Refine
Departments, institutes and facilities
- Fachbereich Informatik (62)
- Fachbereich Wirtschaftswissenschaften (61)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (39)
- Fachbereich Angewandte Naturwissenschaften (35)
- Fachbereich Ingenieurwissenschaften und Kommunikation (33)
- Institut für Cyber Security & Privacy (ICSP) (23)
- Institut für Verbraucherinformatik (IVI) (19)
- Institute of Visual Computing (IVC) (15)
- Fachbereich Sozialpolitik und Soziale Sicherung (14)
- Institut für funktionale Gen-Analytik (IFGA) (13)
Document Type
- Conference Object (99)
- Article (92)
- Part of a Book (32)
- Book (monograph, edited volume) (18)
- Contribution to a Periodical (11)
- Report (8)
- Conference Proceedings (3)
- Doctoral Thesis (2)
- Bachelor Thesis (1)
- Research Data (1)
Year of publication
- 2016 (270) (remove)
Has Fulltext
- no (270) (remove)
Keywords
- Lehrbuch (6)
- Betriebswirtschaftslehre (2)
- Corporate Social Responsibility (2)
- Dielectric analysis (2)
- E-Business (2)
- Fas (2)
- Intelligent Transport System (2)
- Kommunikation (2)
- Large, high-resolution displays (2)
- Lignin (2)
Mensch-Roboter-Kollaboration
(2016)
Eine enge Zusammenarbeit von Mensch und Roboter, die sogenannte Mensch-Roboter-Kollaboration (MRK), könnte eine bisher beispielslose Produktivität entstehen lassen. Bis zur allgemeinen Nutzung der Technologie sind noch zahlreiche Probleme zu lösen, insbesondere die des Arbeits- und Gesundheitsschutzes. Am Institut für Sicherheitsforschung der Hochschule Bonn-Rhein-Sieg wurde in den vergangenen Jahren eine Reihe von Projekten zur Entwicklung von optischen Sensorsystemen für Schutzeinrichtungen durchgeführt. Im Projekt SPAI (Sichere Personendetektion im Arbeitsbereich von Industrierobotern durch ein aktives NIR-Kamerasystem) wurde ein spezielles Kamerasystem für den nahinfraroten (NIR) Spektralbereich entwickelt.
Nicht im Elfenbeinturm
(2016)
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
Steigende psychische Arbeitsanforderungen werden im betrieblichen Alltag zunehmend als Normalität empfunden. Trotz erhöhtem Leistungsdruck werden Arbeitspausen oftmals unregelmäßig bis gar nicht wahrgenommen, obwohl mit einer Pause eine gesteigerte Erholung und eine erhöhte Produktivität einhergehen. Der vorliegende Artikel zeigt auf, wie Arbeitspausen und deren systematische Implementierung zu einem "gesunden Unternehmen" beitragen können.
The design of future materials for biotechnological applications via deposition of molecules on surfaces will require not only exquisite control of the deposition procedure, but of equal importance will be our ability to predict the shapes and stability of individual molecules on various surfaces. Furthermore, one will need to be able to predict the structure patterns generated during the self-organization of whole layers of (bio)molecules on the surface. In this review, we present an overview over the current state of the art regarding the prediction and clarification of structures of biomolecules on surfaces using theoretical and computational methods.