TY - GEN
A1 - Mertens, K.
T1 - „Strom vom eigenen Dach“, DBU Zentrum für Umweltkommunikation, Osnabrück, 11.03.2019
Y1 - 2019
ER -
TY - CHAP
A1 - Mertens, Konrad
T1 - „String-Dunkelkennlinien: Eine neue effiziente Methode zur Anlagenevaluation“, 33. Symposium Photovoltaische Solarenergie, Staffelstein, 27.04.2018
KW - Photovoltaik, Solarstrom
Y1 - 2018
ER -
TY - CHAP
A1 - Mertens, K.
T1 - „String-Dunkelkennlinien-Technik zur Diagnose von PV-Anlagen“, Solarkampagne des Kreises Steinfurt, Betriebs- und Sicherheitstagung der DGS, Berlin, 17.10.2018
Y1 - 2018
ER -
TY - CHAP
A1 - Mertens, K.
T1 - „Status der Photovoltaik“, Tagung „Solarstrahlung - Wirkung, Anwendung, Messung und Simulation“, Deutsche Akademie für Photobiologie und Phototechnologie e.V., Freiburg, 19.05.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Solarstrom von meinem Dach: Wie geht das? Lohnt sich das noch?“, KfW432 Programm zur energetischen Stadtsanierung, Steinfurt, 10.04.2019
Y1 - 2019
ER -
TY - GEN
A1 - Mertens, Konrad
T1 - „Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?“, Solarkampagne des Kreises Steinfurt, Westerkappeln, 25.09.2018
KW - Photovoltaik, Solarstrom, Speicher
Y1 - 2018
ER -
TY - GEN
A1 - Mertens, Konrad
T1 - „Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?“, Solarkampagne des Kreises Steinfurt, Lengerich, 19.09.2018
KW - Photovoltaik, Solarstrom, Speicher
Y1 - 2018
ER -
TY - GEN
A1 - Mertens, Konrad
T1 - „Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?“, Solarkampagne des Kreises Steinfurt, Ladbergen, 10.10.2018
KW - Photovoltaik, Solarstrom, Speicher
Y1 - 2018
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Solarstrom auf meinem Dach - (Wie) geht das?“, Woche der Sonne, Hörstel, 21.06.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Solarenergie und Klimaschutz“, Feierstunde zum Gütesiegel Altbausanierung, Rathaus Münster, 01.04.2019
Y1 - 2019
ER -
TY - GEN
A1 - Mertens, Konrad
T1 - „Photovoltaik: Was ist das? Lohnt sich das noch?“, Fachveranstaltung des Kreis Steinfurt für Klimaschutzmanager, Steinfurt, 08.06.2017
KW - Photovoltaik
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Photovoltaik & Speicher“, Kommunales Energieeffizienz-Netzwerktreffen (KEEN), Hünxe, 06.10.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Photovoltaik & Speicher“, Kommunales Energieeffizienz-Netzwerktreffen (KEEN), Espelkamp, 07.03.2019
Y1 - 2019
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Lohnt sich Solarstrom für mich als Hausbesitzer heute noch?“, Infoveranstaltung des Kreises Steinfurt, Rheine-Dohrenkamp, 16.06.2016
Y1 - 2016
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Lohnt sich Solarstrom für Hausbesitzer heute noch?“, Bad Bentheimer KlimaCafé, Bad Bentheim, 06.02.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Lohnt sich Solarstrom für Hausbesitzer heute noch?“, Aktionstag Klimaschutz, Kreisverwaltung Steinfurt, Steinfurt, 07.07.2016
Y1 - 2016
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Lohnt sich Solarstrom für Hausbesitzer heute noch?“ Infoveranstaltung der Stadt Steinfurt, Steinfurt, 24.06.2016
Y1 - 2016
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Kennlinienbetrachtungen von Solargeneratoren“, Gutachtertreff Suncycle, Isseroda, 23.02.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Ist Ihr Haus solar geDacht?“, Bürger-Veranstaltung des Kreises Steinfurt, Neuenkirchen, 20.06.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Ist Ihr Haus solar geDacht?“, Bürger-Veranstaltung des Kreises Steinfurt, Hörstel, 21.06.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Innovative Untersuchungsmethoden zur Fehleranalyse von Photovoltaikanlagen“, 2. Symposium der Fachhochschule Bielefeld zu Solarcomputing und Interdisziplinärer Forschung für dezentrale, nachhaltige und sichere Energiekonzepte, Minden, 12.09.2016
Y1 - 2016
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Fehleranalyse an Solarmodulen“, Workshop der Deutschen Gesellschaft für Solarenergie, Werne, 31.08.2016
Y1 - 2016
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Die zukünftige Entwicklung der Photovoltaik“,
Bürgerenergie-Vernetzungstreffen, Steinfurt, 07.11.2017
Y1 - 2017
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Aktuelles zur Photovoltaik – Lohnt sich Solarstrom für mich als Hausbesitzer heute noch?“, Volkshochschule Ahlen, Ahlen, 18.05.2016
Y1 - 2016
ER -
TY - GEN
A1 - Mertens, K.
