Refine
H-BRS Bibliography
- no (58) (remove)
Departments, institutes and facilities
Document Type
- Article (21)
- Conference Object (20)
- Part of a Book (9)
- Contribution to a Periodical (4)
- Book (monograph, edited volume) (1)
- Conference Proceedings (1)
- Master's Thesis (1)
- Report (1)
Year of publication
- 2016 (58) (remove)
Has Fulltext
- no (58)
Keywords
- API usability (1)
- Adaptive Media Streaming (1)
- Ceramic matrix composite (1)
- Collaborative design (1)
- Crisis management (1)
- Culture (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Destination marketing (1)
- Difference-coding (1)
- Disclosive ethics (1)
- E-Learning (1)
- ELSI (1)
- EPHB2 (1)
- Enterprise Resource Planning (1)
- Epithelial-mesenchymal transition (1)
- Evaluation (1)
- FOXA1 (1)
- ICT (1)
- Informationssicherheit (1)
- LEF1 (1)
- MYB (1)
- Market segmentation (1)
- Methodology (1)
- Na+/K+ ATPase (1)
- Privacy (1)
- Push-based Streaming (1)
- SOS calls (1)
- Security (1)
- Security APIs (1)
- Serbian tourism (1)
- Size effect (1)
- Software Security (1)
- Tourist behavior (1)
- Transcriptional enhancer (1)
- Usable Security (1)
- Web (1)
- WebSocket (1)
- Weibull (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- airway (1)
- conceptual culture model (1)
- design science research (1)
- emergency response (1)
- epithelial sodium channels (1)
- erp4students (1)
- failure criterion (1)
- flame tube (1)
- gasotransmitter (1)
- hydrogen sulfide (1)
- hypoxia (1)
- investment casting (1)
- mobile computing (1)
- validity (1)
- visibility (1)
- weakest link (1)
Mensch-Roboter-Kollaboration
(2016)
Eine enge Zusammenarbeit von Mensch und Roboter, die sogenannte Mensch-Roboter-Kollaboration (MRK), könnte eine bisher beispielslose Produktivität entstehen lassen. Bis zur allgemeinen Nutzung der Technologie sind noch zahlreiche Probleme zu lösen, insbesondere die des Arbeits- und Gesundheitsschutzes. Am Institut für Sicherheitsforschung der Hochschule Bonn-Rhein-Sieg wurde in den vergangenen Jahren eine Reihe von Projekten zur Entwicklung von optischen Sensorsystemen für Schutzeinrichtungen durchgeführt. Im Projekt SPAI (Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem) wurde ein spezielles Kamerasystem für den nahinfraroten (NIR) Spektralbereich entwickelt.
Nicht im Elfenbeinturm
(2016)
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
We demonstrated previously that phosphocholine and phosphocholine-modified macromolecules efficiently inhibit ATP-dependent release of interleukin-1β from human and murine monocytes by a mechanism involving nicotinic acetylcholine receptors (nAChR). Interleukin-1β is a potent pro-inflammatory cytokine of innate immunity that plays pivotal roles in host defence. Control of interleukin-1β release is vital as excessively high systemic levels cause life threatening inflammatory diseases. In spite of its structural similarity to acetylcholine, there are no other reports on interactions of phosphocholine with nAChR. In this study, we demonstrate that phosphocholine inhibits ion-channel function of ATP receptor P2X7 in monocytic cells via nAChR containing α9 and α10 subunits. In stark contrast to choline, phosphocholine does not evoke ion current responses in Xenopus laevis oocytes, which heterologously express functional homomeric nAChR composed of α9 subunits or heteromeric receptors containing α9 and α10 subunits. Preincubation of these oocytes with phosphocholine, however, attenuated choline-induced ion current changes, suggesting that phosphocholine may act as a silent agonist. We conclude that phophocholine activates immuno-modulatory nAChR expressed by monocytes but does not stimulate canonical ionotropic receptor functions.
Hydrogen sulfide (H2S) is a well-known environmental chemical threat with an unpleasant smell of rotten eggs. Aside from the established toxic effects of high-dose H2S, research over the past decade revealed that cells endogenously produce small amounts of H2S with physiological functions. H2S has therefore been classified as a gasotransmitter. A major challenge for cells and tissues is the maintenance of low physiological concentrations of H2S in order to prevent potential toxicity. Epithelia of the respiratory and gastrointestinal tract are especially faced with this problem, since these barriers are predominantly exposed to exogenous H2S from environmental sources or sulfur-metabolising microbiota. In this paper, we review the cellular mechanisms by which epithelial cells maintain physiological, endogenous H2S concentrations. Furthermore, we suggest a concept by which epithelia use their electrolyte and liquid transport machinery as defence mechanisms in order to eliminate exogenous sources for potentially harmful H2S concentrations.
