TY - JOUR
A1 - Estévez, F. J.
A1 - Castillo-Secilla, J. M.
A1 - Gonzáles, J.
A1 - Olivares, J.
A1 - Glösekötter, P.
T1 - mDARAL: A Multi-Radio Version for the DARAL Routing Algorithm
JF - Sesors (Basel)
Y1 - 2017
U6 - https://doi.org/10.3390/s17020324
VL - Vol. 17 (2)
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Berekovic, M.
A1 - Wirth, G. I.
T1 - NBTI Degradation and Resilient Circuit Design
T2 - Workshop on Impact of Process Variability on Design and Test, held at Design, Automation and Test in Europe Conference
Y1 - 2008
CY - Munich
ET - March 10-14
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - On the Way to Nanoelectronics, Institute of Computer Engineering, University Lübeck, Germany, April 27
Y1 - 2007
ER -
TY - CHAP
A1 - Estevez, F.
A1 - Gonzales, J.
A1 - Glösekötter, P.
A1 - Valenzuela, O.
A1 - Rojas, I.
T1 - Statistical Analysis of the Main Configuration Parameters of the Network Dynamic and Adaptive Radio Protocol (DARP)
Y1 - 2017
U6 - https://doi.org/10.3390/s17071502
PB - Sensors
CY - Basel
ET - 17(7)
ER -
TY - CHAP
A1 - Camargo, V.
A1 - da Silva, M.
A1 - Brusamarello, L.
A1 - Wirth, G.
A1 - Glösekötter, P.
T1 - Modeling the Impact of NBTI on the Reliability of Arithmetic Circuits
T2 - Chip In The Pampa SBCCI
Y1 - 2008
ET - September 1-4, SFORU
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - Silicon nanoelectronics and mobile broadband wireless technologies, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, March
Y1 - 2005
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Pacha, C.
A1 - Goser, K. F.
T1 - Threshold Logic Circuit Design using the RTBT
T2 - Kleinheubacher Berichte
Y1 - 2000
ET - Sept. 25-29
ER -
TY - CHAP
A1 - Jargstorf, Johannes
A1 - Job, Reinhart
T1 - Technical and Commercial Aspects of Battery Systems for Electric Mobility
T2 - Proceedings "3rd European Conference Smart Grids and E-Mobility 2011"
Y1 - 2011
SN - 978-3-941785-73-1
PB - Ostbayerisches Technologie-Transfer-Institut (OTTI) e.V.
CY - Regensburg
ET - 1
ER -
TY - CHAP
A1 - Johannes, G.
A1 - Laven, Reinhart
A1 - Job, W.
A1 - Schustereder, H.-J.
A1 - Schulze, F.- J.
A1 - Niedernostheide, H.
A1 - Schulze, L.
T1 - Conversion Efficiency of Radiation Damage Profiles into Hydrogen-Related Donor Profiles
T2 - W. Jantsch, F. Schäfer (Editors): Gettering and Defect Engineering in Semiconductor Technology XIV (GADEST 2011)
Y1 - 2011
SP - 375
EP - 384
PB - Trans Tech Publications Ltd.
CY - Zürich
ET - 1
ER -
TY - CHAP
A1 - Johannes, G.
A1 - Laven, Reinhart
A1 - Job, Hans-Joachim
A1 - Schulze, Franz-Josef
A1 - Niedernostheide, Werner
A1 - Schustereder, Lothar
T1 - The Thermal Budget of Hydrogen-related Donor Profiles: Diffusion-limited Activation and Thermal Dissociation
T2 - E. Simoen, C. L. Claeys, P. Stallhofer, R. Falster, C. Mazuré (Editors): High Purity Silicon 12, ECS Transactions 50(5)
Y1 - 2012
SP - 161
EP - 175
ER -
TY - GEN
A1 - Job, Reinhart
T1 - Resources and Environment, Seminar, 6.9.2012, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien
Y1 - 2012
ER -
TY - CHAP
A1 - Gerke, Sebastian
A1 - Herguth, Axel
A1 - Brinkmann, Nils
A1 - Hahn, Giso
A1 - Job, Reinhart
T1 - Evaluation of Capacitance-Voltage Spectroscopy by Correlation with Minority Carrier Lifetime Measurements of PECV-Deposited Intrinsic Amorphous Layers
T2 - Proceedings of the 28th European Photovoltaic Solar Energy Conference and Exhibition
Y1 - 2013
SN - 3-936338-33-7
SP - 2600
EP - 2603
ER -
TY - GEN
A1 - Job, Reinhart
T1 - Defect Engineering and Analysis of Light-Ion Implanted Float-Zone Silicon, Seminar, 4.9.2012, Engineering School, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien
Y1 - 2012
ER -
TY - JOUR
A1 - Bauer, Deckert
A1 - Dürr, Hinrichs
T1 - Global solutions to the electrodynamic two-body problem on a straight line
JF - Journal of Applied Mathematics and Physics
Y1 - 2017
SN - 0044-2275
VL - 68
ER -
TY - CHAP
A1 - Müller, Jens
A1 - Ising, Fabian
A1 - Mladenov, Vladislav
A1 - Mainka, Christian
A1 - Schinzel, Sebastian
A1 - Schwenk, Jörg
T1 - Office Document Security and Privacy
T2 - 14th USENIX Workshop on Offensive Technologies (WOOT 2020)
N2 - OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks.
KW - Cyber Security
KW - Open Document Format
KW - docx
Y1 - 2020
UR - https://www.usenix.org/conference/woot20/presentation/muller
PB - USENIX
ER -
TY - CHAP
A1 - Weβeler, Peter
A1 - Kaiser, Benjamin
A1 - te Vrugt, Jürgen
A1 - Lechler, Armin
A1 - Verl, Alexander
T1 - Camera based path planning for low quantity - high variant manufacturing with industrial robots
T2 - 25th International Conference on Mechatronics and Machine Vision in Practice (M2VIP)
N2 - The acquisition costs for industrial robots have been steadily decreasing in past years. Nevertheless, they still face significant drawbacks in the required effort for the preparation of complex robot tasks which causes these systems to be rarely present so far in small and medium-sized enterprises (SME) that focus mainly on small volume, high variant manufacturing. In this paper, we propose a camera-based path planning framework that allows the fast preparation and execution of robot tasks in dynamic environments which leads to less planning overhead, fast program generation and reduced cost and hence overcomes the major impediments for the usage of industrial robots for automation in SMEs with focus on low volume and high variant manufacturing. The framework resolves existing problems in different steps. The exact position and orientation of the workpiece are determined from a 3D environment model scanned by an optical sensor. The so retrieved information is used to plan a collision-free path that meets the boundary conditions of the specific robot task. Experiments show the potential and effectiveness of the the framework presented here by evaluating a case study.