T1 - „Aktuelle Untersuchungen zur String-Dunkelkennlinien-Technik“, pvServe Anwendertreffen, Springe, 11.02.2019
Y1 - 2019
ER -
TY - CHAP
A1 - Müller, Jens
A1 - Brinkmann, Marcus
A1 - Poddebniak, Damian
A1 - Böck, Hanno
A1 - Schinzel, Sebastian
A1 - Smomrosvsky, Juraj
A1 - Schwenk, Jörg
T1 - “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails
T2 - 28th Usenix Security Symposium, Santa Clara, CA, USA
N2 - OpenPGP and S/MIME are the two major standards to en-crypt and digitally sign emails. Digital signatures are sup-posed to guarantee authenticity and integrity of messages. Inthis work we show practical forgery attacks against variousimplementations of OpenPGP and S/MIME email signatureverification in five attack classes: (1) We analyze edge casesin S/MIME’s container format. (2) We exploit in-band sig-naling in the GnuPG API, the most widely used OpenPGPimplementation. (3) We apply MIME wrapping attacks thatabuse the email clients’ handling of partially signed mes-sages. (4) We analyze weaknesses in the binding of signedmessages to the sender identity. (5) We systematically testemail clients for UI redressing attacks.Our attacks allow the spoofing of digital signatures for ar-bitrary messages in 14 out of 20 tested OpenPGP-capableemail clients and 15 out of 22 email clients supportingS/MIME signatures. While the attacks do not target the un-derlying cryptographic primitives of digital signatures, theyraise concerns about the actual security of OpenPGP andS/MIME email applications. Finally, we propose mitigationstrategies to counter these attacks.
Y1 - 2019
UR - https://www.usenix.org/conference/usenixsecurity19/presentation/muller
EP - 18
ER -
TY - JOUR
A1 - Schinzel, Sebastian
A1 - Schmitt, Isabell
T1 - Über Umwege - Seitenkanalangriffe auf Netzwerkanwendungen
JF - iX - Magazin für professionelle Informationstechnik
Y1 - 2012
IS - 11
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Zuverlässigkeitsmechanismen für Eingebettete Systeme
T2 - Proc. Workshop on Zuverlässigkeit in eingebetteten Systemen - Ada Deutschland Tagung
Y1 - 2005
SP - 39
EP - 51
PB - Shaker Verlag
ER -
TY - JOUR
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Zuverlässigkeitsmechanismen für Eingebettete Systeme
JF - GI Softwaretechnik-Trends
Y1 - 2005
VL - 25
IS - 4
SP - 7
EP - 8
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - Wireless Sensor Networks
N2 - Wireless Sensor Networks
Y1 - 2013
U6 - http://dx.doi.org/10.25974/fhms-709
PB - FH Münster
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - Wireless Sensor
N2 - Wireless Sensor
Y1 - 2013
U6 - http://dx.doi.org/10.25974/fhms-712
PB - FH Münster
ER -
TY - GEN
A1 - Mertens, Konrad
T1 - Wie flitzen Daten durch Glasfasern?", Vortrag VDI Schülerforum, Münster, 9.9.2005.
Y1 - 2005
ER -
TY - CHAP
A1 - Poddebniak, Damian
A1 - Ising, Fabian
A1 - Böck, Hanno
A1 - Schinzel, Sebastian
T1 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context
T2 - Proceedings of the 30th USENIX Security Symposium, August 11–13, 2021
N2 - TLS is one of today's most widely used and best-analyzed encryption technologies. However, for historical reasons, TLS for email protocols is often not used directly but negotiated via STARTTLS. This additional negotiation adds complexity and was prone to security vulnerabilities such as naive STARTTLS stripping or command injection attacks in the past.
We perform the first structured analysis of STARTTLS in SMTP, POP3, and IMAP and introduce EAST, a semi-automatic testing toolkit with more than 100 test cases covering a wide range of variants of STARTTLS stripping, command and response injections, tampering attacks, and UI spoofing attacks for email protocols. Our analysis focuses on the confidentiality and integrity of email submission (email client to SMTP server) and email retrieval (email client to POP3 or IMAP server). While some of our findings are also relevant for email transport (from one SMTP server to another), the security implications in email submission and retrieval are more critical because these connections involve not only individual email messages but also user credentials that allow access to a user's email archive.
We used EAST to analyze 28 email clients and 23 servers. In total, we reported over 40 STARTTLS issues, some of which allow mailbox spoofing, credential stealing, and even the hosting of HTTPS with a cross-protocol attack on IMAP. We conducted an Internet-wide scan for the particularly dangerous command injection attack and found that 320.000 email servers (2% of all email servers) are affected. Surprisingly, several clients were vulnerable to STARTTLS stripping attacks. In total, only 3 out of 28 clients did not show any STARTTLS-specific security issues. Even though the command injection attack received multiple CVEs in the past, EAST detected eight new instances of this problem. In total, only 7 out of 23 tested servers were never affected by this issue. We conclude that STARTTLS is error-prone to implement, under-specified in the standards, and should be avoided.
