2013}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Photovoltaik - M{\"o}glichkeiten, Chancen und Hemmnisse zur Aussch{\"o}pfung des PV-Potentials im Kreis Steinfurt", Jahreshauptversammlung Haus im Gl{\"u}ck e.V., Steinfurt, 12.03.2013}, year = {2013}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Photovoltaik auf Gewerbed{\"a}chern: Lohnt sich das noch?" Energieland 2050: Photovoltaik f{\"u}r Gewerbetreibende, TAT Rheine, 18.09.2013}, year = {2013}, language = {de} } @misc{Mertens2015, author = {Mertens, K.}, title = {"Photovoltaik auf Gewerbed{\"a}chern: Lohnt sich das noch?", Infoveranstaltung des Kreises Steinfurt, Lengerich, 31.08.2015}, year = {2015}, language = {de} } @misc{Mertens2016, author = {Mertens, K.}, title = {"Photovoltaik: Lohnt sich das noch f{\"u}r Hausbesitzer oder ist das nicht ohnehin alles Unsinn?", VDI Bezirksgruppe Rheine, Rheine, 01.04.2016}, year = {2016}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Photovoltaik: Wie funktioniert das? Lohnt sich das f{\"u}r mich?", M{\"u}nsters Wissen schaft, Schlauraum - Open Air H{\"o}rsaal, M{\"u}nster, 12.06.2013}, year = {2013}, language = {de} } @inproceedings{MertensArndsDiehl2017, author = {Mertens, K. and Arnds, A. and Diehl, M.}, title = {"Quick and Effective Plant Evaluation Using Dark-IV String Curves"}, series = {Proceedings of 33st European Photovoltaic Solar Energy Conference, Amsterdam, 2017}, booktitle = {Proceedings of 33st European Photovoltaic Solar Energy Conference, Amsterdam, 2017}, address = {Amsterdam}, isbn = {3-936338-47-7}, doi = {10.4229/EUPVSEC201}, pages = {2346 -- 2348}, year = {2017}, language = {en} } @misc{Mertens2018, author = {Mertens, K.}, title = {"Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Energiespartage Steinfurt, Steinfurt, 03.04.2018}, year = {2018}, language = {de} } @misc{Mertens2018, author = {Mertens, Konrad}, title = {"Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Solarkampagne des Kreises Steinfurt, Metelen, 02.08.2018}, year = {2018}, language = {de} } @misc{Mertens2018, author = {Mertens, Konrad}, title = {"Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Solarkampagne des Kreises Steinfurt, Ochtrup, 30.08.2018}, year = {2018}, language = {de} } @misc{Mertens2018, author = {Mertens, Konrad}, title = {"Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Solarkampagne des Kreises Steinfurt, Steinfurt, 25.06.2018}, year = {2018}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"Solarstrom vom eigenen Dach - Wir machen die Energiewende selbst!", B{\"u}rgerinformationsveranstaltung der Stadt Rheine, Rheine, 24.04.2013}, year = {2013}, language = {de} } @misc{Mertens2013, author = {Mertens, Konrad}, title = {"The German Photovoltaics Miracle - History, Obstacles and Current Situation", SPVH Conference Renewable Energy / Renewable Culture, Nov. 29-30, Zagreb}, year = {2013}, language = {en} } @misc{Mertens2014, author = {Mertens, K.}, title = {"Understanding Photovoltaics: Textbook Photovoltaics and PV-Teach", 29th European PV Solar Energy Converence and Exhibition, Amsterdam}, year = {2014}, language = {en} } @misc{Mertens2017, author = {Mertens, K.}, title = {"Wieso gerade Photovoltaik?", Auftaktworkshop zum Masterplan Sonne des Kreis Steinfurt, Steinfurt, 18.09.2017}, year = {2017}, language = {de} } @misc{Mertens2012, author = {Mertens, Konrad}, title = {"Wir machen die Energiewende selbst - Solarstrom vom eigenen Dach", Faire Woche Steinfurt, Steinfurt, 18.09.2012}, year = {2012}, language = {de} } @misc{Mertens2008, author = {Mertens, Konrad}, title = {,,Feldstudie zur tats{\"a}chlichen Leistung von Photovoltaikanlagen mittels Peakleistungsmessger{\"a}t", 23. Symposium "Photovoltaische Solarenergie, Staffelstein, 6.3.08.}, year = {2008}, language = {de} } @misc{Mertens2005, author = {Mertens, Konrad}, title = {,,Kindgerechte Visualisierung von Photovoltaikertr{\"a}gen", Symposium Photovoltaische Solarenergie, Staffelstein, M{\"a}rz 2005}, year = {2005}, language = {de} } @misc{Mertens2006, author = {Mertens, Konrad}, title = {,,Photovoltaik: Wie kommt die Sonne in die Steckdose?", Vortrag VDI Sch{\"u}lerforum, M{\"u}nster, 13.9.2006.}, year = {2006}, language = {de} } @misc{Mertens2006, author = {Mertens, Konrad}, title = {,,Strom aus der Sonne - Photovoltaikanlagen", Wissenschaft f{\"u}r Jedermann, Dienstagsgespr{\"a}che Kreis Steinfurt - FH M{\"u}nster, Steinfurt, 13.06.2006}, year = {2006}, language = {de} } @incollection{BeckschulzeSalewskiKowalewski2009, author = {Beckschulze, E. and Salewski, F. and Kowalewski, S.}, title = {A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications}, series = {Proc. Safety-Critical Systems, 2009 (SAE World Congress 2009), 2009, SAE International}, booktitle = {Proc. Safety-Critical Systems, 2009 (SAE World Congress 2009), 2009, SAE International}, pages = {209 -- 216}, year = {2009}, language = {en} } @article{BeckschulzeSalewskiKowalewski2009, author = {Beckschulze, E. and Salewski, F. and Kowalewski, S.}, title = {A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications}, series = {SAE International Journal of Passenger Cars - Electronic and Electrical Systems}, journal = {SAE International Journal of Passenger Cars - Electronic and Electrical Systems}, number = {1}, doi = {10.4271/2009-01-0761}, pages = {301 -- 308}, year = {2009}, language = {en} } @incollection{ArmoushSalewskiKowalewski2008, author = {Armoush, A. and Salewski, F. and Kowalewski, S.