KW - Author Keywords: Industrial robot, Automatic robot programming, SME, low volume, high variant, path planning, matching, machine vision
KW - IEEE Keywords: Solid modeling, Path planning, Three-dimensional displays, Robot kinematics, Pipelines, Task analysis
KW - INSPEC (Controlled Indexing): cameras, collision avoidance, industrial robots, mobile robots, small-to-medium enterprises
KW - INSPEC (Non-Controlled Indexing): high variant manufacturing, industrial robots, complex robot tasks, medium-sized enterprises, camera-based path, planning overhead, fast program generation, collision-free path, specific robot task, SME
Y1 - 2019
UR - https://ieeexplore.ieee.org/document/8600833
SN - 978-1-5386-7544-1
U6 - https://doi.org/10.1109/M2VIP.2018.8600833
SP - 1
EP - 6
PB - IEEE
ER -
TY - JOUR
A1 - Gerke, Sebastian
A1 - Micard, Gabriel
A1 - Job, Reinhart
A1 - Hahn, Giso
A1 - Terheiden, Barbara
T1 - Capacitance-voltage spectroscopy and analysis of dielectric intrinsic amorphous silicon thin films
JF - Physica Status Solidi (c)
Y1 - 2016
U6 - https://doi.org/10.1002/pssc.201600019
SP - 1
EP - 5
ER -
TY - CHAP
A1 - Atkinson, Colin
A1 - Gerbig, Ralph
A1 - Barth, Florian
A1 - Freiling, Felix
A1 - Schinzel, Sebastian
A1 - Hadasch, Frank
A1 - Maedche, Alexander
A1 - Müller, Benjamin
T1 - Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems
T2 - Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2012 IEEE 16th International
Y1 - 2012
U6 - https://doi.org/10.1109/EDOCW.2012.12
SP - 11
EP - 18
ET - 3M4SE 2012
ER -
TY - JOUR
A1 - Horbelt, Renate
A1 - Giso, Hahn
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Void formation in PERC solar cells and their impact on the electrical cell parameters verified by luminescence and scanning acoustic microscope measurements
JF - Energy Proceedia
Y1 - 2015
U6 - https://doi.org/10.1016/j.egypro.2015.12.294
VL - 84
SP - 47
EP - 55
ER -
TY - CHAP
A1 - Willing, Markus
A1 - Dresen, Christian
A1 - Haverkamp, Uwe
A1 - Schinzel, Sebastian
T1 - Analyzing medical device connectivity and its effect on cyber security in german hospitals
N2 - Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
Y1 - 2020
U6 - https://doi.org/10.1186/s12911-020-01259-y
PB - BMC Medical Informatics and Decision Making volume
ER -
TY - JOUR
A1 - Horbelt, Renate
A1 - Micard, Gabriel
A1 - Keller, Phillip
A1 - Hahn, Giso
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Characterization of local Al-contacts by light beam induced current measurements and their verification by 2D simulation using flexPDE
JF - Physica Status Solidi (a)
Y1 - 2016
U6 - https://doi.org/10.1002/pssa.201532753
VL - 213
IS - 5
SP - 1317
EP - 1323
ER -
TY - CHAP
A1 - Goser, K.
A1 - Glösekötter, P.
A1 - Dienstuhl, J.
T1 - Nanoelectronics and Nanosystems - From Transistors to Molecular and Quantum Devices
Y1 - 2004
SN - 3-540-40443-0
PB - Springer
CY - Berlin, Heidelberg, New York
ER -
TY - JOUR
A1 - Gerke, Sebastian
A1 - Becker, Hans-Werner
A1 - Rogalla, Detlef
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Model based prediction of the trap limited diffusion of hydrogen in post-hydrogenated amorphous silicon
JF - Physika Status Solidi (RRL)
Y1 - 2016
U6 - https://doi.org/10.1002/pssr.201600303
SP - 1
EP - 5
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Prost, W.
A1 - Pacha, C.
A1 - Kim, S. O.
A1 - van Husen, H.
A1 - Reimann, T.
A1 - Tegude, F.- J.
A1 - Goser, K. F.
T1 - Pseudo Dynamic Gate Design based on the Resonant-Tunneling-Bipolar-Transistor (RTBT)
T2 - 32nd European Solid-State Device Research Conference (ESSDERC)
Y1 - 2002
CY - Florence, Italy
ET - Sept. 24-26
ER -
TY - BOOK
A1 - Schinzel, Sebastian
T1 - Unintentional and Hidden Information Leaks in Networked Software Applications
Y1 - 2012
SP - 1
EP - 103
CY - University of Erlangen-Nuernberg
ET - Dissertation
ER -
TY - JOUR
A1 - Johannes, G.
A1 - Laven, Moriz
A1 - Jelinek, Reinhart
A1 - Job, Hans-Joachim
A1 - Schulze, Werner
A1 - Schustereder, Stefan
A1 - Kirnstötter, Mathias
A1 - Rommel, Lothar
T1 - DLTS Characterization of Proton Implanted Silicon under Varying Annealing Conditions
JF - Physica Status Solidi (b)
Y1 - 2014
VL - 251
IS - 11
SP - 2189
EP - 2192
ER -
TY - JOUR
A1 - Schinzel, Sebastian
T1 - Side Channel Attacks: Error messages and verbose log entries can tip off intruders
JF - LINUX Magazine
Y1 - 2012
IS - #143
ER -
TY - BOOK
A1 - Salewski, F.
