Campusleben_HAW_Hamburg_41

Lehrende_HAW_Hamburg_26

Studierende_HAW_Hamburg_13

Informationen für:

Publikationen von Professorinnen und Professoren der HAW Hamburg

Jahr:  
Alle : 1984, ... , 2009, 2010, 2011, ... , 2020
Autor:  
Alle : A, À, B, C, D, E, F, G, H, I, J, K, L, M, N, O, Ö, P, Q, R, S, T, U, V, W, Y, Z 
Präferenzen: 
Referenzen pro Seite: Zeige Schlüsselwörter Zeige Zusammenfassung
Referenzen

2020

Zeitschriftenbeiträge:

default
H. Cornel, S.B. Gahleitner, I. Köhler-Saretzki, K. Nowacki, I. Sarto-Jackson, R. Schleiffer, M. Schröder und G.J. Suess
Bindung und Beziehung in der Sozialen Arbeit – einführende Bemerkungen
Soziale Arbeit,
2020

2019

Zeitschriftenbeiträge:

default
Andrä Jörg, Florian Bleibaum, Anselm Sommer, Martin Veit, Björn Rabe, Karl Kunzelmann, Christian Nehls, Wilmar Correa, Thomas Gutsmann, Joachim Grötzinger, Sucharit Bhakdi und Karina Reiss
ADAM10 sheddase activation is controlled by cell membrane asymmetry
Journal of Molecular Cell Biology, 11(11):979-993
12 Februar 2019
englisch

Marker: LS-Bt

Tagungs-/Konferenz-/Katalogbeiträge:

default
Ayla Nawaz, Sven Pfeiffer, Gerwald Lichtenberg und Philipp Rostalski
Fault Detection Method for the SRF Cavities of the European XFEL
15th European Workshop on Advanced Control and Diagnosis

Marker: LS-MT

default
Christian Modrzynski, Valentin Roscher, Florian Rittweger, AbdulRahman Ghannoum, Patricia Nieva und Karl-Ragmar Riemschneider
Integrated Optical Fibers for Simultaneous Monitoring of the Anode and the Cathode in Lithium Ion Batteries
2019 IEEE SENSORS
Montreal, QC, Canada, Palais des Congrès de Montréal
27-30 Oct. 2019
IEEE (Hrsg.) 2019 Conference Proceedings IEEE SENSORS , Seite pp. 1-4.
Verlag: ieeexplore.ieee.org/document/8956755,

Schlüsselwörter: monitoring of lithium-ion-batteries battery state fiber optics sensor pouch cell configuration graphite anode material lithium iron phosphate cathode material electrochromic marker additive electrochemical electrode observation

Marker: TI-IuE

Zusammenfassung: We present optical fiber measurements for cell state determination via simultaneous observation of both electrodes of a lithium-ion-battery. The integration of fiber optics is done using commercial electrodes set up in pouch configuration. This system extends the method, shown previously for the graphite anode. Lithium iron phosphate cathodes suffer from poor optical observability due to the addition of carbon black as conductive agent. Hence, carbon black is locally replaced by an electrochromic marker additive. Transmissions through integrated fibers were monitored during battery cycling and results show that the cell state of charge directly influences both transmission signals. Optical data can be utilized as a parameter independent of electrical measurements to estimate the state of charge.

Technische Berichte:

default
Marcin Nawrocki, Thomas C. Schmidt und Matthias Wählisch
Uncovering Vulnerable Industrial Control Systems from the Internet Core
Technical Report
Dokument Nummer: arXiv:1901.04411
Open Archive: arXiv.org,
Januar 2019

Marker: TI-I

Zusammenfassung: Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure, but also the Internet ecosystem (e.g., DRDoS attacks). In this paper, we uncover unprotected inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. This traffic analysis is correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS communication. Our results can be used (1) to create precise filters for potentially harmful non-industrial ICS traffic, and (2) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks.

2018

Buchbeiträge:

default
Barbara König, Dennis Nolte, Julia Padberg und Arend Rensink
A Tutorial on Graph Transformation
Reiko Heckel; Gabriele Taentzer (Hrsg.) Graph Transformation, Specifications, and Nets - In Memory of Hartmut Ehrig
Seite 83-104.
Verlag: Springer,
2018

Marker: TI-I

Tagungs-/Konferenz-/Katalogbeiträge:

default
Birgit Koeppen, Anna Kerstin Usbeck, Mamadou Lamine Ndiaye und Amadou Ndiaye
Investigation of Balancing Power Demand in the Roll-out Scenario of Solar Energy in Senegal
Solar Integration Workshop 2018
Stockholm
16.-17. Oktober 2018
Energynautics (Hrsg.) Proceedings of the 8th Solar Integration Workshop – International Workshop on Integration of Solar Power into Power Systems

Marker: TI-MP

default
Matthias Nitsche und Marina Tropmann-Frick
Context and Embeddings in Language Modelling - an Exploration
Selected Papers of the {XX} International Conference on Data Analytics and Management in Data Intensive Domains {(DAMDID/RCDL} 2018), Moscow, Russia, October 9-12, 2018

Marker: TI - I

default
Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt und Matthias Wählisch
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
Internet Measurement Conference - IMC
Boston, MA
Proc. of ACM Internet Measurement Conference (IMC 2018) , Seite 343--349.
Association of the Computing Machinery
Verlag: ACM Digital Library, New York, NY, USA

Marker: TI-I

Zusammenfassung: In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now a majority of established connections supporting CT. With the increasing deployment of CT, there are also concerns of information leakage due to all certificates being visible in CT logs. To understand this threat, we introduce a CT honeypot and show that data from CT logs is being used to identify targets for scanning campaigns only minutes after certificate issuance. We present and evaluate a methodology to learn and validate new subdomains from the vast number of domains extracted from CT logged certificates.

default
Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt und Matthias Wählisch
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
SIGCOMM
Budapest
Proc. of ACM SIGCOMM. Poster Session , Seite 57--59.
Association of the Computing Machinery
Verlag: ACM Digital Library, New York, NY, USA

Marker: TI-I

Zusammenfassung: In this poster, we analyze Denial of Service attacks from two vantage points, a national Internet Service Provider and a large regional Internet Exchange Point. Our results reveal that common mitigation techniques (i.e., blackholing) can be outperformed by more fine grained filtering (i.e., BGP Flowspec) without increasing complexity.

Seite:  
Zurück | 1, 2, 3, 4, 5, 6, ... , 14 | Weiter
Total:
140
Export als:
BibTeX, XML

Letzte Änderung: 23.01.15

An die Redaktion