}, title = {A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test}, series = {Proc. The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), vol. 1}, booktitle = {Proc. The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), vol. 1}, publisher = {IEEE CS}, doi = {10.1109/EUC.2008.102}, pages = {484 -- 491}, year = {2008}, language = {en} } @incollection{StollenwerkDerksKowalewskietal.2010, author = {Stollenwerk, A. and Derks, A. and Kowalewski, S. and Salewski, Falk}, title = {A Modular, Robust and Open Source Microcontroller Platform for Broad Educational Usage}, series = {Proc. Workshop on Embedded Systems Education (WESE10), Scottsdale, AZ, USA}, booktitle = {Proc. Workshop on Embedded Systems Education (WESE10), Scottsdale, AZ, USA}, publisher = {ACM}, doi = {10.1145/1930277.1930285}, pages = {48 -- 54}, year = {2010}, language = {en} } @incollection{WeinrankGrinnemoBozakovetal.2017, author = {Weinrank, Felix and Grinnemo, Karl-Johan and Bozakov, Zdravko and Brunstrom, Anna and Dreibholz, Thomas and Fairhurst, Gorry and Hurtig, Per and Khademi, Naeem and T{\"u}xen, Michael}, title = {A NEAT Way to Browse the Web}, series = {Proceedings of the Applied Networking Research Workshop 2017}, booktitle = {Proceedings of the Applied Networking Research Workshop 2017}, address = {Prag}, pages = {33 -- 34}, year = {2017}, language = {en} } @incollection{RuengelerPenoffTuexenetal.2011, author = {R{\"u}ngeler, I. and Penoff, B. and T{\"u}xen, M. and Wagner, A.}, title = {A New Fast Algorithm for Connecting the INET Simulation Framework to Applications in Real-time}, series = {SIMUTools 11 Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques}, booktitle = {SIMUTools 11 Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques}, address = {Brussels}, isbn = {978-1-936968-00-8}, pages = {75 -- 80}, year = {2011}, language = {en} } @incollection{JelinekJohannesLavenetal.2014, author = {Jelinek, Moriz and Johannes, G. and Laven, Reinhart and Job, Werner and Schustereder, Hans-Joachim and Schulze, Mathias and Rommel, Lothar}, title = {A New Method to Increase the Doping Efficiency of Proton Implantation in a High-Dose Regime}, series = {E. Simoen, C. Claeys, O. Kakatsuka, R. Falster, C. Mazur{\´e} (Editors): High Purity Silicon XIII, ECS Transactions 64(11)}, booktitle = {E. Simoen, C. Claeys, O. Kakatsuka, R. Falster, C. Mazur{\´e} (Editors): High Purity Silicon XIII, ECS Transactions 64(11)}, pages = {199 -- 208}, year = {2014}, language = {en} } @incollection{RojasPomaresGonzalezetal.2001, author = {Rojas, I. and Pomares, H. and Gonzalez, J. and Gl{\"o}sek{\"o}tter, P. and Dienstuhl, J. and Goser, K. F.}, title = {A new sequential learning algorithm using pseudo-Gaussian functions for neuro-fuzzy systems}, series = {10th IEEE International Conference on Fuzzy Systems}, booktitle = {10th IEEE International Conference on Fuzzy Systems}, edition = {Volume: 3, 2-5 Dez.}, pages = {1243 -- 1246}, year = {2001}, language = {en} } @inproceedings{BurkeWesselerteVrugt2018, author = {Burke, Bruno and Weßeler, Peter and te Vrugt, J{\"u}rgen}, title = {A Programming Language Independent Platform for Algorithm Learning}, series = {Lifelong Technology-Enhanced Learning, 13th European Conference on Technology Enhanced Learning. EC-TEL 2018}, booktitle = {Lifelong Technology-Enhanced Learning, 13th European Conference on Technology Enhanced Learning. EC-TEL 2018}, editor = {Pammer-Schindler, Viktoria and P{\´e}rez-Sanagust{\´i}n, Mar and Drachsler, Hendrik and Elferink, Raymond and Scheffel, Maren}, publisher = {Springer, Cham}, isbn = {978-3-319-98572-5}, doi = {10.1007/978-3-319-98572-5_66}, pages = {652 -- 655}, year = {2018}, abstract = {Teaching People to program is a crucial requirement for our society to deal with the complexity of 21st-century challenges. In many teaching systems, the student is required to use a particular programming language or development environment. This paper presents an intelligent tutoring system to support blended learning scenarios, where the students can choose their programming language and development environment. For that, the system provides an interface where the students request test data and submit results to unit test their algorithms. The submitted results are analyzed by a machine learning system that detects common errors and provides adaptive feedback to the student. With this system, we are focusing on teaching algorithms rather than specific programming language semantics. The technical evaluation tested with the implementation of Mean and Median algorithm shows that the system can distinguish between error cases with an error rate under 20\%. A first survey, with a small group of students, shows that the system helps them detect common errors and arrive at a correct/valid solution. We are in the process of testing the system with a larger group of students for gathering statistically reliable data.}, language = {en} } @inproceedings{VoelkerVolodinaTuexenetal.2020, author = {V{\"o}lker, Timo and Volodina, Ekaterina and T{\"u}xen, Michael and Rathgeb, Erwin Paul}, title = {A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue}, series = {2020 IFIP Networking Conference}, booktitle = {2020 IFIP Networking Conference}, publisher = {IEEE}, address = {New York, NY, USA}, isbn = {978-3-903176-28-7}, url = {http://nbn-resolving.de/urn:nbn:de:hbz:836-opus-149662}, pages = {737 -- 742}, year = {2020}, abstract = {Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite. In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue.}, language = {en} } @incollection{DuelksSalewskiKowalewski2009, author = {D{\"u}lks, R. and Salewski, F. and Kowalewski, S.}, title = {A Real-Time Test and Simulation Environment Based on Standard FPGA Hardware}, series = {Proc. Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC Part 2009), Washington, DC, USA}, booktitle = {Proc. Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC Part 2009), Washington, DC, USA}, publisher = {IEEE Computer Society}, doi = {10.1109/TAICPART.2009.24}, pages = {197 -- 204}, year = {2009}, language = {en} } @incollection{OlivaresGorrizOlivaresetal.2010, author = {Olivares, A. and G{\´o}rriz, J. M. and Olivares, G. and Ram{\´i}rez, J. and Gl{\"o}sek{\"o}tter, P.}, title = {A Study of Vibration-Based Energy Harvesting in Activities of Daily Living}, series = {4th International ICST Conference on Pervasive Computing Technologies for Healthcare}, booktitle = {4th International ICST Conference on Pervasive Computing Technologies for Healthcare}, edition = {March}, address = {Munich, Germany}, year = {2010}, language = {en} } @article{GerkeBeckerRogallaetal.2015, author = {Gerke, Sebastian and Becker, Hans-Werner and Rogalla, Detlef and Hahn, Giso and Job, Reinhart and Terheiden, Barbara}, title = {About Nuclear Resonant Reaction Analysis for Hydrogen Investigations in Amorphous Silicon Layers}, series = {Energy Proceedia}, volume = {84}, journal = {Energy Proceedia}, doi = {10.1016/j.egypro.2015.12.301}, pages = {99 -- 104}, year = {2015}, language = {en} } @incollection{SalewskiKowalewski2007, author = {Salewski, F. and Kowalewski, S.}, title = {Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different Approaches}, series = {Proc. Computer Safety, Reliability, and Security (SAFECOMP 07), 2007, vol. 4680/2007 in Lecture Notes in Computer Science}, booktitle = {Proc. Computer Safety, Reliability, and Security (SAFECOMP 07), 2007, vol. 4680/2007 in Lecture Notes in Computer Science}, doi = {10.1007/978-3-540-75101-4_26}, pages = {270 -- 275}, year = {2007}, language = {en} } @article{JohannesLavenJobetal.2013, author = {Johannes, G. and Laven, Reinhart and Job, Hans and Schulze, -Joachim and Niedernostheide, Franz-Josef and Schustereder, Werner and Frey, Lothar}, title = {Activation and Dissociation of Proton-Induced Donor Profiles in Silicon}, series = {ECS Journal of Solid State Science and Technology}, volume = {2}, journal = {ECS Journal of Solid State Science and Technology}, number = {9}, pages = {389 -- 394}, year = {2013}, language = {en} } @misc{TuexenSeggelmannStewartetal.2015, author = {T{\"u}xen, M. and Seggelmann, R. and Stewart, R. and Loreto, S.}, title = {Additional Policies for the Partially Reliable Stream Control Transmission Protocol Extension}, issn = {2070-1721}, doi = {10.17487/RFC7496}, year = {2015}, language = {en} } @incollection{PachaGloesekoetterGoser1998, author = {Pacha, C. and Gl{\"o}sek{\"o}tter, P. and Goser, K. F.}, title = {Adiabatic Switching and Power Dissipation of Dynamic Resonant Tunneling Device Logic Circuits}, series = {3rd Workshop on Innovative Circuits and Systems for Nano Elektronics, Nano-EL98}, booktitle = {3rd Workshop on Innovative Circuits and Systems for Nano Elektronics, Nano-EL98}, edition = {Sept. 5-6}, publisher = {Munich Paper C2/1-6}, year = {1998}, language = {en} } @article{HorbeltEbertUlbikaiteetal.2016, author = {Horbelt, Renate and Ebert, Stefanie and Ulbikaite, Vaidvile and Hahn, Giso and Job, Reinhart and Terheiden, Barbara}, title = {Al-density variation as one driving force for void formationin PERC solar cells}, series = {Physica Status Solidi (RRL)}, volume = {10}, journal = {Physica Status Solidi (RRL)}, number = {7}, doi = {10.1002/pssr.201600078}, pages = {515 -- 519}, year = {2016}, language = {en} } @inproceedings{HorsthemkeBischoffGloesekoetteretal.2020, author = {Horsthemke, Ludwig and Bischoff, Christian and Gl{\"o}sek{\"o}tter, Peter and Burchard, Bernd and Staacke, Robert and Meijer, Jan}, title = {All optical readout scheme for photoluminescence based magnetic field sensors}, series = {2020 IEEE Sensors, Rotterdam, Netherlands}, booktitle = {2020 IEEE Sensors, Rotterdam, Netherlands}, doi = {10.1109/SENSORS47125.2020.9278923}, pages = {1 -- 3}, year = {2020}, abstract = {An improvement on a concept for all optical mag- netometry using nitrogen vacancies in diamond is presented. The concept is based on the fluorescence attenuation of optically pumped nitrogen vacancies by magnetic fields up to ≈ 50 mT. The attenuation is registered by modulating the pumping power to generate a constant signal at a photodetector. A sensitivity of 2.6μT/√Hz at a sampling frequency of 500 Hz is achieved.}, language = {de} } @article{BrinkmannDresenMergetetal.2021, author = {Brinkmann, Marcus and Dresen, Christian and Merget, Robert and Poddebniak, Damian and M{\"u}ller, Jens and Somorovsky, Juraj and Schwenk, J{\"o}rg and Schinzel, Sebastian}, title = {ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication}, series = {30th USENIX Security Symposium}, journal = {30th USENIX Security Symposium}, year = {2021}, language = {en} } @incollection{EstevezGarciaGloesekoetter2016, author = {Estevez, F. and Garc{\´i}a, A. and Gl{\"o}sek{\"o}tter, P.}, title = {An application of people's sentiment from social media to smart cities}, edition = {Vol. 25, Nr. 6}, publisher = {El Profesional de la Informacion}, year = {2016}, language = {en} } @incollection{Schinzel2011, author = {Schinzel, Sebastian}, title = {An Efficient Mitigation Method for Timing Side Channels on the Web}, series = {2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011)}, booktitle = {2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011)}, year = {2011}, language = {en} } @misc{TsekouraRebelBerekovicetal.2014, author = {Tsekoura, Ioanna and Rebel, Gregor and Berekovic, Mladen and Gl{\"o}sek{\"o}tter, P.