T1 - Empirical Evaluations of Safety-Critical Embedded Systems, PhD Thesis
Y1 - 2008
ER -
TY - CHAP
A1 - Jelinek, Moriz
A1 - Johannes, G.
A1 - Laven, Reinhart
A1 - Job, Werner
A1 - Schustereder, Hans-Joachim
A1 - Schulze, Mathias
A1 - Rommel, Lothar
T1 - A New Method to Increase the Doping Efficiency of Proton Implantation in a High-Dose Regime
T2 - E. Simoen, C. Claeys, O. Kakatsuka, R. Falster, C. Mazuré (Editors): High Purity Silicon XIII, ECS Transactions 64(11)
Y1 - 2014
SP - 199
EP - 208
ER -
TY - CHAP
A1 - Stollenwerk, A.
A1 - Derks, A.
A1 - Kowalewski, S.
A1 - Salewski, Falk
T1 - A Modular, Robust and Open Source Microcontroller Platform for Broad Educational Usage
T2 - Proc. Workshop on Embedded Systems Education (WESE10), Scottsdale, AZ, USA
Y1 - 2010
U6 - https://doi.org/10.1145/1930277.1930285
SP - 48
EP - 54
PB - ACM
ER -
TY - CHAP
A1 - Schinzel, Sebastian
T1 - An Efficient Mitigation Method for Timing Side Channels on the Web
T2 - 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011)
Y1 - 2011
ER -
TY - GEN
A1 - Zimmer, Cordula
A1 - Yoganathan, K.
A1 - Giebel, Friederike
A1 - Luetzenkirchen-Hecht, Dirk
A1 - Klaus, T.
A1 - Peter, Kallis.
T1 - Photoemission properties of LaB6 thin films for the use in PIDs
Y1 - 2014
ER -
TY - GEN
A1 - Yoshida, Akira
A1 - Job, Reinhart
T1 - Cathode ray-luminescent phosphor and method for the preparation thereof, United States Patent
BT - Dec. 5
Y1 - 2000
N1 - US6156233A
ER -
TY - JOUR
A1 - Armoush, A.
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Design Pattern Representation for Safety-Critical Embedded Systems
JF - Journal of Software Engineering and Applications (JSEA)
Y1 - 2009
U6 - https://doi.org/10.4236/jsea.2009.21001
VL - 2
IS - 1
SP - 1
EP - 12
ER -
TY - CHAP
A1 - Schinzel, Sebastian
A1 - Schmucker, Martin
A1 - Ebinger, Peter
T1 - Security mechanisms of a legal peer-to-peer file sharing system (http://www.iadis.net/dl/Search_list_open.asp?code=6365)
T2 - IADIS International Journal on Computer Science and Information Systems
Y1 - 2009
ER -
TY - JOUR
A1 - Seggelmann, R.
A1 - Tüxen, M.
A1 - Rathgeb, E.
T1 - Strategies to Secure End-to-End Communication - And Their Application to SCTP-Based Communication
JF - PIK - Praxis der Informationsverarbeitung und Kommunikation
Y1 - 2011
VL - 34
IS - 4
ER -
TY - JOUR
A1 - Job, Reinhart
A1 - Johannes, G.
A1 - Laven, Franz-Josef
A1 - Niedernostheide, Hans-Joachim
A1 - Schulze, Holger
A1 - Schulze, Werner
T1 - Defect Engineering for Modern Power Devices
JF - Physica Status Solidi (a)
Y1 - 2012
VL - 209
SP - 1940
EP - 1949
ER -
TY - JOUR
A1 - Löchte, A.
A1 - Hoffmann, F.
A1 - Krimphove, C.
A1 - Rebel, G.
A1 - Glösekötter, P.
T1 - Is LiFePO4 Technology Ready for Internet of Things?
JF - Advances in Internet of Things (http://www.scirp.org/journal/ait), http://dx.doi.org/10.4236/ait.2014.41001)
Y1 - 2014
VL - Januar
IS - 4
SP - 1
EP - 4
ER -
TY - CHAP
A1 - Olivares, A.
A1 - Górriz, J. M.
A1 - Olivares, G.
A1 - Ramírez, J.
A1 - Glösekötter, P.
T1 - A Study of Vibration-Based Energy Harvesting in Activities of Daily Living
T2 - 4th International ICST Conference on Pervasive Computing Technologies for Healthcare
Y1 - 2010
CY - Munich, Germany
ET - March
ER -
TY - JOUR
A1 - Johannes, G.
A1 - Laven, Reinhart
A1 - Job, Hans
A1 - Schulze, -Joachim
A1 - Niedernostheide, Franz-Josef
A1 - Schustereder, Werner
A1 - Frey, Lothar
T1 - Activation and Dissociation of Proton-Induced Donor Profiles in Silicon
JF - ECS Journal of Solid State Science and Technology
Y1 - 2013
VL - 2
IS - 9
SP - 389
EP - 394
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Wilking, D.
A1 - Kowalewski, S.
T1 - Diverse hardware platforms in embedded systems lab courses: A way to teach the differences
T2 - Proc. Special Issue: The First Workshop on Embedded System Education (WESE), vol. 2
Y1 - 2005
U6 - https://doi.org/10.1145/1121812.1121825
SP - 70
EP - 74
PB - ACM
ER -
TY - CHAP
A1 - Schreiber-Prillwitz, Wolfgang
A1 - Job, Reinhart
T1 - Development process for MEMS pressure sensors for standarized CMOS read-out circuitry
T2 - 29th Symposium on Integrated Circuits and Systems Design (SBCCI), IEEE Conference Publications
Y1 - 2016
U6 - https://doi.org/10.1109/SBCCI.2016.7724037
SP - 1
EP - 6
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Testing Issues in Empirical Reliability Evaluation of Embedded Real-Time Systems
T2 - Proc. IEEE Real-Time and Embedded Technology and Applications Symposium, WiP session (RTAS 07), vol. Technical Report WUCSE-2007-17
Y1 - 2007
SP - 48
EP - 51
PB - Washington University in St. Louis
ER -
TY - CHAP
A1 - Beckschulze, E.