Y1 - 2021
UR - https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak
SN - 978-1-939133-24-3
VL - 2021
ER -
TY - CHAP
A1 - Müller, Jens
A1 - Brinkmann, Marcus
A1 - Poddebniak, Damian
A1 - Schinzel, Sebastian
A1 - Schwenk, Jörg
T1 - What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption
T2 - 17th International Conference on Applied Cryptography and Network Security (ACNS 2019)
N2 - We show practical attacks against OpenPGP and S/MIMEencryption and digital signatures in the context of email. Instead of tar-geting the underlying cryptographic primitives, our attacks abuse legiti-mate features of the MIME standard and HTML, as supported by emailclients, to deceive the user regarding the actual message content. Wedemonstrate how the attacker can unknowingly abuse the user as a de-cryption oracle by replying to an unsuspicious looking email. Using thistechnique, the plaintext of hundreds of encrypted emails can be leakedat once. Furthermore, we show how users could be tricked into signingarbitrary text by replying to emails containing CSS conditional rules.An evaluation shows that "out of" OpenPGP-capable email clients,as well as "out of" clients supporting S/MIME, are vulnerable to atleast one attack. We provide different countermeasures and discuss theiradvantages and disadvantages.
Y1 - 2019
SP - 1
EP - 18
ER -
TY - GEN
A1 - Job, Reinhart
A1 - Ungru, Kathrin
T1 - What seems to be the trouble with energy and resources?, eingeladener Vortrag, 3.3.2017, Universidade Federal do Rio Grande do Norte (UFRN), Natal, Brasilien
Y1 - 2017
ER -
TY - GEN
A1 - Job, Reinhart
T1 - What is our problem with energy and resources, Seminar, 7.11.2018, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien
Y1 - 2018
ER -
TY - GEN
A1 - Job, Reinhart
T1 - What is our problem with energy and resources, Seminar, 13.9.2017, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien
Y1 - 2017
ER -
TY - JOUR
A1 - Weinrank, Felix
A1 - Becke, Martin
A1 - Flohr, Julius
A1 - Erwin, P.
A1 - Rathgeb, Irene
A1 - Rüngeler, Michael
T1 - WebRTC Data Channels
JF - IEEE Communications Standards Magazine
Y1 - 2017
SN - 2471-2825
VL - 1
IS - 2
SP - 28
EP - 35
ER -
TY - CHAP
A1 - Krimphove, C.
A1 - Hoffmann, F.
A1 - Rebel, G.
A1 - Glösekötter, P.
T1 - Wearout-Free Oxygen Sensor (published and awarded with the Bronze Leaf Certificate)
T2 - 8th Conference on Ph.D. Research in Microelectronics & Electronics
Y1 - 2012
SN - 978-3-8007-3442-9
CY - Aachen, Germany
ET - 12 - 15 Juni 2012
ER -
TY - CHAP
A1 - Schmitt, Isabell
A1 - Schinzel, Sebastian
T1 - WAFFle: Fingerprinting Filter Rules of Web Application Firewalls
T2 - 6th USENIX Workshop on Offensive Technologies (WOOT 2012)
Y1 - 2012
SP - 34
EP - 40
CY - Seattle.
ER -
TY - RPRT
A1 - Annas, Sven
A1 - Jantzen, Hans-Arno
A1 - Scholz, Jürgen
A1 - Glösekötter, Peter
A1 - Wetter, Christof
T1 - Vorhabensbezeichnung: IngenieurNachwuchs2014: Ein neues Entwicklungswerkzeug für die Optimierung von Rührsystemen in Biogas-Fermentern unter Einsatz der Wireless Sensor Networks (WSN)-Technik in Kombination mit CFD : Schlussbericht : Berichtszeitraum: 01.11.2014 bis 31.12.2018
KW - Rührwerkoptimierung
Y1 - 2019
UR - https://www.tib.eu/de/suchen/download/?tx_tibsearch_search%5Bdocid%5D=TIBKAT%3A1672326753&cHash=cc52271c2cd6579c95da17f00a67ad3c#download-mark
U6 - http://dx.doi.org/10.2314/KXP:1672326753
ER -
TY - JOUR
A1 - Horbelt, Renate
A1 - Giso, Hahn
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Void formation in PERC solar cells and their impact on the electrical cell parameters verified by luminescence and scanning acoustic microscope measurements
JF - Energy Proceedia
Y1 - 2015
U6 - http://dx.doi.org/10.1016/j.egypro.2015.12.294
VL - 84
SP - 47
EP - 55
ER -
TY - JOUR
A1 - Mertens, K.