}, title = {An evaluation of energy efficient microcontrollers}, year = {2014}, language = {en} } @inproceedings{GierlingDresenEichetal.2018, author = {Gierling, Markus and Dresen, Christian and Eich, Hans and Mittman, Karin and Schinzel, Sebastian and Haverkamp, Uwe}, title = {Analysis and consequences of an imaging process concerning the cyber security of a networked computer tomography scanner}, series = {STRAHLENTHERAPIE UND ONKOLOGIE}, booktitle = {STRAHLENTHERAPIE UND ONKOLOGIE}, pages = {185 -- 186}, year = {2018}, language = {en} } @inproceedings{LoechteThranowWintersetal.2022, author = {L{\"o}chte, Andre and Thranow, Jan-Ole and Winters, Felix and Gl{\"o}sek{\"o}tter, Peter}, title = {Analysis of switching electronics for metal-air batterie}, series = {ICECET, Prag}, booktitle = {ICECET, Prag}, doi = {10.1109/ICECET55527.2022.9872910}, year = {2022}, abstract = {The subject of this paper is the analysis of various switching electronics for batteries with separate electrodes for charging and discharging. The aim is to find a switching method that is energy-efficient on the one hand, but also economically viable on the other. Both relays and MOSFETs are suitable for switching between the electrodes. Both variants have advantages and disadvantages. The results show that a solution with MOSFETs is generally more energy-efficient, but requires a large number of cycles to be economically viable compared to the relay.}, language = {de} } @inproceedings{WillingDresenHaverkampetal.2020, author = {Willing, Markus and Dresen, Christian and Haverkamp, Uwe and Schinzel, Sebastian}, title = {Analyzing medical device connectivity and its effect on cyber security in german hospitals}, publisher = {BMC Medical Informatics and Decision Making volume}, doi = {10.1186/s12911-020-01259-y}, year = {2020}, abstract = {Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked. Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs. Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.}, language = {en} } @incollection{SchlichSalewskiKowalewski2007, author = {Schlich, B. and Salewski, F. and Kowalewski, S.}, title = {Applying Model Checking to an Automotive Microcontroller Application}, series = {Proc. Industrial Embedded Systems (SIES 07), Lisbon, Portugal}, booktitle = {Proc. Industrial Embedded Systems (SIES 07), Lisbon, Portugal}, publisher = {IEEE Computer Society Press}, doi = {10.1109/SIES.2007.4297337}, pages = {209 -- 216}, year = {2007}, language = {mul} } @incollection{LoechteHorsthemkeBrinkmannetal.2016, author = {L{\"o}chte, A. and Horsthemke, L. and Brinkmann, T. and Leuker, M. and Heller, A. and Gl{\"o}sek{\"o}tter, P.}, title = {Are Supercaps Ready for Ubiquitous Computing?}, series = {Ubiquitous Computing \& Ambient Intelligence: 10th International Conference, UCAmI 2016}, booktitle = {Ubiquitous Computing \& Ambient Intelligence: 10th International Conference, UCAmI 2016}, publisher = {Springer International Publishing}, address = {San Bartolom{\´e} de Tirajana, Gran Canaria}, doi = {10.1007/978-3-319-48799-1_40}, pages = {356 -- 361}, year = {2016}, language = {en} } @misc{Gloesekoetter2010, author = {Gl{\"o}sek{\"o}tter, P.}, title = {Aspects of Micro- and Nanosystems for Wireless Health Monitoring Applicaitons, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, September}, year = {2010}, language = {en} } @incollection{GloesekoetterPachaGoser1999, author = {Gl{\"o}sek{\"o}tter, P. and Pacha, C. and Goser, K. F.}, title = {Associative Matrix for Nano-scale Integratd Circuits}, series = {7th International Conference on Microelectronics for Neural, Fuzzy and Bio-Inspired Systems (MicroNeuro)}, booktitle = {7th International Conference on Microelectronics for Neural, Fuzzy and Bio-Inspired Systems (MicroNeuro)}, edition = {March}, publisher = {IEEE Computer Society Press, Los Alamitos, CA}, address = {Granada, Spain}, pages = {352 -- 358}, year = {1999}, language = {en} } @incollection{GloesekoetterProstPachaetal.2002, author = {Gl{\"o}sek{\"o}tter, P. and Prost, W. and Pacha, C. and Kim, S. O. and van Husen, H. and Reimann, T. and Tegude, F.- J. and Goser, K. F.}, title = {Asynchronous Circuit Design Based on the RTBT Monostable-Bistable-Logic-Transiton-Element (MOBILE)}, series = {15th Symposium on Integrated Circuits and System Design, Chip in the Pampa}, booktitle = {15th Symposium on Integrated Circuits and System Design, Chip in the Pampa}, edition = {Sept. 9-14}, address = {Porto Alegre, RS, Brazil}, year = {2002}, language = {en} } @incollection{PoddebniakSomorovskySchinzeletal.2018, author = {Poddebniak, Damian and Somorovsky, Juraj and Schinzel, Sebastian and Lochter, Manfred and R{\"o}sler, Paul}, title = {Attacking Deterministic Signature Schemes using Fault Attacks}, series = {3rd IEEE European Symposium on Security and Privacy}, booktitle = {3rd IEEE European Symposium on Security and Privacy}, year = {2018}, language = {mul} } @article{UngruTenbrinckJiangetal.2014, author = {Ungru, Kathrin and Tenbrinck, Daniel and Jiang, Xiaoyi and Stypmann, J{\"o}rg}, title = {Automatic Classification of Left Ventricular Wall Segments in Small Animal Ultrasound Imaging.}, series = {Computer Methods and Programs in Biomedicine}, volume = {117}, journal = {Computer Methods and Programs in Biomedicine}, number = {1}, editor = {Elsevier,}, doi = {10.1016/j.cmpb.2014.06.015}, pages = {2 -- 12}, year = {2014}, language = {en} } @article{ZimmerAsbeckLuetzenkirchenHechtetal.2013, author = {Zimmer, C. M. and Asbeck, C. and L{\"u}tzenkirchen-Hecht, D. and Gl{\"o}sek{\"o}tter, P. and Kallis, K.