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications
T2 - Proc. Safety-Critical Systems, 2009 (SAE World Congress 2009), 2009, SAE International
Y1 - 2009
SP - 209
EP - 216
ER -
TY - THES
A1 - Scharlau, Lukas
T1 - Multi-part Nanocubes
N2 - This thesis describes the development of Multi-part Nanocubes. It is a further development of Nanocubes, an in-memory data structure for spatiotemporal data cubes. "Nanocubes provides you with real-time visualization of large datasets. Slice and dice your data with respect to space, time, or some of your data attributes, and view the results in real-time on a web browser over heatmaps, bar charts, and histograms." Partitioning the structure to parallelize the build process as well as merging query results is the principal part of this document. Furthermore, a new memory management (slab allocation with offset pointers) was implemented to enable 32-bit support and faster load times of already built nanocubes. Porting the project to Windows and implementing on-the-fly compression and decompression of nanocube files is also described.
N2 - Diese Bachelorarbeit beschreibt die Weiterentwicklung des Projektes Nanocubes zu Multi-part Nanocubes. Das Projekt erlaubt die Visualisierung und Filterung extrem großer Datensätze (Big Data), üblicherweise auf einer Heatmap mit zusätzlichen Diagramm. Beschrieben wird die Partitionierung der Datenstruktur, wodurch ermöglicht wird, dass moderne Mehrkernprozessoren während des Ausbauprozesses voll ausgelastet werden können. Auch das Zusammenfügen der Abfrageergebnisse ist Teil der Arbeit. Zusätzlich wurde ein neues Speicher Management System (Slab Allocation mit Offset Pointern) implementiert, was die Kompatibilität zu 32-bit Systemen ermöglicht, sowie auch schnellere Ladezeiten von bereits erzeugten und gespeicherten Nanocubes. Die Portierung des Projektes auf Windows als auch die on-the-fly Komprimierung und Dekomprimierung während des Speichern und Laden eines Nanocubes wird beschrieben. (Linux und Mac Betriebssysteme werden auch unterstützt)
KW - Massendaten
KW - Visualisierung
KW - Weltkarte
KW - Filtration
KW - Quaternärbaum
KW - Heatmap
KW - Parallelisation
KW - echtzeit Erkundung
KW - Quadtree
KW - Big Data
KW - Heatmap
KW - Threading
KW - realtime exploration
Y1 - 2016
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-9500
PB - FH Münster
ER -
TY - CHAP
A1 - Schreiber-Prillwitz, Wofgang
A1 - Job, Reinhart
T1 - Improvement of Integrated Pressure Sensor Systems Fabricated by a Combined CMOS- and MEMS-Technology with regard to Low Pressure Ranges
T2 - G. Wirth, N. Morimoto, D. Vasileska (Editors): Microelectronics Technology and Devices - SBMicro 2012, ECS Transactions 49(1)
Y1 - 2012
SP - 417
EP - 424
ER -
TY - CHAP
A1 - Chen, X.
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Concept and Prototyping of a Fault Management Framework for Automotive Safety Relevant Systems
T2 - Proc. Moderne Elektronik im Kraftfahrzeug II
Y1 - 2007
SP - 70
EP - 79
PB - expert-verlag
ER -
TY - CHAP
A1 - Salewski, Falk
T1 - COTS or Custom Made? Design Decisions for Industrial Control Systems
T2 - Proc. of the Eighth International Conference on Advances in Circuits, Electronics and Micro-electronics (CENICS 2015)
Y1 - 2015
SN - 978-1-61208-430-5
SP - 7
EP - 12
PB - IARIA
CY - Venice, Italy
ER -
TY - JOUR
A1 - Salewski, Falk
T1 - COTS or Custom Made? A Multi-Criteria Decision Analysis for Industrial Control Systems
JF - International Journal on Advances in Systems and Measurements
Y1 - 2016
UR - https://www.iariajournals.org/systems_and_measurements/sysmea_v9_n12_2016_paged.pdf
SN - 1942-261x
VL - 9
IS - 1 & 2
SP - 122
EP - 131
ER -
TY - JOUR
A1 - Herguth, Axel
A1 - Horbelt, Renate
A1 - Wilking, Svenja
A1 - Job, Reinhart
A1 - Hahn, Giso
T1 - Comparison of BO Regeneration dynamics in PERC and Al-BSF solar cells
JF - Energy Procedia
Y1 - 2015
U6 - https://doi.org/10.1016/j.egypro.2015.07.012
VL - 77
SP - 75
EP - 82
ER -
TY - JOUR
A1 - Gerke, Sebastian
A1 - Becker, Hans-Werner
A1 - Rogalla, Detlef
A1 - Hahn, Giso
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Morphology and Hydrogen in Passivating Amorphous Silicon Layers
JF - Energy Procedia
Y1 - 2015
U6 - https://doi.org/10.1016/j.egypro.2015.07.112
VL - 77
SP - 791
EP - 798
ER -
TY - CHAP
A1 - Rojas, I.
A1 - Pomares, H.
A1 - Gonzalez, J.
A1 - Glösekötter, P.
A1 - Dienstuhl, J.
A1 - Goser, K. F.
T1 - A new sequential learning algorithm using pseudo-Gaussian functions for neuro-fuzzy systems
T2 - 10th IEEE International Conference on Fuzzy Systems
Y1 - 2001
SP - 1243
EP - 1246
ET - Volume: 3, 2-5 Dez.
ER -
TY - CHAP
A1 - Estevez, F.
A1 - García, A.
A1 - Glösekötter, P.
T1 - An application of people's sentiment from social media to smart cities
Y1 - 2016
PB - El Profesional de la Informacion
ET - Vol. 25, Nr. 6
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Prost, W.
A1 - Pacha, C.
A1 - Kim, S. O.
A1 - van Husen, H.
A1 - Reimann, T.
A1 - Tegude, F.- J.
A1 - Goser, K. F.
T1 - Asynchronous Circuit Design Based on the RTBT Monostable-Bistable-Logic-Transiton-Element (MOBILE)
T2 - 15th Symposium on Integrated Circuits and System Design, Chip in the Pampa
Y1 - 2002
CY - Porto Alegre, RS, Brazil
ET - Sept. 9-14
ER -
TY - GEN
A1 - Tsekoura, Ioanna
A1 - Rebel, Gregor
A1 - Berekovic, Mladen
A1 - Glösekötter, P.
