Current Projects
Doctoral Candidate | Title of the doctoral research project | Cooperating Institutions |
---|---|---|
Markus Ring | Interactive Data Mining on Data Streams | HS Coburg, Uni Würzburg |
Philipp Koch | Befahrbarkeitsanalyse in unwegsamem Gelände unter Berücksichtigung der kinematischen Konzepte mobiler Roboter
| TH Nürnberg, Uni Würzburg
|
Andreas Schütz | Effiziente und zielgerichtete Sensibilisierung der Mitarbeiter von kleinen und mittelständischen Unternehmen für Informationssicherheit | FHWS Würzburg-Schweinfurt, FAU Erlangen-Nürnberg |
Markus Zoppelt | IT-Security für das hochautomatisierte, autonome und vernetzte Fahren | TH Nürnberg, FAU Erlangen-Nürnberg |
Gabriel Herl | Multipositionale Computertomographie | TH Deggendorf, FAU Erlangen-Nürnberg
|
Thomas Schulz | A Reference Architecture for Smart Mobility Platforms | HS Neu-Ulm, TU München |
Daniel Vögele | Kamerabasiertes System zur Ermittlung der realen Aufspannsituation auf Werkzeugmaschinen | OTH Regensburg, Uni Passau |
Florian Olbrich | Safety Systems for UAVs | OTH Regensburg, TU München |
Bettina Kriegl | Service Innovation at Healthcare`s Frontline | TH Ingolstadt, Uni Bayreuth |
Katja Auernhammer | Verfahren zum Einsatz sicheren maschinellen Lernens unter einer für Haftungsfragen zuverlässigen Einhaltung vorgegebener Rahmengrößen | TH Nürnberg, FAU Erlangen-Nürnberg |
Hanning Liang | On-the-Fly-Deflektometrie zur schnellen 3D Inline Inspektion in der Bewegung | HAW Landshut, Uni Passau |
Sarah Wunderlich | Selbstadaptierende Online-Analyse von host-basierten sicherheitskritischen Ereignissen bei kleinen und mittleren Unternehmen | HS Coburg, Uni Würzburg |
Manuel Fritsche | Entwicklung eines kombinierten Auslegungsverfahrens für radiale Ventilatoren auf Basis eines mit theoretischen Ansätzen, digitalen CFD-Berechnungen und physischen Versuchen trainierten künstlichen neuronalen Netzes (Metamodell) | HS Coburg, FAU Erlangen-Nürnberg |
Stefan Kerscher | Robuste Prädiktion von Verkehrsteilnehmern in einer urbanen Umgebung | TH Deggendorf, Uni Regensburg, Continental |
Tobias Fertig | Messen der Information Security Awareness in KMUs | FHWS Würzburg-Schweinfurt, FAU Erlangen-Nürnberg |
Helge Olberding | Thematische Kartographie und 3D-Geovisualisierung in interaktiven VR-Anwendungen | FHWS Würzburg-Schweinfurt, Uni Würzburg |
Simon Seibt | Bildbasierte Medienproduktionskette | TH Nürnberg, Uni Würzburg |
Sascha Lang | Bedienerunterstützung für Produktionsmaschinen mittels fallbasiertem Schließen | HS Hof, Uni Bamberg |
Manuel Ciba | Evaluation of Synchrony and Connectivity Measures within Recorded in vitro Neuronal Networks | TH Aschaffenburg, Uni Würzburg |
Markus Miller | Auf künstliche Intelligenz basierende rekonstruktive Verfahren zur Umfeldmodellierung | HAW München TU München |
Theresa Meyer | Änderungsdetektion durch Analyse von Bildsequenzen und BIM-konformen | FHWS Würzburg-Schweinfurt TU München |
Elisabeth Wittmann | Exploring the power of AI in spectral analysis particularly leveraging simulation via transfer learning | OTH Regensburg, TU München |
Stefan Böhm | Untersuchung verschiedener Ansätze der künstlichen Intelligenz zur Optimierung der Prozessaubläufe und Mensch-Maschinen-Kollaboration in der I4.0-Produktion | TH Rosenheim, TU München |
Peter Meier | Real-Time Signal Processing Algorithms for Interactive Music Analysis Applications | TH Deggendorf, FAU Erlangen-Nürnberg |