}, title = {Backside Illumination of an Electronic Photo Ionization Detector Realized by UV Transparent Thin Films}, series = {Journal of Nano Research}, volume = {25}, journal = {Journal of Nano Research}, doi = {10.4028}, pages = {55 -- 60}, year = {2013}, language = {en} } @article{LoechteRojasRuizGloesekoetter2021, author = {L{\"o}chte, Andre and Rojas Ruiz, Ignacio and Gl{\"o}sek{\"o}tter, Peter}, title = {Battery State Estimation with ANN and SVR Evaluating Electrochemical Impedance Spectra Generalizing DC Currents}, series = {Applied Sciences}, volume = {12}, journal = {Applied Sciences}, number = {1}, isbn = {978-84-1117-173-1}, doi = {10.3390/app12010274}, pages = {275}, year = {2021}, abstract = {The demand for energy storage is increasing massively due to the electrification of transport and the expansion of renewable energies. Current battery technologies cannot satisfy this growing demand as they are difficult to recycle, as the necessary raw materials are mined under precarious conditions, and as the energy density is insufficient. Metal-air batteries offer a high energy density as there is only one active mass inside the cell and the cathodic reaction uses the ambient air. Various metals can be used, but zinc is very promising due to its disposability and non-toxic behavior, and as operation as a secondary cell is possible. Typical characteristics of zinc-air batteries are flat charge and discharge curves. On the one hand, this is an advantage for the subsequent power electronics, which can be optimized for smaller and constant voltage ranges. On the other hand, the state determination of the system becomes more complex, as the voltage level is not sufficient to determine the state of the battery. In this context, electrochemical impedance spectroscopy is a promising candidate as the resulting impedance spectra depend on the state of charge, working point, state of aging, and temperature. Previous approaches require a fixed operating state of the cell while impedance measurements are being performed. In this publication, electrochemical impedance spectroscopy is therefore combined with various machine learning techniques to also determine successfully the state of charge during charging of the cell at non-fixed charging currents. Keywords: electrochemical impedance spectroscopy; artificial neural networks; support vector regression; zinc-air battery; state estimation; state of charge}, language = {en} } @article{WillingDresenGerlitzetal.2021, author = {Willing, Markus and Dresen, Christian and Gerlitz, Eva and Haering, Maximilian and Smith, Matthew and Binnewies, Carmen and Guess, Tim and Haverkamp, Uwe and Schinzel, Sebastian}, title = {Behavioral responses to a cyber attack in a hospital environment}, series = {Nature -- Scientific Reports}, journal = {Nature -- Scientific Reports}, doi = {10.1038/s41598-021-98576-7}, year = {2021}, abstract = {Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors' incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40\% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.}, language = {en} } @article{GerkeHahnJobetal.2015, author = {Gerke, Sebastian and Hahn, Giso and Job, Reinhart and Terheiden, Barbara}, title = {Bias-plasma for RF magnetron sputter deposition of passivating amorphous silicon layers}, series = {Energy Procedia}, volume = {77}, journal = {Energy Procedia}, doi = {10.1016/j.egypro.2015.12.302}, pages = {75 -- 82}, year = {2015}, language = {en} } @misc{Fehn2000, author = {Fehn, Heinz-Georg}, title = {Bildverarbeitung : Verarbeitung von Bildern}, publisher = {FH M{\"u}nster}, doi = {10.25974/fhms-10}, url = {http://nbn-resolving.de/urn:nbn:de:hbz:836-opus-101}, year = {2000}, abstract = {Das Tutorial erl{\"a}utert die Elemente von Bildverarbeitungssystemen. Es befaßt sich mit den Prinzipen der Beleuchtung, Optik, Kamerasystemen und Bilderfassungskarten (Framegrabber) als Komponenten der Bildgebung und -erfassung. Weiterhin stellt sich die Bildverarbeitung als ein Gebiet der zweidimensionalen digitalen Signalverarbeitung dar. Im Verlauf des Tutorials wird daher auch auf die Grundlagen der Bilddigitalisierung und Bilddarstellung im Rechner und ihr Einfluß auf die Bildauswertung eingegangen. So kann die Verarbeitung von Bildern durch den Rechner mittels ikonischer Bildverarbeitung, also die Handhabung Bilddaten als Repr{\"a}sentation von Helligkeitsinformationen, durchgef{\"u}hrt werden. Die Verfahren basierend auf Punktoperationen, lokale Operationen und globale Operationen z.B. zur Kontrastverbesserung, zur Rauschbefreiung oder Strukturfindung sind Methoden der ikonischen Bildanalyse. Im Rahmen des Tutorials werden die Grundlagen und Methoden der ikonischen Bildverarbeitung am Beispiel industrieller Aufgabenstellungen und Anwendungen erl{\"a}utert. Die symbolische Bildverarbeitung basiert hingegen auf extrahierten Bildmerkmalen, wie z.B. Umfang, Schwerpunkt, Form etc. Ein Merkmalsvektor, gebildet aus solchen Kenngr{\"o}ßen stellt eine symbolische Beschreibung von Bildinhalten dar und kann z.B. zur Objektklassifikation verwendet werden.}, subject = {Bildverarbeitung}, language = {de} } @incollection{JagerSchinzelSomorovsky2012, author = {Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, title = {Bleichenbacher's Attack Strinkes Again: Breaking PKCS\#1 v1.5 in XML Encryption}, series = {17th European Symposium on Research in Computer Security (ESORCIS 2012)}, booktitle = {17th European Symposium on Research in Computer Security (ESORCIS 2012)}, year = {2012}, language = {mul} } @incollection{EstevezRebelGonzalezetal.2013, author = {Estevez, F. and Rebel, G. and Gonz{\´a}lez, J. and Palomares, J. M. and Gl{\"o}sek{\"o}tter, P.}, title = {Body energy harvesting for WSN. State of art and examples}, series = {Jornadas de Computaci{\´o}n Empotrada de Espana (JCE)}, booktitle = {Jornadas de Computaci{\´o}n Empotrada de Espana (JCE)}, edition = {09/2013}, year = {2013}, language = {en} } @inproceedings{EstevezRebelGonzalezetal.2013, author = {Estevez, F. and Rebel, G. and Gonz{\´a}lez, J. and Palomares, J.M. and Gl{\"o}sek{\"o}tter, P.