T1 - Visikid - Kindgerechte Visualisierung der Energieerträge von Photovoltaikanlagen
JF - Zeitschrift Sonnenenergie
Y1 - 2009
IS - Mai-Juni
SP - 38
EP - 40
ER -
TY - CHAP
A1 - Gonzalez, Jesús
A1 - Penalver, Miguel
T1 - Vi Edición De Las Jornadas De Computacion Empotrada (JCE 2015)
Y1 - 2015
SN - 978-84-16017-54-6
PB - Pedro del Río Obejo (Copisterías Don Folio)
ER -
TY - CHAP
A1 - Mertens, Konrad
A1 - Lindenbaum, Josef
T1 - Universeller Messadapter für die Soundkarte
T2 - Rahman Jamal, Ronald Heinze Virtuelle Instrumente in der Praxis 2010
Y1 - 2010
SN - 978-3-8007-3235-7
SP - 493
EP - 499
PB - Huethig GmbH
CY - Berlin
ET - 1
ER -
TY - BOOK
A1 - Schinzel, Sebastian
T1 - Unintentional and Hidden Information Leaks in Networked Software Applications
Y1 - 2012
SP - 1
EP - 103
CY - University of Erlangen-Nuernberg
ET - Dissertation
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - Ultimas tendencias en sistemas empotrados
N2 - Ultimas tendencias en sistemas empotrados
Y1 - 2013
U6 - http://dx.doi.org/10.25974/fhms-710
PB - FH Münster
ER -
TY - CHAP
A1 - Weinrank, Felix
A1 - Tüxen, Michael
T1 - Transparent flow mapping for NEAT
T2 - Proceedings of the 2017 IFIP Networking Conference
Y1 - 2017
SN - 978-3-901882-94-4
SP - 1
EP - 6
CY - Stockholm
ER -
TY - CHAP
A1 - Albercht, C.
A1 - Koch, R.
A1 - Piontek, T.
A1 - Glösekötter, P.
T1 - Towards a Flexible Fault-Tolerant System-on-Chip
T2 - 22nd Int. Conf. on Architecture of Computing Systems
Y1 - 2009
SN - 978-3-642-00453-7
CY - Delft
ET - March 10-13
ER -
TY - JOUR
A1 - Pacha, C.
A1 - Auer, U.
A1 - Burwick, C.
A1 - Glösekötter, P.
A1 - Brennemann, A.
A1 - Prost, W.
A1 - Tegude, F. J.
A1 - Goser, K. F.
T1 - Thresold Logic Circuit Design of Parallel Adders Using Resonant Tunneling Devices
JF - IEEE Transactions on Very Larg Scale Integration (VLSI) Systems
Y1 - 2000
VL - October
SP - 558
EP - 572
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Pacha, C.
A1 - Goser, K. F.
T1 - Threshold Logic Circuit Design using the RTBT
T2 - Kleinheubacher Berichte
Y1 - 2000
ET - Sept. 25-29
ER -
TY - JOUR
A1 - Feldmeier, A.
A1 - Glösekötter, P.
T1 - Thermostatventil 2.0 - Energieautarke funkgesteuerte Stellantriebe und dadurch mögliche neuartige Regelkonzepte
JF - TAB Technik am Bau
Y1 - 2010
SN - 0341-2032
SP - 70
EP - 73
ET - 10
ER -
TY - CHAP
A1 - Johannes, G.
A1 - Laven, Reinhart
A1 - Job, Hans-Joachim
A1 - Schulze, Franz-Josef
A1 - Niedernostheide, Werner
A1 - Schustereder, Lothar
T1 - The Thermal Budget of Hydrogen-related Donor Profiles: Diffusion-limited Activation and Thermal Dissociation
T2 - E. Simoen, C. L. Claeys, P. Stallhofer, R. Falster, C. Mazuré (Editors): High Purity Silicon 12, ECS Transactions 50(5)
Y1 - 2012
SP - 161
EP - 175
ER -
TY - CHAP
A1 - Völker, Timo
A1 - Tüxen, Michael
A1 - Rathgeb, Erwin Paul
T1 - The Search of the Path MTU with QUIC
T2 - Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC
N2 - A data sender in an IP based network is only capable to efficiently use a network path if it knows the packet size limit of the path, i.e., the Path Maximum Transmission Unit (PMTU). The IETF recently specified a PMTU discovery framework for transport protocols like QUIC. This paper complements this specification by presenting a search algorithm. In addition, it defines several metrics and shows results of analyses for the algorithm with various PMTU candidate sequences using these metrics. We integrated the PMTU discovery with our algorithm into a QUIC simulation model. This paper describes the integration and presents measurements obtained by simulations.
KW - Path MTU Discovery
KW - Search Algorithm
KW - Simulation
KW - Transport Protocol
KW - QUIC
Y1 - 2021
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-149656
SN - 9781450391351
SP - 22
EP - 28
PB - Association for Computing Machinery
CY - New York, NY, USA
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - The Effect of Hardware Platform Selection on Safety-Critical Software in Embedded Systems: Empirical Evaluations
T2 - Proc. IEEE Symposium on Industrial Embedded Systems (SIES 07)
Y1 - 2007
U6 - http://dx.doi.org/10.1109/SIES.2007.4297320
SP - 78
EP - 85
PB - IEEE
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Wilking, D.