Markus Schmidtner | Konzeption und Realisierung eines adaptiven Referenzmodells für agile und hybride Vorgehensmodelle im Produktentstehungsprozess der Automobilindustrie | HAW Landshut, FAU Erlangen-Nürnberg
|
Alumni
Dr. Rainer Koch | Sensor fusion for precise mapping of transparent and specular reflective objects
| TH Nürnberg, Uni Würzburg
|
Dr. Christian Pfitzner | Visual body weight estimation with focus on clinical applications | TH Nürnberg, Uni Würzburg |
Dr.-Ing. Maria Chizhova | Virtuelle 3D-Rekonstruktion von zerstörten russisch-orthodoxen Kirchen aus unvollständigen Punktwolken | FHWS Würzburg-Schweinfurt, TU München |
Dr.-Ing. Matthias Niedermaier | Security Herausforderungen und Werkzeuge für robuste industrielle Systeme im Internet-der-Dinge | HAW Augsburg; TU München |
Latest Publications
2020 [ nach oben ]
-
1.Schütz, A., Fertig, T., Weber, K.: Analyze Before You Sensitize: Preparation of a Targeted ISA Training. 53rd Hawaii International Conference on System Sciences (2020).
-
2.Schulz, T., Gewald, H., Böhm, M., Krcmar, H.: Smart Mobility: Contradictions in Value Co-Creation. Information Systems Frontiers. 22, (2020).
-
3.Fertig, T., Schütz, A.: About the Measuring of Information Security Awareness: A Systematic Literature Review. 53rd Hawaii International Conference on System Sciences (2020).
-
4.Fischer, F., Niedermaier, M., Hanka, T., Knauer, P., Merli, D.: Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks. CoRR. abs/2007.08885, (2020).
2019 [ nach oben ]
-
1.Liang, H., Zimmermann, A., Reiner, K., Christian, F.: A new method for solving the height problem in deflectometry. Proceedings Applied Optical Metrology III (2019).
-
2.Niedermaier, M., Fischer, F., Merli, D., Sigl, G.: Network Scanning and Mapping for IIoT Edge Node Device Security. Computing Research Repository CoRR. abs/1910.07622, (2019).
-
3.Kerscher, S., Ludwig, B., Müller, N.: Investigating the Added Value of Combining Regression Results from Different Window Lengths. AIKE. pp. 128–135. IEEE (2019).
-
4.Weber, K., Saueressig, G., Schütz, A.: Informationssicherheit und Datenschutz an Hochschulen organisieren. Angewandte Forschung in der Wirtschaftsinformatik. (2019).
-
5.Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Measuring the Impact of E-Learning Platforms on Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 26–37. Springer (2019).
-
6.von Rymon Lipinski, B., Seibt, S., Roth, J., Abé, D.: Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees. CoG. pp. 1–7. IEEE (2019).
-
7.Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. In Computers and Security 86, 2019, 147-167, DOI:. Computers and Security. pp. 147–167 (2019).
-
8.Zoppelt, M., Tavakoli Kolagari, R.: UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model. In CLOUD COMPUTING 2019. CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, At Venice, Italy (2019).
-
9.Zoppelt, M., Kolagari, R.T.: What Today’s Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability. In: Papadopoulos, Y., Aslansefat, K., Katsaros, P., and Bozzano, M. (eds.) IMBSA. pp. 270–285. Springer (2019).
-
10.Niedermaier, M., Hanka, T., Plaga, S., von Bodisco, A., Merli, D.: Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation. Computing Research Repository CoRR. abs/1904.04271, (2019).
-
11.Niedermaier, M., Striegel, M., Sauer, F., Merli, D., Sigl, G.: Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices. Computing Research Repository CoRR. abs/1908.03964, (2019).