T1 - An evaluation of energy efficient microcontrollers
Y1 - 2014
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Pacha, C.
A1 - Goser, K. F.
T1 - Associative Matrix for Nano-scale Integratd Circuits
T2 - 7th International Conference on Microelectronics for Neural, Fuzzy and Bio-Inspired Systems (MicroNeuro)
Y1 - 1999
SP - 352
EP - 358
PB - IEEE Computer Society Press, Los Alamitos, CA
CY - Granada, Spain
ET - March
ER -
TY - GEN
A1 - Tüxen, M.
A1 - Seggelmann, R.
A1 - Stewart, R.
A1 - Loreto, S.
T1 - Additional Policies for the Partially Reliable Stream Control Transmission Protocol Extension
BT - April 2015
Y1 - 2015
U6 - https://doi.org/10.17487/RFC7496
SN - 2070-1721
N1 - RFC 7496
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - Aspects of Micro- and Nanosystems for Wireless Health Monitoring Applicaitons, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, September
Y1 - 2010
ER -
TY - CHAP
A1 - Rojas, I.
A1 - Anguita, M.
A1 - Pelayo, F. J.
A1 - Glösekötter, P.
A1 - Prieto, A.
T1 - CMOS implementation of RBF Neural Networks using Adaptive Baussian Radial Functions
T2 - Proceedings of the 6th International Conference on Microelectronics for Neural Networks, Evolutionary & Fuzzy Systems (MicroNeuro'97)
Y1 - 1997
CY - Dresden, Germany
ET - September
ER -
TY - CHAP
A1 - Estevez, F.
A1 - Glösekötter, P.
A1 - González, J.
T1 - DARAL: A Dynamic and Adaptive Routing Algorithm for Wireless Sensor Networks
Y1 - 2016
U6 - https://doi.org/10.3390/s16070960
PB - Sensors
CY - Basel
ER -
TY - CHAP
A1 - Meyer, Christopher
A1 - Somorovsky, Juraj
A1 - Weiss, Eugen
A1 - Schwenk, Jörg
A1 - Schinzel, Sebastian
A1 - Tews, Erik
T1 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
T2 - 23rd USENIX Security Symposium (USENIX Security 14)
Y1 - 2014
SN - ISBN 978-1-931971-
SP - 733
EP - -748
PB - USENIX Association
CY - San Diego, CA
ER -
TY - JOUR
A1 - Beckschulze, E.
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications
JF - SAE International Journal of Passenger Cars - Electronic and Electrical Systems
Y1 - 2009
U6 - https://doi.org/10.4271/2009-01-0761
IS - 1
SP - 301
EP - 308
ER -
TY - JOUR
A1 - Dreibholz, T.
A1 - Rüngeler, I.
A1 - Seggelmann, R.
A1 - Tüxen, M.
A1 - Rathgeb, E.
A1 - Stewart, R.
T1 - Stream Control Transmission Protocol: Past, Current, and Future Standardization Activities
JF - IEEE Communications Magazine
Y1 - 2011
VL - 49
IS - 4
SP - 82
EP - 88
ER -
TY - GEN
A1 - Estevez, Francisco
A1 - Rebel, Gregor
A1 - Jose, M.
A1 - Castillo-Secilla, Jesús
A1 - Gonzáles, Peter
T1 - Cognitive Radio as solution for Saturation Problem in Wireless Sensor Networks: A survey of Cognitive Radio policies
Y1 - 2014
ER -
TY - JOUR
A1 - Estévez, F.
A1 - Rebel, G.
A1 - González, J.
A1 - Glösekötter, P.
T1 - DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks
JF - Electronics Letters
Y1 - 2014
VL - 01/2014
ER -
TY - CHAP
A1 - Rebel, G.
A1 - Estevez, F.
A1 - Schulz, I.
A1 - Glösekötter, P.
T1 - Fast Constant Time Memory Allocator for inter Task Communication in Ultra Low Energy Embedded Systems
T2 - 9th Conference on Ph.D. Research in Microelectonics & Electronics
N2 - Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems
Y1 - 2013
SN - 978-1-4673-4580-4
U6 - https://doi.org/10.25974/fhms-708
SP - 149
PB - IEEE
ER -
TY - GEN
A1 - Glösekötter, P.
T1 - From Transistors to Molecular and Quantum Devices?, invited TechTalk on Information Processing Technologies at Intel Corp. Braunschweig, Germany, September 18
Y1 - 2009
ER -
TY - CHAP
A1 - Mertens, K.
T1 - "Do Photovoltaics make sense in countries like Germany?", Invited Paper zur 7th International Energy and Sustainability Confrerence, Cologne Institute for Renewable Energy CIRE der TH Köln, 17.05.2018, Köln
Y1 - 2018
ER -
TY - JOUR
A1 - Pineres-Espitia, G.
A1 - Cama-Pinto, A.
A1 - De, D.
A1 - rosa, la
A1 - Morron, F.
A1 - Estevez, D.
T1 - Design of a low cost weather station for detecting environmental changes
Y1 - 2017
SN - 0798 1015
VL - Vol. 38
IS - Revista Espacios
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Pacha, C.
A1 - Goser, K. F.
T1 - Design of Arithmetic Circuits Using the RTBT
T2 - ITG-Fachbericht 162, Mikroelektronik für die Informationstechnik
Y1 - 2000
SN - 3-8007-2586-X
SP - 147
EP - 150
ET - Nov. 20-21
ER -
TY - CHAP
A1 - Völker, Timo
A1 - Tüxen, Michael
T1 - Packet Too Big Detection and its Integration into QUIC
T2 - 2023 16th International Conference on Signal Processing and Communication System (ICSPCS)
N2 - A communication over an Internet Protocol (IP) based network fails if an endpoint sends packets that are too big to reach their destination and if the sender is unable to detect that. The node on the path that drops these packets should respond with a Packet Too Big (PTB) message. However, multiple scenarios exist in which the sender will not receive a PTB message. Even if it does, it refrains from using the information in case it suspects that a potential attacker forged the message. In particular, we are not aware of any implementation of the secure transport protocol QUIC (e.g., used by HTTP/3) that processes PTB messages. In this paper, we present a novel parameterizable PTB detection algorithm for reliable transport protocols that does not depend on PTB messages. We further describe how to integrate our algorithm into QUIC, present results from an evaluation using the algorithm within a QUIC simulation model and, based on these results, suggest concrete parameter values.