A1 - Kowalewski, S.
T1 - The effect of diverse hardware platforms on N-version programming in embedded systems - an empirical evaluation
T2 - Proc. of the 3rd. Workshop on Dependable Embedded Sytems (WDES 06), 2006, vol. TR 105/2006
Y1 - 2006
SP - 61
EP - 66
PB - Vienna University of Technology
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Testing Issues in Empirical Reliability Evaluation of Embedded Real-Time Systems
T2 - Proc. IEEE Real-Time and Embedded Technology and Applications Symposium, WiP session (RTAS 07), vol. Technical Report WUCSE-2007-17
Y1 - 2007
SP - 48
EP - 51
PB - Washington University in St. Louis
ER -
TY - CHAP
A1 - Horbelt, Renate
A1 - Herguth, Axel
A1 - Hahn, Giso
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Temperature Dependence of Void Formation in PERC Cells and their Spatially Resolved Detection by Combining Scanning Acoustic Microscopy and Electroluminescence Measurements
T2 - Proceedings of the 29th European Photovoltaic Solar Energy Conference and Exhibition
Y1 - 2014
SP - 427
EP - 432
ER -
TY - CHAP
A1 - Jargstorf, Johannes
A1 - Job, Reinhart
T1 - Technical and Commercial Aspects of Battery Systems for Electric Mobility
T2 - Proceedings "3rd European Conference Smart Grids and E-Mobility 2011"
Y1 - 2011
SN - 978-3-941785-73-1
PB - Ostbayerisches Technologie-Transfer-Institut (OTTI) e.V.
CY - Regensburg
ET - 1
ER -
TY - CHAP
A1 - Salewski, Falk
A1 - Schmidt, Rainer
T1 - Teaching Industrial Automation: An Approach for a Practical Lab Course
T2 - Proc. of the Workshop on Embedded and Cyber-Physical Systems Education (WESE 2015)
Y1 - 2015
SN - 978-1-4503-3897-4
U6 - http://dx.doi.org/10.1145/2832920.2832921
SP - 1
EP - 7
PB - ACM
CY - Amsterdam, Netherlands
ER -
TY - GEN
A1 - Job, Reinhart
A1 - Ungru, Kathrin
T1 - Teaching Informatics, Workshop, 6.3.2017, Instituto Federal Rio Grande do Norte (IFRN), Natal, Brasilien
Y1 - 2017
ER -
TY - GEN
A1 - Job, Reinhart
A1 - Ungru, Kathrin
T1 - Teaching Electrochemical Energy Storage for Undergraduate Electrical Engineers, Workshop, 7.3.2017, Instituto Federal Rio Grande do Norte (IFRN), Natal, Brasilien
Y1 - 2017
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Taylor, A.
T1 - Systematic Considerations for the Application of FPGAs in Industrial Applications
T2 - Proc. Industrial Electronics 2008 (ISIE 08)
Y1 - 2008
SP - 2009
EP - 2015
ER -
TY - GEN
A1 - Job, Reinhart
T1 - Systemakkreditierung aus der Sicht eines Dekans, eingeladener Vortrag, 27.04.2015, HS Koblenz
Y1 - 2015
ER -
TY - JOUR
A1 - Mertens, K.
T1 - Strom von der Sonne - Photovoltaik
JF - Wirtschaft Münsterland
Y1 - 2009
IS - 1
SP - 26
EP - 29
ER -
TY - GEN
A1 - Stewart, R.
A1 - Tüxen, M.
A1 - Loreto, S.
A1 - Seggelmann, R.
T1 - Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol
BT - November 2017
Y1 - 2017
U6 - http://dx.doi.org/10.17487/RFC8260
SN - 2070-1721
N1 - RFC 8260
ER -
TY - JOUR
A1 - Dreibholz, T.
A1 - Rüngeler, I.
A1 - Seggelmann, R.
A1 - Tüxen, M.
A1 - Rathgeb, E.
A1 - Stewart, R.
T1 - Stream Control Transmission Protocol: Past, Current, and Future Standardization Activities
JF - IEEE Communications Magazine
Y1 - 2011
VL - 49
IS - 4
SP - 82
EP - 88
ER -
TY - GEN
A1 - Stewart, R.
A1 - Tüxen, M.
A1 - Proshin, M.
T1 - Stream Control Transmission Protocol: Errata and Issues in RFC 4960
N2 - This document is a compilation of issues found since the publication of RFC 4960 in September 2007, based on experience with implementing, testing, and using the Stream Control Transmission Protocol (SCTP) along with the suggested fixes. This document provides deltas to RFC 4960 and is organized in a time-ordered way. The issues are listed in the order in which they were brought up. Because some text is changed several times, the last delta in the text is the one that should be applied. In addition to the deltas, a description of each problem and the details of the solution for each are also provided.