-
12.Sauer, F., Niedermaier, M., Kießling, S., Merli, D.: LICSTER - A Low-cost ICS Security Testbed for Education and Research. Computing Research Repository CoRR. abs/1910.00303, (2019).
-
13.Herl, G., Hiller, J., Sauer, T.: Artifact reduction in X-ray computed tomography by multipositional data fusion using local image quality measures. Proceedings of the 9th Conference on Industrial Computed Tomography, Padova, Italy (iCT 2019) (2019).
-
14.Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR ’19). p. 1–2 (2019).
-
15.Liang, H., Zimmermann, A., Kickingereder, R., Faber, C.: Eine neue Methode zur Lösung des Höhenproblems in der Deflektometrie. Deutsche Gesellschaft für angewandte Optik e.V (2019).
-
16.Herl, G., Hiller, J., Kasperl, S., Maier, A.: Reduktion von Metallartefakten durch multipositionale Datenfusion in der industriellen Röntgen-Computertomographie. de Gruyter, tm-Technisches Messen. (2019).
-
17.Epple, P., Steppert, M., Malcherek, A., Fritsche, M.: Theoretical and Numerical Analysis of the Pressure Distribution and Discharge Velocity in Flows Under Inclined Sluice Gates. ASME-JSME_KSME 2019 8th Joint Fluids Engineering Conference. (2019).
-
18.Fritsche, M., Epple, P., Hasselmann, K., Reinker, F., Wagner, R., aus der Wiesche, S., Russwurm, H.: CFD-Simulation of Centrifugal Fan Performance Characteristics Using Ideal and Real Gas Models for Air and Organic Fluids. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
-
19.aus der Wiesche, S., Reinker, F., Wagner, R., Epple, P., Fritsche, M., Russwurm, H.J.: An Accurate Thermal Measurement Approach for Determining Fan Efficiencies Based on System Identification. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
-
20.Reinker, F., Wagner, R., Hasselmann, K., aus der Wiesche, S., Fritsche, M., Epple, P., Rußwurm, H.J.: Testing, modeling and simulation of fans working with organic vapors. Proceedings of 13th European Conference on Turbomachinery Fluid dynamics & Thermodynamics (2019).
-
21.Niedermaier, M., Merli, D., Georg, S.: A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices. Mediterranean Conference on Embedded Computing (MECO); IEEE. (2019).
-
22.Schütz, A.E., Fertig, T., Weber, K., Müller, N.H.: How E-Learning Can Facilitate Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 390–401. Springer (2019).
-
23.Auernhammer, K., Tavakoli Kolagari, R., Zoppelt, M.: Attacks on Machine Learning: Lurking Danger for Accountability. Proceedings of the Association for the Advancement of Artificial Intelligence AAAI Workshop on Artificial Intelligence Safety 2019 (2019).
-
24.Franz, F., Fertig, T., Schütz, A.E., Vu, H.: Towards Human-readable Smart Contracts. IEEE ICBC. pp. 38–42. IEEE (2019).
2018 [ nach oben ]
-
1.Pfitzner, C., May, S., Nüchter, A.: Body Weight Estimation for Dose-Finding and Health Monitoring of Lying, Standing and Walking Patients Based on RGB-D Data. Sensors. 18, (2018).
-
2.Ring, M., Schlör, D., Landes, D., Hotho, A.: Flow-based Network Traffic Generation using Generative Adversarial Networks. Computing Research Repository CoRR. abs/1810.07795, (2018).
-
3.Stock, M., Herl, G., Sauer, T., Hiller, J.: Edge Preserving Compression of CT Scans using Wavelets. Proceedings of the Structural Health Monitoring, International Symposium Nondestructive Testing 4-5 October 2018, Saarbruecken, Germany (2018).
-
4.Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A., Sauer, T.: Digitalisierung, Verarbeitung und Analyse kultureller und industrieller Objekte: Wertschöpfung aus großen Datenmengen. Jahrestagung für zerstörungsfreie Prüfung (2018), Deutsche Gesellschaft DGZfP (2018).