KW - PMTUD
KW - PTB
KW - black hole
KW - transport protocol
KW - QUIC
Y1 - 2023
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-174119
SN - 979-8-3503-3351-0
PB - IEEE
CY - New York, NY, USA
ER -
TY - CHAP
A1 - Jelinek, Moriz
A1 - Johannes, G.
A1 - Laven, Naveen
A1 - Ganagona, Goud
A1 - Job, Reinhart
A1 - Schustereder, Werner
A1 - Schulze, Hans-Joachim
A1 - Rommel, Matthias
A1 - Frey, Lothar
T1 - Metastable Defects in Proton Implanted and Annealed Silicon
T2 - P. Pichler (Editor): Gettering and Defect Engineering in Semiconductor Technology XVI (GADEST 2015)
Y1 - 2016
SN - 978-3-03835-608-0
SP - 169
EP - 174
PB - Trans Tech Publications Ltd.
CY - Zürich
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Pacha, C.
A1 - Goser, K. F.
A1 - Wirth, G. I.
A1 - Prost, W.
A1 - Auer, U.
A1 - Agethen, M.
A1 - Tegude, F. J.
T1 - Digital Circuit Design Based on the Resonant-Tunneling-Hetero-Junction-Bipolar-Transistor
T2 - SBCCI
Y1 - 2000
CY - Manaus, Brasil
ET - Sept. 18-24
ER -
TY - CHAP
A1 - Rebel, G.
A1 - Estevez, F.
A1 - Schulz, I.
A1 - Glösekötter, P.
T1 - Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems
T2 - 9th Conferrence on Ph.D. Research in Microelectronics & Electronics
Y1 - 2013
SN - 978-1-4673-4580-4
U6 - https://doi.org/10.1109
SP - 149
EP - 152
PB - Villach, Austria
ET - 24th - 27th June 201
ER -
TY - JOUR
A1 - Estévez, F.
A1 - García, J. M.
A1 - Secilla-Castillo, J. M.
A1 - González, J.
A1 - Glösekötter, P.
T1 - Enabling validation of the IEEE 802.15.4 performance through a new dual-radio OMNeT++ model
JF - Elektronika IR Electrotechnika Date: Accepted - Pending of Publication
Y1 - 2016
SN - 1392-1215
VL - Vol. 22, No 3
IS - Impact Factor: 0.561
ER -
TY - CHAP
A1 - Ising, Fabian
A1 - Poddebniak, Damian
A1 - Kappert, Tobias
A1 - Saatjohann, Christoph
A1 - Schinzel, Sebastian
T1 - Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption
T2 - 32nd USENIX Security Symposium (USENIX Security 23)
N2 - S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case?
In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent network patterns when opened in a victim’s email client.
We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation.
Y1 - 2023
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-183333
UR - https://www.usenix.org/conference/usenixsecurity23/presentation/ising
SN - 978-1-939133-37-3
PB - USENIX Association
ER -
TY - CHAP
A1 - Puschner, Endres
A1 - Saatjohann, Christoph
A1 - Willing, Markus
A1 - Dresen, Christian
A1 - Köbe, Julia
A1 - Rath, Benjamin
A1 - Paar, Christof
A1 - Eckardt, Lars
A1 - Haverkamp, Uwe
A1 - Schinzel, Sebastian
T1 - Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
T2 - ARES 2021: The 16th International Conference on Availability, Reliability and Security
N2 - Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients’ health.
This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices.
Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients’ rights and companies’ obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem.
Y1 - 2021
U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-139012
ER -
TY - JOUR
A1 - Khademi, Naeem
A1 - Ros, David
A1 - Welzl, Michael
A1 - Bozakov, Zdravko
A1 - Brunstrom, Anna
A1 - Fairhurst, Gorry
A1 - Grinnemo, Karl-Johan
A1 - Hayes, David A.
A1 - Hurtig, Per
A1 - Jones, Tom
A1 - Mangiante, Simone
A1 - Tüxen, Michael
A1 - Weinrank, Felix
T1 - NEAT: A Platform- and Protocol-Independent Internet Transport API
JF - IEEE Communications Magazine
Y1 - 2017
SN - 0163-6804
VL - 55
IS - 6
SP - 46
EP - 54
ER -
TY - CHAP
A1 - Horbelt, Renate
A1 - Herguth, Axel
A1 - Hahn, Giso
A1 - Job, Reinhart
A1 - Terheiden, Barbara
T1 - Temperature Dependence of Void Formation in PERC Cells and their Spatially Resolved Detection by Combining Scanning Acoustic Microscopy and Electroluminescence Measurements
T2 - Proceedings of the 29th European Photovoltaic Solar Energy Conference and Exhibition
Y1 - 2014
SP - 427
EP - 432
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - The Effect of Hardware Platform Selection on Safety-Critical Software in Embedded Systems: Empirical Evaluations
T2 - Proc. IEEE Symposium on Industrial Embedded Systems (SIES 07)
Y1 - 2007
U6 - https://doi.org/10.1109/SIES.2007.4297320
SP - 78
EP - 85
PB - IEEE
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Taylor, A.
T1 - Fault Handling in FPGAs and Microcontrollers in Safety-Critical Embedded Applications: A Comparative Survey
T2 - Proc. 10th Euromicro Conference on Digital System Design (DSD 07)
Y1 - 2007
U6 - https://doi.org/10.1109/DSD.2007.4341459
SP - 124
EP - 131
PB - IEEE
ER -
TY - CHAP
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Exploring the Differences of FPGAs and Microcontrollers for their Use in Safety-Critical Embedded Applications
T2 - Proc. IEEE Symposium on Industrial Embedded Systems (IES 06)
Y1 - 2006
U6 - https://doi.org/10.1109/IES.2006.357483
SP - 1
EP - 4
PB - IEEE
ER -
TY - CHAP
A1 - Glösekötter, P.