Y1 - 2019
U6 - http://dx.doi.org/10.17487/RFC8640
ER -
TY - JOUR
A1 - Seggelmann, R.
A1 - Tüxen, M.
A1 - Rathgeb, E.
T1 - Strategies to Secure End-to-End Communication - And Their Application to SCTP-Based Communication
JF - PIK - Praxis der Informationsverarbeitung und Kommunikation
Y1 - 2011
VL - 34
IS - 4
ER -
TY - CHAP
A1 - Estevez, F.
A1 - Gonzales, J.
A1 - Glösekötter, P.
A1 - Valenzuela, O.
A1 - Rojas, I.
T1 - Statistical Analysis of the Main Configuration Parameters of the Network Dynamic and Adaptive Radio Protocol (DARP)
Y1 - 2017
U6 - http://dx.doi.org/10.3390/s17071502
PB - Sensors
CY - Basel
ET - 17(7)
ER -
TY - CHAP
A1 - Löchte, A.
A1 - Heming, D.
A1 - Kallis, K. T.
A1 - Glösekötter, P.
T1 - State of Health Estimation of Zinc Air Batteries Using Neural
T2 - Advancen in Computational Intelligence
Y1 - 2017
SN - 978-3-319-59152-0
U6 - http://dx.doi.org/10.1007/978-3-319-59153-7_55
SP - 641
EP - 647
PB - Springer International Publishing AG
ER -
TY - JOUR
A1 - Löchte, Andre
A1 - Gebert, Ole
A1 - Heming, Daniel
A1 - Sanders, Tilmann
A1 - Glösekötter, Peter
T1 - State of Charge estimation of zinc air batteries using electrochemical impedance spectroscopy
JF - Neural Computing and Applications
Y1 - 2018
VL - 2018
SP - 1
EP - 9
PB - Springer
ER -
TY - CHAP
A1 - Löchte, Andre
A1 - Gebert, Ole
A1 - Horsthemke, Ludwig
A1 - Heming, Daniel
A1 - Glösekötter, Peter
T1 - State of Charge Depended Modeling of an Equivalent Circuit of Zinc Air Batteries Using Electrochemical Impedance Spectroscopy
T2 - International Conference on Time Series and Forecasting: Proceedings of Papers, 19-21 September 2018, Granada (Spain)
N2 - Metal air batteries provide a high energy density as the ca-thodic reaction uses the surrounding air. Different metals can be usedbut zinc is very promising due to its disposability and nontoxic behav-ior. State estimation is quite complicated as the voltage characteristicof the battery is rather flat. Especially estimating the state of chargeis important as a secondary electrolysis process during overcharging canlead to an unsafe state. Another technique for state estimation is theelectrochemical impedance spectroscopy. Therefore, this paper describesthe process of setup and measuring a time series of impedance spectraat known states of charge. Then these spectra are used to derive anequivalent circuit. Finally the development of the circuit’s parameter areanalyzed to extract most important parameters.
Y1 - 2018
SN - 978-84-17293-57-4
SP - 625
EP - 636
ER -
TY - CHAP
A1 - Löchte, Andre
A1 - Gebert, Ole
A1 - Heming, Daniel
A1 - Kallis, Klaus
A1 - Glösekötter, Peter
ED - Springer, Axel
T1 - State estimation of zinc air batteries using neural networks
T2 - IWANN 2017: Advances in Computational Intelligence
N2 - The main task of battery management systems is to keep the working area of the battery in a safe state. Estimation of the state of charge and the state of health is therefore essential. The traditional way uses the voltage level of a battery to determine those values. Modern metal air batteries provide a flat voltage characteristic which necessitates new approaches. One promising technique is the electrochemical impedance spectroscopy, which measures the AC resistance for a set of different frequencies. Previous approaches match the measured impedances with a nonlinear equivalent circuit, which needs a lot of time to solve a nonlinear least-squares problem. This paper combines the electrochemical impedance spectroscopy with neural networks to speed up the state estimation using the example of zinc air batteries. Moreover, these networks are trained with different subsets of the spectra as input data in order to determine the required number of frequencies.
Y1 - 2018
U6 - http://dx.doi.org/10.1007/s00521-018-3705-9
SN - 0941-0643
VL - 2018
SP - 1
EP - 9
ER -
TY - CHAP
A1 - Saatjohann, Christoph
A1 - Ising, Fabian
A1 - Krings, Luise
A1 - Schinzel, Sebastian
T1 - STALK: security analysis of smartwatches for kids
T2 - ARES 2020: The 15th International Conference on Availability, Reliability and Security / Editors: Melanie Volkamer, Christian Wressnegger
N2 - Smart wearable devices become more and more prevalent in the age of the Internet of Things. While people wear them as fitness trackers or full-fledged smartphones, they also come in unique versions as smartwatches for children. These watches allow parents to track the location of their children in real-time and offer a communication channel between parent and child.