Hydrogen sulfide contributes to hypoxic inhibition of airway transepithelial sodium absorption
(2016)
An exploratory study: Analysis of Serbian tourism market and identification of major market segments
(2016)
Currently, there are a lot of research activities dealing with gamma titanium aluminide (γ-TiAl) alloys as new materials for low pressure turbine (LPT) blades. Even though the scatter in mechanical properties of such intermetallic alloys is more distinctive as in conventional metallic alloys, stochastic investigations on γ -TiAl alloys are very rare. For this reason, we analyzed the scatter in static and dynamic mechanical properties of the cast alloy Ti-48Al-2Cr-2Nb. It was found that this alloy shows a size effect in strength which is less pronounced than the size effect of brittle materials. A weakest-link approach is enhanced for describing a scalable size effect under multiaxial stress states and implemented in a post processing tool for reliability analysis of real components. The presented approach is a first applicable reliability model for semi-brittle materials. The developed reliability tool was integrated into a multidisciplinary optimization of the geometry of a LPT blade. Some processes of the optimization were distributed in a wide area network, so that specialized tools for each discipline could be employed. The optimization results show that it is possible to increase the aerodynamic efficiency and the structural mechanics reliability at the same time, while ensuring the blade can be manufactured in an investment casting process.
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
An analysis of sharing string objects with the Java Virtual Machine was conducted; they are the most used objects in Java programs and they are immutable - thus they are read-only and easily identified. While the results are promising, it is clear that sharing more objects would result in better performance. Automatic object selection for sharing is non-trivial, because in the current state only read-only objects can be shared. This attribute can not be easily determined during runtime by an algorithm; the developer on the other hand can. This thesis presents the development of an Application Programmer Interface (API) that allows programmers to use the Java Virtual Machine (JVM) internal sharing functionality. Furthermore, we present the usage of the sharing API. Open-source software was used as real-world test cases. Afterwards the evaluation shows that the ratio between memory savings and start-up time overhead is reasonable.
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Online media consumption is the main driving force for the recent growth of the Web. As especially realtime media is becoming more and more accessible from a wide range of devices, with contrasting screen resolutions, processing resources and network connectivity, a necessary requirement is providing users with a seamless multimedia experience at the best possible quality, henceforth being able to adapt to the specific device and network conditions. This paper introduces a novel approach for adaptive media streaming in the Web. Despite the pervasive pullbased designs based on HTTP, this paper builds upon a Web-native push-based approach by which both the communication and processing overheads are reduced significantly in comparison to the pull-based counterparts. In order to maintain these properties when enhancing the scheme by adaptation features, a server-side monitoring and control needs to be developed as a consequence. Such an adaptive push-based media streaming approach is intr oduced as main contribution of this work. Moreover, the obtained evaluation results provide the evidence that with an adaptive push-based media delivery, on the one hand, an equivalent quality of experience can be provided at lower costs than by adopting pull-based media streaming. On the other hand, an improved responsiveness in switching between quality levels can be obtained at no extra costs.
MOOCs in POM Education
(2016)
Basic demand from enterprises towards academic education: provide students not only methodological/theoretical knowledge, but also prepare them for the future tasks in the world of works! This contradicts academia’s focus on sustainably teaching basic principles. With the extra-curricular international online program erp4students, we successfully managed to bridge this "conflict-of-interest”.
Neues Lizenzmanagement
(2016)
This report summarises and integrates two different tracks of research for the purpose of envisioning and preparing a joint research project proposal. Soft- and hardware systems have become increasingly complex and act "concurrently", both with respect to memory access (i.e. information flow) and computational resources (i.e. "services"). The software development metaphor of cloud-storage, cloud-computing and service-oriented design has been anticipated by artificial intelligence (AI) research at least 30 years ago (parallel and distributed computation already dates back to the 1950’s and 1970s). What is known as a "service" today is what in AI is known as the capability of an agent; and the problem of information flow and consistency has been a headstone of information processing ever since. Based on a real-world robotics application we demonstrate how an increasingly abstract description of collaborating or competing agents correspond to a set of concurrent processes.