A1 - Kanstein, A.
A1 - Jung, S.
A1 - Goser, K. F.
T1 - Implementation of a RBF Network Based on Possibilistic Reasoning, ISSN 1089-6503
T2 - Proceedings of the 24th EUROMICRO conference
Y1 - 1998
SN - 0-8186-8646-4
SP - 677
EP - 682
CY - Västeras, Sweden
ET - August 25-27
ER -
TY - CHAP
A1 - Adhari, H.
A1 - Dreibholz, T.
A1 - Becke, M.
A1 - Rathgeb, E. P.
A1 - Tüxen, M.
T1 - Evaluation of Concurrent Multipath Transfer over Dissimilar Paths
T2 - Proceedings of the 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011)
Y1 - 2011
SN - 978-1-61284-829-7
SP - 708
EP - 714
CY - Singapore
ER -
TY - CHAP
A1 - Armoush, A.
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Effective Pattern Representation for Safety Critical Embedded Systems
T2 - Proc. 2008 International Conference on Computer Science and Software Engineering, vol. 4
Y1 - 2008
U6 - https://doi.org/10.1109/CSSE.2008.739
SP - 91
EP - 97
PB - IEEE CS
ER -
TY - CHAP
A1 - Armoush, A.
A1 - Salewski, F.
A1 - Kowalewski, S.
T1 - Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems
T2 - Proc. 11th International Conference on Information Technology (ICIT 2008)
Y1 - 2008
U6 - https://doi.org/10.1109/ICIT.2008.60
SP - 232
EP - 237
PB - IEEE CS
ER -
TY - GEN
A1 - Job, Reinhart
A1 - Ungru, Kathrin
T1 - Teaching Electrochemical Energy Storage for Undergraduate Electrical Engineers, Workshop, 7.3.2017, Instituto Federal Rio Grande do Norte (IFRN), Natal, Brasilien
Y1 - 2017
ER -
TY - JOUR
A1 - Brinkmann, Marcus
A1 - Dresen, Christian
A1 - Merget, Robert
A1 - Poddebniak, Damian
A1 - Müller, Jens
A1 - Somorovsky, Juraj
A1 - Schwenk, Jörg
A1 - Schinzel, Sebastian
T1 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
JF - 30th USENIX Security Symposium
Y1 - 2021
UR - https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann
ER -
TY - JOUR
A1 - Banos, Oresti
A1 - Damas, Miguel
A1 - Pomares, Hector
A1 - Rojas, Ignacio
A1 - Villalonga, Claudia
A1 - Glösekötter, Peter
T1 - PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring
JF - Hindawi Publishing Corporation The Scientific World Journal
Y1 - 2014
SP - 1
EP - 12
ER -
TY - CHAP
A1 - Poddebniak, Damian
A1 - Ising, Fabian
A1 - Böck, Hanno
A1 - Schinzel, Sebastian
T1 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context
T2 - Proceedings of the 30th USENIX Security Symposium, August 11–13, 2021
N2 - TLS is one of today's most widely used and best-analyzed encryption technologies. However, for historical reasons, TLS for email protocols is often not used directly but negotiated via STARTTLS. This additional negotiation adds complexity and was prone to security vulnerabilities such as naive STARTTLS stripping or command injection attacks in the past.
We perform the first structured analysis of STARTTLS in SMTP, POP3, and IMAP and introduce EAST, a semi-automatic testing toolkit with more than 100 test cases covering a wide range of variants of STARTTLS stripping, command and response injections, tampering attacks, and UI spoofing attacks for email protocols. Our analysis focuses on the confidentiality and integrity of email submission (email client to SMTP server) and email retrieval (email client to POP3 or IMAP server). While some of our findings are also relevant for email transport (from one SMTP server to another), the security implications in email submission and retrieval are more critical because these connections involve not only individual email messages but also user credentials that allow access to a user's email archive.
We used EAST to analyze 28 email clients and 23 servers. In total, we reported over 40 STARTTLS issues, some of which allow mailbox spoofing, credential stealing, and even the hosting of HTTPS with a cross-protocol attack on IMAP. We conducted an Internet-wide scan for the particularly dangerous command injection attack and found that 320.000 email servers (2% of all email servers) are affected. Surprisingly, several clients were vulnerable to STARTTLS stripping attacks. In total, only 3 out of 28 clients did not show any STARTTLS-specific security issues. Even though the command injection attack received multiple CVEs in the past, EAST detected eight new instances of this problem. In total, only 7 out of 23 tested servers were never affected by this issue. We conclude that STARTTLS is error-prone to implement, under-specified in the standards, and should be avoided.
Y1 - 2021
UR - https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak
SN - 978-1-939133-24-3
VL - 2021
ER -
TY - JOUR
A1 - Löchte, Andre
A1 - Rojas Ruiz, Ignacio
A1 - Glösekötter, Peter
T1 - Battery State Estimation with ANN and SVR Evaluating Electrochemical Impedance Spectra Generalizing DC Currents
JF - Applied Sciences
N2 - The demand for energy storage is increasing massively due to the electrification of transport and the expansion of renewable energies. Current battery technologies cannot satisfy this growing demand as they are difficult to recycle, as the necessary raw materials are mined under precarious conditions, and as the energy density is insufficient. Metal–air batteries offer a high energy density as there is only one active mass inside the cell and the cathodic reaction uses the ambient air. Various metals can be used, but zinc is very promising due to its disposability and non-toxic behavior, and as operation as a secondary cell is possible. Typical characteristics of zinc–air batteries are flat charge and discharge curves. On the one hand, this is an advantage for the subsequent power electronics, which can be optimized for smaller and constant voltage ranges. On the other hand, the state determination of the system becomes more complex, as the voltage level is not sufficient to determine the state of the battery. In this context, electrochemical impedance spectroscopy is a promising candidate as the resulting impedance spectra depend on the state of charge, working point, state of aging, and temperature. Previous approaches require a fixed operating state of the cell while impedance measurements are being performed. In this publication, electrochemical impedance spectroscopy is therefore combined with various machine learning techniques to also determine successfully the state of charge during charging of the cell at non-fixed charging currents.