In this paper, we analyzed six smartwatches for children and the corresponding backend platforms and applications for security and privacy concerns. We structure our analysis in distinct attacker scenarios and collect and describe related literature outside academic publications. Using a cellular network Man-in-the-Middle setup, reverse engineering, and dynamic analysis, we found several severe security issues, allowing for sensitive data disclosure, complete watch takeover, and illegal remote monitoring functionality.
KW - Security
KW - Privacy
Y1 - 2020
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-123548
SN - 978-1-4503-8833-7
SP - 1
EP - 10
ER -
TY - JOUR
A1 - Mertens, K.
T1 - Solarstromspeicher für Photovoltaikanlagen - Privathaushalte
JF - CHANC/GE - 100 % Klimaschutz kommunal
Y1 - 2014
IS - 1
SP - 21
EP - 24
ER -
TY - JOUR
A1 - Mertens, K.
T1 - Solarstromspeicher für Photovoltaikanlagen - Gewerbebetriebe
JF - CHANC/GE - 100 % Klimaschutz kommunal
Y1 - 2014
IS - 2
SP - 26
EP - 28
ER -
TY - GEN
A1 - Alberecht, C.
A1 - Glösekötter, P.
T1 - SoC Reliability, published at Diskussionskreis Fehlertoleranz, http://dc.informatik.uni-essen.de/group/all/research/ft-kreis2.html, Essen, October 30-31
Y1 - 2009
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - Silicon nanoelectronics and mobile broadband wireless technologies, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, March
Y1 - 2005
ER -
TY - JOUR
A1 - Schinzel, Sebastian
T1 - Side Channel Attacks: Error messages and verbose log entries can tip off intruders
JF - LINUX Magazine
Y1 - 2012
IS - #143
ER -
TY - CHAP
A1 - Saatjohann, Christoph
A1 - Ising, Fabian
A1 - Gierlings, Matthias
A1 - Noss, Dominik
A1 - Schimmler, Sascha
A1 - Klemm, Alexander
A1 - Grundmann, Leif
A1 - Frosch, Tilman
A1 - Schinzel, Sebastian
T1 - Sicherheit medizintechnischer Protokolle im Krankenhaus
T2 - SICHERHEIT 2022. Hrsg. Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltan Mann
N2 - Medizinische Einrichtungen waren in den letzten Jahren immer wieder von Cyber-Angriffen betroffen. Auch wenn sich diese Angriffe derzeit auf die Office-IT-Infrastruktur der Einrichtungen konzentrieren, existiert mit medizinischen Systemen und Kommunikationsprotokollen eine weitere wenig beachtete Angriffsoberfläche.
In diesem Beitrag analysieren wir die weit verbreiteten medizintechnischen Kommunikations-Protokolle DICOM und HL7 sowie Protokoll-Implementierungen auf ihre IT-Sicherheit. Dafür präsentieren wir die Ergebnisse der Sicherheitsanalyse der DICOM- und HL7-Standards, einen Fuzzer “MedFUZZ” für diese Protokolle sowie einen Schwachstellenscanner “MedVAS”, der Schwachstellen in medizintechnischen Produktivumgebungen auffinden kann.
Y1 - 2022
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-150072
SN - 978-3-88579-717-3
SN - 1617-5468
PB - Gesellschaft für Informatik e.V.
CY - Bonn
ER -
TY - CHAP
A1 - Wiegenstein, Andreas
A1 - Schumacher, Markus
A1 - Schinzel, Sebastian
A1 - Weidemann, Frederik
T1 - Sichere ABAP-Programmierung
T2 - Rheinwerk Verlag GmbH
Y1 - 2009
SN - 978-3-8362-1357-8
SP - 1
EP - 372
ER -
TY - GEN
A1 - Schulze, Hans-Joachim
A1 - Niedernostheide, Franz-Josef
A1 - Job, Reinhart
T1 - Semiconductor device having two monocrystalline semiconductor regions with a different lattice constant and a strained semiconductor region between, United States Patent
BT - Nov. 18
Y1 - 2014
N1 - US008889531B2
ER -
TY - GEN
A1 - Schulze, Hans-Joachim
A1 - Niedernostheide, Franz-Josef
A1 - Job, Reinhart
T1 - Semiconductor body with strained region, United States Patent
BT - May 10
Y1 - 2012
N1 - US2012011242A1
ER -
TY - GEN
A1 - Schulze, Hans-Joachim
A1 - Niedernostheide, Franz-Josef
A1 - Job, Reinhart
T1 - Semiconductor body with strained region, Chinesisches Patent
BT - Apr. 11
Y1 - 2012
N1 - CN102412259A
ER -
TY - JOUR
A1 - Schinzel, Sebastian
T1 - Seitenkanäle mit Untiefen: Manche Webanwendungen spielen Angreifern unfreiwillig Informationen zu
JF - ADMIN Magazin
Y1 - 2012
ER -
TY - CHAP
A1 - Schinzel, Sebastian
A1 - Schmucker, Martin
A1 - Ebinger, Peter
T1 - Security mechanisms of a legal peer-to-peer file sharing system (http://www.iadis.net/dl/Search_list_open.asp?code=6365)
T2 - IADIS International Journal on Computer Science and Information Systems
Y1 - 2009
ER -
TY - CHAP
A1 - Ebinger, Peter
A1 - Schinzel, Sebastian
A1 - Schmuckler, Martin
T1 - Security mechanisms of a legal peer-to-peer file sharing system
T2 - IADIS International Conference Applied Computing
Y1 - 2008
ER -
TY - CHAP
A1 - Weinrank, F.