}, title = {Body energy harvesting for WSN. State of art and examples}, series = {Proceedings JCE 09/2013}, booktitle = {Proceedings JCE 09/2013}, publisher = {JCE}, doi = {10.25974/fhms-707}, year = {2013}, abstract = {Body energy harvesting for WSN. State of art and examples}, language = {en} } @incollection{GoetzfriedEckertMuelleretal.2017, author = {G{\"o}tzfried, J. and Eckert, M. and M{\"u}ller, T. and Schinzel, S.}, title = {Cache Attacks on Intel SGX}, series = {EuroSec'17}, booktitle = {EuroSec'17}, publisher = {ACM}, address = {Belgrade, Serbia}, isbn = {978-1-4503-4935-2/}, doi = {10.1145/3065913.3065915}, year = {2017}, language = {mul} } @inproceedings{WeβelerKaiserteVrugtetal.2018, author = {Weβeler, Peter and Kaiser, Benjamin and te Vrugt, J{\"u}rgen and Lechler, Armin and Verl, Alexander}, title = {Camera based path planning for low quantity - high variant manufacturing with industrial robots}, series = {25th International Conference on Mechatronics and Machine Vision in Practice (M2VIP)}, booktitle = {25th International Conference on Mechatronics and Machine Vision in Practice (M2VIP)}, publisher = {IEEE}, isbn = {978-1-5386-7544-1}, doi = {10.1109/M2VIP.2018.8600833}, pages = {1 -- 6}, year = {2018}, abstract = {The acquisition costs for industrial robots have been steadily decreasing in past years. Nevertheless, they still face significant drawbacks in the required effort for the preparation of complex robot tasks which causes these systems to be rarely present so far in small and medium-sized enterprises (SME) that focus mainly on small volume, high variant manufacturing. In this paper, we propose a camera-based path planning framework that allows the fast preparation and execution of robot tasks in dynamic environments which leads to less planning overhead, fast program generation and reduced cost and hence overcomes the major impediments for the usage of industrial robots for automation in SMEs with focus on low volume and high variant manufacturing. The framework resolves existing problems in different steps. The exact position and orientation of the workpiece are determined from a 3D environment model scanned by an optical sensor. The so retrieved information is used to plan a collision-free path that meets the boundary conditions of the specific robot task. Experiments show the potential and effectiveness of the the framework presented here by evaluating a case study.}, language = {en} } @article{GerkeMicardJobetal.2016, author = {Gerke, Sebastian and Micard, Gabriel and Job, Reinhart and Hahn, Giso and Terheiden, Barbara}, title = {Capacitance-voltage spectroscopy and analysis of dielectric intrinsic amorphous silicon thin films}, series = {Physica Status Solidi (c)}, journal = {Physica Status Solidi (c)}, doi = {10.1002/pssc.201600019}, pages = {1 -- 5}, year = {2016}, language = {en} } @misc{YoshidaJob2000, author = {Yoshida, Akira and Job, Reinhart}, title = {Cathode ray-luminescent phosphor and method for the preparation thereof, United States Patent}, year = {2000}, language = {en} } @article{HorbeltMicardKelleretal.2016, author = {Horbelt, Renate and Micard, Gabriel and Keller, Phillip and Hahn, Giso and Job, Reinhart and Terheiden, Barbara}, title = {Characterization of local Al-contacts by light beam induced current measurements and their verification by 2D simulation using flexPDE}, series = {Physica Status Solidi (a)}, volume = {213}, journal = {Physica Status Solidi (a)}, number = {5}, doi = {10.1002/pssa.201532753}, pages = {1317 -- 1323}, year = {2016}, language = {en} } @article{GloesekoetterProstPachaetal.2003, author = {Gl{\"o}sek{\"o}tter, P. and Prost, W. and Pacha, C. and Kim, S. O. and van Husen, H. and Reimann, T. and Tegude, F.- J. and Goser, K. F.}, title = {Circuit and Application Asepects of Tunneling Devices in a MOBILE configuration}, series = {Special Issue of the International Journal of Circuit Theory and Applications "Nanoelectronic Circuit", 31:83-103 (invited paper)}, journal = {Special Issue of the International Journal of Circuit Theory and Applications "Nanoelectronic Circuit", 31:83-103 (invited paper)}, year = {2003}, language = {en} } @incollection{RojasAnguitaPelayoetal.1997, author = {Rojas, I. and Anguita, M. and Pelayo, F. J. and Gl{\"o}sek{\"o}tter, P. and Prieto, A.}, title = {CMOS implementation of RBF Neural Networks using Adaptive Baussian Radial Functions}, series = {Proceedings of the 6th International Conference on Microelectronics for Neural Networks, Evolutionary \& Fuzzy Systems (MicroNeuro'97)}, booktitle = {Proceedings of the 6th International Conference on Microelectronics for Neural Networks, Evolutionary \& Fuzzy Systems (MicroNeuro'97)}, edition = {September}, address = {Dresden, Germany}, year = {1997}, language = {en} } @misc{EstevezRebelJoseetal.2014, author = {Estevez, Francisco and Rebel, Gregor and Jose, M. and Castillo-Secilla, Jes{\´u}s and Gonz{\´a}les, Peter}, title = {Cognitive Radio as solution for Saturation Problem in Wireless Sensor Networks: A survey of Cognitive Radio policies}, year = {2014}, language = {en} } @article{PogorzelskiHorsthemkeHomrighausenetal.2024, author = {Pogorzelski, Jens and Horsthemke, Ludwig and Homrighausen, Jonas and Stiegek{\"o}tter, Dennis and Gregor, Markus and Gl{\"o}sek{\"o}tter, Peter}, title = {Compact and Fully Integrated LED Quantum Sensor Based on NV Centers in Diamond}, series = {Compact and Fully Integrated LED Quantum Sensor Based on NV Centers in Diamond}, volume = {2024}, journal = {Compact and Fully Integrated LED Quantum Sensor Based on NV Centers in Diamond}, number = {24(3)}, doi = {10.25974/fhms-17569}, url = {http://nbn-resolving.de/urn:nbn:de:hbz:836-opus-175692}, year = {2024}, abstract = {Quantum magnetometry based on optically detected magnetic resonance (ODMR) of nitrogen vacancy centers in diamond nano or microcrystals is a promising