Keywords:
electrochemical impedance spectroscopy; artificial neural networks; support vector regression; zinc-air battery; state estimation; state of charge
KW - Battery State Estimation
Y1 - 2021
SN - 978-84-1117-173-1
U6 - https://doi.org/10.3390/app12010274
VL - 12
IS - 1
SP - 275
ER -
TY - CHAP
A1 - Romero, Adrian
A1 - Estevez, Francisco
A1 - Rebel, Gregor
A1 - Glösekötter, Peter
A1 - Conzáles, Jesús
T1 - Distance Estimate with Ultra Wide Band in Interior Environments
T2 - Proceedings of Jornadas de Computación Empotrada de Espana (JCE)
Y1 - 2015
CY - Cordoba (Spain)
ER -
TY - CHAP
A1 - Rebel, Gregor
A1 - Estevez, Francisco
A1 - Glösekötter, Peter
T1 - Energy Efficiency Study of representative Microcontrollers for Wearable Electonics
T2 - International Work-Conference on Bioinformatics and Biomedical Engineering
Y1 - 2015
SP - 65
EP - 76
PB - Springer International Publishing Switzerland
CY - Granada (Spain)
ER -
TY - CHAP
A1 - Willing, Markus
A1 - Saatjohann, Christoph
A1 - Rath, Benjamin
A1 - Schinzel, Sebastian
A1 - Eckardt, Lars
A1 - Köbe, Julia
T1 - Experiences with General Data Protection Regulations and Remote Monitoring of Implantable Rhythm Devices
T2 - 87. Jahrestagung der Deutsche Gesellschaft für Kardiologie – Herz‑ und Kreislauforschung e.V
Y1 - 2021
U6 - https://doi.org/10.1007/s00392-021-01843-w
PB - Springer-Verlag GmbH
ER -
TY - JOUR
A1 - Weiss, Robin
A1 - Glösekötter, Peter
A1 - Prestes, Edson
A1 - Kolberg, Mariana
ED - Springer,
T1 - Hybridisation of Sequential Monte Carlo Simulation with Non-linear Bounded-error State Estimation Applied to Global Localisation of Mobile Robots
JF - Journal of Intelligent & Robotic Systems
N2 - Accurate self-localisation is a fundamental ability of any mobile robot. In Monte Carlo localisation, a probability distribution over a space of possible hypotheses accommodates the inherent uncertainty in the position estimate, whereas bounded-error localisation provides a region that is guaranteed to contain the robot. However, this guarantee is accompanied by a constant probability over the confined region and therefore the information yield may not be sufficient for certain practical applications. Four hybrid localisation algorithms are proposed, combining probabilistic filtering with non-linear bounded-error state estimation based on interval analysis. A forward-backward contractor and the Set Inverter via Interval Analysis are hybridised with a bootstrap filter and an unscented particle filter, respectively. The four algorithms are applied to global localisation of an underwater robot, using simulated distance measurements to distinguishable landmarks. As opposed to previous hybrid methods found in the literature, the bounded-error state estimate is not maintained throughout the whole estimation process. Instead, it is only computed once in the beginning, when solving the wake-up robot problem, and after kidnapping of the robot, which drastically reduces the computational cost when compared to the existing algorithms. It is shown that the novel algorithms can solve the wake-up robot problem as well as the kidnapped robot problem more accurately than the two conventional probabilistic filters.
KW - Interval analysis · Particle filtering · Kalman filtering · Bayesian filtering · Sequential Monte Carlo simulation · Bounded-error estimation
Y1 - 2019
U6 - https://doi.org/10.1007/s10846-019-01118-7
SP - 1
EP - 23
ER -
TY - JOUR
A1 - Gierling, Markus
A1 - Saatjohann, Christoph
A1 - Dresen, Christian
A1 - Köbe, Julia
A1 - Rath, Benjamin
A1 - Eckardt, Lars
A1 - Schinzel, Sebastian
T1 - Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk
JF - 86. Jahrestagung und Herztage 2020 der DGK
N2 - Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks.
Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible).
Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks.
Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices.
KW - Cyber Security
KW - Cardiac Implantable Devices
Y1 - 2020
U6 - https://doi.org/10.1007/s00392-020-01621-0
VL - Band 109, Supplement 1, April 2020
SP - 1
EP - 2
ER -
TY - CHAP
A1 - Dresen, Christian
A1 - Ising, Fabian
A1 - Poddebniak, Damian
A1 - Kappert, Tobias
A1 - Holz, Thorsten
A1 - Schinzel, Sebastian
ED - Zhou, Jianying
T1 - CORSICA: Cross-Origin Web Service Identification
T2 - The 15th ACM ASIA Conference on Computer and Communications Security
N2 - Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques.
Y1 - 2020
UR - https://asiaccs2020.cs.nthu.edu.tw/program/
ER -
TY - CHAP
A1 - Estevez, F.
A1 - Rebel, G.
A1 - González, J.
A1 - Palomares, J.M.
A1 - Glösekötter, P.
T1 - Body energy harvesting for WSN. State of art and examples
T2 - Proceedings JCE 09/2013
N2 - Body energy harvesting for WSN. State of art and examples
Y1 - 2013
U6 - https://doi.org/10.25974/fhms-707
PB - JCE
ER -
TY - JOUR
A1 - Seuter, Pfeiffer
A1 - Bauer, Zentgraf
T1 - Running with Technology: Evaluating the Impact of Interacting with Wearable Devices on Running Movement
JF - Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Y1 - 2017
SN - 2474-9567
VL - 1
IS - 3
ER -
TY - GEN
A1 - Stewart, R.
A1 - Tüxen, M.
A1 - Loreto, S.
A1 - Seggelmann, R.
T1 - Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol
BT - November 2017
Y1 - 2017
U6 - https://doi.org/10.17487/RFC8260
SN - 2070-1721
N1 - RFC 8260
ER -