A1 - Rüngeler, I.
A1 - Tüxen, M.
A1 - Rathgeb, E. P.
T1 - SCTP User Message Interleaving - Integration and Validation
T2 - Proceedings of the 3rd OMNeT++ Community Summit
Y1 - 2016
CY - Brno
ER -
TY - JOUR
A1 - Schinzel, Sebastian
A1 - Weidemann, Frederik
A1 - Wiegenstein, Andreas
A1 - Schumacher, Markus
T1 - SAP-Security - Sicherheitslöcher in eigenem ABAP-Code stopfen
JF - iX - Magazin für professionelle Informationstechnik
Y1 - 2011
IS - 07
ER -
TY - JOUR
A1 - Seuter, Pfeiffer
A1 - Bauer, Zentgraf
T1 - Running with Technology: Evaluating the Impact of Interacting with Wearable Devices on Running Movement
JF - Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Y1 - 2017
SN - 2474-9567
VL - 1
IS - 3
ER -
TY - GEN
A1 - Job, Reinhart
T1 - Rohstoff und Nachhaltigkeit - Ist der westliche Lebensstil zukunftsfähig?, Steinfurter Campusdialoge , 8.11.2017, FH Münster
Y1 - 2017
ER -
TY - CHAP
A1 - Meyer, Christopher
A1 - Somorovsky, Juraj
A1 - Weiss, Eugen
A1 - Schwenk, Jörg
A1 - Schinzel, Sebastian
A1 - Tews, Erik
T1 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
T2 - 23rd USENIX Security Symposium (USENIX Security 14)
Y1 - 2014
SN - ISBN 978-1-931971-
SP - 733
EP - -748
PB - USENIX Association
CY - San Diego, CA
ER -
TY - JOUR
A1 - Gierling, Markus
A1 - Saatjohann, Christoph
A1 - Dresen, Christian
A1 - Köbe, Julia
A1 - Rath, Benjamin
A1 - Eckardt, Lars
A1 - Schinzel, Sebastian
T1 - Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk
JF - 86. Jahrestagung und Herztage 2020 der DGK
N2 - Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks.
Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible).
Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks.
Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices.
KW - Cyber Security
KW - Cardiac Implantable Devices
Y1 - 2020
U6 - http://dx.doi.org/10.1007/s00392-020-01621-0
VL - Band 109, Supplement 1, April 2020
SP - 1
EP - 2
ER -
TY - GEN
A1 - Job, Reinhart
T1 - Ressourcen und Umwelt, Ringvorlesung Nachhaltigkeit und Entwicklung, Auftaktvorlesung am 17.4.2012, FH Münster
Y1 - 2012
ER -
TY - GEN
A1 - Job, Reinhart
T1 - Resources and Environment, Seminar, 6.9.2012, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien
Y1 - 2012
ER -
TY - BOOK
A1 - Glösekötter, P.
T1 - Resonanz-Tunneldioden und Heterobipolartransistoren in dynamischen Digitalschaltungen hoher Funktionsdichte
Y1 - 2002
CY - University of Dortmund
ET - Dissertation
ER -
TY - CHAP
A1 - Pacha, C.
A1 - Glösekötter, P.
A1 - Goser, K. F.
A1 - Auer, U.
A1 - Prost, W.
A1 - Tegude, F. J.
T1 - Resonant Tunneling Transistors for Threshold Logic Circuit Applications
T2 - GLS-VLSI - 9th IEEE Great Lakes Symposium on VLSI
Y1 - 1999
SP - 344
EP - 345
CY - Ann Arbor, MI
ET - March 4-6
ER -
TY - CHAP
A1 - Pacha, C.
A1 - Prost, W.
A1 - Tegude, F. J.
A1 - Glösekötter, P.
A1 - Goser, K. F.
T1 - Resonant Tunneling Device Logic: A Circuit Designer's Perspective
T2 - European Conference on Circuit Theory and Design
Y1 - 2001
CY - Espoo, Finland
ET - August 28-31
ER -
TY - JOUR
A1 - Torres, C.
A1 - Glösekötter, P.
T1 - Reliable and energy optimized WSN design for a train application
JF - Journal of Systems Architecture Emerging Applications of Embedded Systems Research Response Time and Energy Consumption of Timing Critical Wireless Sensor Networks
Y1 - 2011
U6 - http://dx.doi.org/10.1016
IS - Volume 57, Issue 10
SP - 896
EP - 904
ER -