technology for sensitive, integrated magnetic-field sensors. Currently, this technology is still cost-intensive and mainly found in research. Here we propose one of the smallest fully integrated quantum sensors to date based on nitrogen vacancy (NV) centers in diamond microcrystals. It is an extremely cost-effective device that integrates a pump light source, photodiode, microwave antenna, filtering and fluorescence detection. Thus, the sensor offers an all-electric interface without the need to adjust or connect optical components. A sensitivity of 28.32nT/Hz---√ and a theoretical shot noise limited sensitivity of 2.87 nT/Hz---√ is reached. Since only generally available parts were used, the sensor can be easily produced in a small series. The form factor of (6.9 × 3.9 × 15.9) mm3 combined with the integration level is the smallest fully integrated NV-based sensor proposed so far. With a power consumption of around 0.1W, this sensor becomes interesting for a wide range of stationary and handheld systems. This development paves the way for the wide usage of quantum magnetometers in non-laboratory environments and technical applications.}, language = {de} } @article{HerguthHorbeltWilkingetal.2015, author = {Herguth, Axel and Horbelt, Renate and Wilking, Svenja and Job, Reinhart and Hahn, Giso}, title = {Comparison of BO Regeneration dynamics in PERC and Al-BSF solar cells}, series = {Energy Procedia}, volume = {77}, journal = {Energy Procedia}, doi = {10.1016/j.egypro.2015.07.012}, pages = {75 -- 82}, year = {2015}, language = {en} } @incollection{ChenSalewskiKowalewski2007, author = {Chen, X. and Salewski, F. and Kowalewski, S.}, title = {Concept and Prototyping of a Fault Management Framework for Automotive Safety Relevant Systems}, series = {Proc. Moderne Elektronik im Kraftfahrzeug II}, booktitle = {Proc. Moderne Elektronik im Kraftfahrzeug II}, publisher = {expert-verlag}, pages = {70 -- 79}, year = {2007}, language = {en} } @inproceedings{IsingPoddebniakKappertetal.2023, author = {Ising, Fabian and Poddebniak, Damian and Kappert, Tobias and Saatjohann, Christoph and Schinzel, Sebastian}, title = {Content-Type: multipart/oracle -- Tapping into Format Oracles in Email End-to-End Encryption}, series = {32nd USENIX Security Symposium}, booktitle = {32nd USENIX Security Symposium}, publisher = {USENIX Association}, year = {2023}, abstract = {S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case? In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent net work patterns when opened in a victim's email client. We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation.}, language = {en} } @incollection{JohannesLavenJobetal.2011, author = {Johannes, G. and Laven, Reinhart and Job, W. and Schustereder, H.-J. and Schulze, F.- J. and Niedernostheide, H. and Schulze, L.}, title = {Conversion Efficiency of Radiation Damage Profiles into Hydrogen-Related Donor Profiles}, series = {W. Jantsch, F. Sch{\"a}fer (Editors): Gettering and Defect Engineering in Semiconductor Technology XIV (GADEST 2011)}, booktitle = {W. Jantsch, F. Sch{\"a}fer (Editors): Gettering and Defect Engineering in Semiconductor Technology XIV (GADEST 2011)}, edition = {1}, publisher = {Trans Tech Publications Ltd.}, address = {Z{\"u}rich}, pages = {375 -- 384}, year = {2011}, language = {en} } @article{JohannesLavenJobetal.2011, author = {Johannes, G. and Laven, Reinhart and Job, Werner and Schustereder, Hans-Joachim and Schulze, Franz-Josef and Niedernostheide, Holger and Schulze, Lothar}, title = {Conversion Efficiency of Radiation Damage Profiles into Hydrogen-Related Donor Profiles}, series = {Solid State Phenomena}, volume = {178-179}, journal = {Solid State Phenomena}, pages = {375 -- 384}, year = {2011}, language = {en} } @inproceedings{DresenIsingPoddebniaketal.2020, author = {Dresen, Christian and Ising, Fabian and Poddebniak, Damian and Kappert, Tobias and Holz, Thorsten and Schinzel, Sebastian}, title = {CORSICA: Cross-Origin Web Service Identification}, series = {The 15th ACM ASIA Conference on Computer and Communications Security}, booktitle = {The 15th ACM ASIA Conference on Computer and Communications Security}, editor = {Zhou, Jianying}, year = {2020}, abstract = {Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74\%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques.}, language = {en} } @article{Salewski2016, author = {Salewski, Falk}, title = {COTS or Custom Made? A Multi-Criteria Decision Analysis for Industrial Control Systems}, series = {International Journal on Advances in Systems and Measurements}, volume = {9}, journal = {International Journal on Advances in Systems and Measurements}, number = {1 \& 2}, issn = {1942-261x}, pages = {122 -- 131}, year = {2016}, language = {en} } @incollection{Salewski2015, author = {Salewski, Falk}, title = {COTS or Custom Made? Design Decisions for Industrial Control Systems}, series = {Proc. of the Eighth International Conference on Advances in Circuits, Electronics and Micro-electronics (CENICS 2015)}, booktitle = {Proc. of the Eighth International Conference on Advances in Circuits, Electronics and Micro-electronics (CENICS 2015)}, publisher = {IARIA}, address = {Venice, Italy}, isbn = {978-1-61208-430-5}, pages = {7 -- 12}, year = {2015}, language = {en} } @incollection{EstevezGloesekoetterGonzalez2016, author = {Estevez, F. and Gl{\"o}sek{\"o}tter, P. and Gonz{\´a}lez, J.}, title = {DARAL: A Dynamic and Adaptive Routing Algorithm for Wireless Sensor Networks}, publisher = {Sensors}, address = {Basel}, doi = {10.3390/s16070960}, year = {2016}, language = {en} } @article{EstevezRebelGonzalezetal.2014, author = {Est{\´e}vez, F. and Rebel, G. and Gonz{\´a}lez, J. and Gl{\"o}sek{\"o}tter, P.