-
5.Herl, G., Rettenberger, S., Hiller, J., Sauer, T.: Metal artifact reduction by fusion of CT scans from different positions using the unfiltered backprojection. Proceedings of the 8th Conference on Industrial Computed Tomography, Wels, Austria (iCT 2018) (2018).
-
6.Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A.M., Sauer, T.: Digitization, Data Processing and Analysis of Industrial and Cultural Objects: Creating Additional Value from Big Data. Proceedings of the 12th, European Conference on Non-Destructive Testing (ECNDT) 2018, Gothenburg-Sweden (2018).
-
7.Ring, M., Landes, D., Hotho, A.: Detection of slow port scans in flow-based network traffic. PLOS ONE. 13, 1–18 (2018).
-
8.Schulz, T., Überle, M.: How Institutional Arrangements impede Realization of Smart Ecosystems: the Case of Door-to-Door Mobility integrators. In: Bednar, P.M., Frank, U., and Kautz, K. (eds.) Proceedings of the European Conference on Information Systems (ECIS 2018), Portsmouth, UK, 2018. p. 135 (2018).
-
9.Schütz, A., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Praxis der Wirtschaftsinformatik. (2018).
-
10.Stieler, M., Kriegl, B.: How do consumers experience the emotional rollercoaster? A smartphone app to measure emotions continously, transfer. Werbeforschung & Praxis. 64, 43–53 (2018).
-
11.Niedermaier, M., Malchow, J.-O., Fischer, F., Marzin, D., Merli, D., Roth, V., von Bodisco, A.: You Snooze, You Lose: Measuring PLC Cycle Times under Attacks. In: Rossow, C. and Younan, Y. (eds.) WOOT @ USENIX Security Symposium. USENIX Association (2018).
2017 [ nach oben ]
-
1.Koch, R., May, S., Nüchter, A.: Detection and Purging of Specular Reflective and Transparent Object Influences in 3D Range Measurements. Proceedings of the 7th International Society for Photogrammetry and Remote Sensing, ISPRS International Workshop 3D-ARCH 2017: "3D Virtual Reconstruction and Visualization of Complex Architectures". p. 377–384. , Nafplio, Greece (2017).
-
2.Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Creation of Flow-Based Data Sets for Intrusion Detection. Journal of Information Warfare. 16, 41–54 (2017).
-
3.Ring, M., Landes, D., Dallmann, A., Hotho, A.: IP2Vec: Learning Similarities Between IP Addresses. 2017 IEEE International Conference on Data Mining Workshops (ICDMW). pp. 657–666 (2017).
-
4.Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: A Toolset for Intrusion and Insider Threat Detection. In: Palomares Carrascosa, I., Kalutarage, H.K., and Huang, Y. (eds.) Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. p. 3–31. Springer International Publishing, Cham (2017).
-
5.Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Flow-based benchmark data sets for intrusion detection. Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS). p. 361–369. ACPI (2017).
-
6.Pfitzner, C., May, S., Nüchter, A.: Evaluation of Features from RGB-D Data for Human Body Weight Estimation. International Federation of Automatic Control. , Toulouse, France (2017).
-
7.Marc Philipp Dietrich, G.W.: Towards EEG-Based Eye-Tracking for Interaction Design in Head-Mounted Devices. Proceedings of the 7th International Conference on Consumer Electronics Berlin (ICCE-Berlin), 2017 IEEE (2017).
-
8.Koch, R., Böttcher, L., Jahrsdörfer, M., Maier, J., Trommer, M., May, S., Nüchter, A.: Out of lab calibration of a rotating 2D scanner for 3D mapping. Proceedings of the International Society for Optics and Photonics SPIE optical metrology, Videometrics, Range Imaging, and Applications. pp. 10332 – 10332 . , Munich, Germany (2017).
-
9.Koch, R., May, S., Nüchter, A.: Effective Distinction Of Transparent And Specular Reflective Objects In Point Clouds Of A Multi-Echo Laser Scanner. Proceedings of the 18th IEEE International Conference on Advanced Robotics (ICAR ’17). p. 566–571. , Hong Kong, China (2017).