}, title = {DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks}, series = {Electronics Letters}, volume = {01/2014}, journal = {Electronics Letters}, year = {2014}, language = {en} } @article{EstevezRebelGonzalezetal.2015, author = {Estevez, Francisco and Rebel, G. and Gonz{\´a}lez, J. and Gloesekoetter, P.}, title = {DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks}, series = {Electronics letters}, volume = {50}, journal = {Electronics letters}, number = {2}, doi = {10.25974/fhms-824}, url = {http://nbn-resolving.de/urn:nbn:de:hbz:836-opus-8243}, pages = {122 -- 123}, year = {2015}, abstract = {DARP is a new protocol proposal with some interesting features like dynamic roles and the use of virtual sub-networks. This article discusses about the wireless sensor network state of art and presents some desirable features in order to adapt these networks to new scenarios. These necessities are quite important to expand the applicability of wireless sensor networks and for this reason, here DARP is proposed.}, language = {en} } @article{BeckeRathgebWerneretal.2013, author = {Becke, Martin and Rathgeb, Erwin and Werner, Sebastian and R{\"u}ngeler, Irene and T{\"u}xen, Michael and Stewart, Randall}, title = {Data channel considerations for RTCWeb}, series = {IEEE Communications Magazine}, volume = {51}, journal = {IEEE Communications Magazine}, number = {4}, pages = {34 -- 41}, year = {2013}, language = {en} } @misc{TuexenStewartJesupetal.2017, author = {T{\"u}xen, M. and Stewart, R. and Jesup, R. and Loreto, S.}, title = {Datagram Transport Layer Security (DTLS) Encapsulation of SCTP Packets}, issn = {2070-1721}, doi = {10.17487/RFC8261}, year = {2017}, language = {en} } @inproceedings{RoerupGloesekoetterPomaresetal.2021, author = {R{\"o}rup, Tim and Gl{\"o}sek{\"o}tter, Peter and Pomares, Hector and Ruiz, Ignacio}, title = {Deep Learning Based Neural Network for Six-Class-Classification of Alzheimer's Disease Stages Based on MRI Images}, series = {IWANN2021}, booktitle = {IWANN2021}, publisher = {Springer International Publishing}, doi = {10.1007/978-3-030-85030-2_1}, pages = {3 -- 14}, year = {2021}, abstract = {State of the art classifiers split Alzheimer's disease progression into a limited number of stages and use a comparatively small database. For the best treatment, it is desirable to have the highest resolution from the progression of the disease. This paper proposes a reliable deep convolutional neural network for the classification of six different Alzheimer's disease stages based on Magnetic Resonance Imaging (MRI). The peculiarity of this paper is the introduction of a new, sixth, disease stage, and the large amount of data that has been taken into account. Additionally, not only the testing accuracy is analyzed, but also the robustness of the classifier to have feedback on how certain the neural network makes its predictions.}, language = {de} } @incollection{JelinekJohannesLavenetal.2014, author = {Jelinek, Moriz and Johannes, G. and Laven, Mathias and Rommel, Werner and Schustereder, Hans-Joachim and Schulze, Lother and Frey, Reinhart}, title = {Deep-Level Defects in High-Dose Proton Implanted and High-Temperature Annealed Silicon}, series = {E. Simoen, C. Claeys, O. Kakatsuka, R. Falster, C. Mazur{\´e} (Editors): High Purity Silicon XIII, ECS Transactions 64(11)}, booktitle = {E. Simoen, C. Claeys, O. Kakatsuka, R. Falster, C. Mazur{\´e} (Editors): High Purity Silicon XIII, ECS Transactions 64(11)}, pages = {173 -- 185}, year = {2014}, language = {en} } @misc{Job2012, author = {Job, Reinhart}, title = {Defect Engineering and Analysis of Light-Ion Implanted Float-Zone Silicon, Seminar, 4.9.2012, Engineering School, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien}, year = {2012}, language = {en} } @article{JobJohannesLavenetal.2012, author = {Job, Reinhart and Johannes, G. and Laven, Franz-Josef and Niedernostheide, Hans-Joachim and Schulze, Holger and Schulze, Werner}, title = {Defect Engineering for Modern Power Devices}, series = {Physica Status Solidi (a)}, volume = {209}, journal = {Physica Status Solidi (a)}, pages = {1940 -- 1949}, year = {2012}, language = {en} } @incollection{HoffmannLoechteRebeletal.2012, author = {Hoffmann, F. and L{\"o}chte, A. and Rebel, G. and Krimphove, C. and Gl{\"o}sek{\"o}tter, P.}, title = {Degradation aware energy storage using hybrid capacitors}, series = {2nd IEEE Energycon Conference \& Exhibition}, booktitle = {2nd IEEE Energycon Conference \& Exhibition}, edition = {September 9-12 2012}, address = {Florence, Italy}, isbn = {978-1-4673-1452-7}, pages = {60}, year = {2012}, language = {mul} } @misc{Job2015, author = {Job, Reinhart}, title = {Dependency on Materials and Resources - How can we Reach a Sustainable Society , Seminar, 29.7.2015, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien}, year = {2015}, language = {en} } @incollection{GloesekoetterProstPachaetal.2001, author = {Gl{\"o}sek{\"o}tter, P. and Prost, W. and Pacha, C. and Kim, S. O. and van Husen, H. and Reimann, T. and Tegude, F.- J. and Goser, K. F.}, title = {Design and Simulation of Pseudo Dynamic Logic Circuits Based on RTBTs}, series = {13th Workshop on Physical Simulation of Semiconductor Devices}, booktitle = {13th Workshop on Physical Simulation of Semiconductor Devices}, edition = {March 25-26}, address = {Ilkley, West Yorkshire, UK}, year = {2001}, language = {en} } @article{PineresEspitiaCamaPintoDeetal.2017, author = {Pineres-Espitia, G. and Cama-Pinto, A. and De, D. and rosa, la and Morron, F. and Estevez, D.}, title = {Design of a low cost weather station for detecting environmental changes}, volume = {Vol. 38}, number = {Revista Espacios}, issn = {0798 1015}, pages = {13}, year = {2017}, language = {en} }