Koch, Christoph (2018)
Dissertation, Technische Universität Hamburg.
This thesis develops a value stream method for the analysis and improvement of logistic objectives in a make-to-order production. The central element is the on-site recording of schedule reliability, throughput time and work-in-process. Additionally, the current configuration of the manufacturing control system is inquired and the complete flow of material and information is then charted. The following value stream design contains production planning and production control tasks. Concrete methods for the tasks order release, sequencing and capacity control support this process.
Wolff, Dietmar (2018)
Wolff, Dietmar (2018)
Falkenreck, Christine (2018)
Wolff, Dietmar (2018)
Wagener, Andreas (2018)
Willkommen in der Matrix. Wie KI und Blockchain in der Industrie 4.0 zusammenwachsen. Im Rahmen der Vortragsreihe „Digitalisierung, Industrie 4.0 & das Internet der Dinge“ an der Hochschule Hof, 17.10.2018, Hof.
Wagener, Andreas (2018)
Künstliche Intelligenz - Wie Daten und Algorithmen Wirtschaft und Gesellschaft verändern. Im Rahmen der Unternehmertage des VdW Bayern, Verband bayerischer Wohnungsunternehmen e. V., 15.10.2018, Reit im Winkl.
Arnst, Denis; Plenk, Valentin; Wöltche, Adrian (2018)
Proceedings of ICSNC 2018 : The Thirteenth International Conference on Systems and Networks Communications, S. S. 45-50.
We use an application scenario that collects, transports and stores sensor data in a database. The data is gathered with a high frequency of 1000 datasets per second. In the context of this scenario, we analyze the performance of multiple popular database systems. The benchmark results include the load on the system writing the data and the system running the database.
Lang, Sascha; Plenk, Valentin (2018)
Proceedings of CENTRIC 2018: The Eleventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, S. S. 32-41.
In our previous work, we proposed a system which makes complex production machines more user-friendly by giving the recommendations to the operator. So, we assist the user working with a complex production machine. The recommen- dations are presented like: ”In the last 10 occurrences of this event the operators performed the following keystrokes”. While working on the project, we had problems with retrieving the correct recommendations from our knowledge base. Meanwhile, we gathered more data from our project partners. Now, we dive deeper into this data in order to improve our solutions. This work describes methods to preprocess the data. This preprocessing should help us building up the knowledge base. To achieve this automatically, we do not want to know much about the machine and the production process itself.
Peinl, René (2018)
11th Intl. Conf. on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2018).
Drossel, Matthias (2018)
Lehren und Lernen im Gesundheitswesen 2018.
Drossel, Matthias (2018)
Lehren und Lernen im Gesundheitswesen 2018.
Drossel, Matthias (2018)
Lehren und Lernen im Gesundheitswesen 2018.
Drossel, Matthias (2018)
Müller, Sebastian; Müller, Anke; Rothe, Felix; Dilger, Klaus; Dröder, Klaus (2018)
Vortrag und Paper 73rd World Foundry Congress.
DOI: 10.1007/s40962-018-0218-3
Falkenreck, Christine; Wagner, Ralf (2018)
Proceedings of the IMP annual conference.
Complementing previous research, this paper addresses the challenge of exploring the drivers of customer dissatisfaction in buyer-manufacturer relationships in a B2B and a business-to-government (B2G) context, to enhance existing models of the outcomes of dissatisfaction. Based on qualitative data in a dyadic research setting, this paper collects and analyzes data from both the buying and manufacturing side in Germany, referring to internationally sold standard and customized product solutions. Customers are not limited to business clients, they include public institutions and partners. Embedding empirical observations and data in established theoretical frames, this paper enhances existing dissatisfaction research by adding its antecedents and suggests a new unified customer satisfaction and dissatisfaction model. Empirical results provide substantial implications for both B2B and B2G marketing management. Additionally, the implications for future academic research are outlined.
Perez, Rocio Lopez; Adamsky, Florian; Soua, Ridha; Engel, Thomas (2018)
17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2018 (IEEE TrustCom).
DOI: 10.1109/TrustCom/BigDataSE.2018.00094
Critical Infrastructures (CIs) use Supervisory Control And Data Acquisition (SCADA) systems for remote control and monitoring. Sophisticated security measures are needed to address malicious intrusions, which are steadily increasing in number and variety due to the massive spread of connectivity and standardisation of open SCADA protocols. Traditional Intrusion Detection Systems (IDSs) cannot detect attacks that are not already present in their databases. Therefore, in this paper, we assess Machine Learning (ML) for intrusion detection in SCADA systems using a real data set collected from a gas pipeline system and provided by the Mississippi State University (MSU). The contribution of this paper is two-fold: 1) The evaluation of four techniques for missing data estimation and two techniques for data normalization, 2) The performances of Support Vector Machine (SVM), and Random Forest (RF) are assessed in terms of accuracy, precision, recall and F 1 score for intrusion detection. Two cases are differentiated: binary and categorical classifications. Our experiments reveal that RF detect intrusions effectively, with an F 1 score of respectively > 99%.
Kalysch, Anatoli; Milisterfer, Oskar; Protsenko, Mykolai; Müller, Tilo (2018)
ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security (58), S. S. 133-143.
Code similarity measures create a comparison metric showing to what degree two code samples have the same functionality, e.g., to statically detect the use of known libraries in binary code. They are both an indispensable part of automated malware analysis, as well as a helper for the detection of plagiarism (IP protection) and the illegal use of open-source libraries in commercial apps. The centroid similarity metric extracts control-flow features from binary code and encodes them as geometric structures before comparing them. In our paper, we propose novel improvements to the centroid approach and apply it to the ARM architecture for the first time. We implement our approach as a plug-in for the IDA Pro disassembler and evaluate it regarding efficiency, accuracy and robustness on Android. Based on a dataset of 508,745 APKs, collected from 18 third-party app markets, we achieve a detection rate of 89% for the use of native code libraries, with an FPR of 10.8%. To test the robustness of our approach against the compiler version, optimization level, and other code transformations, we obfuscate and recompile known open-source libraries to evaluate which code transformations are resisted. Based on our results, we discuss how code re-use can be hidden by obfuscation and conclude with possible improvements.
Lefebvre, Vincent; Santinelli, Gianni; Müller, Tilo; Götzfried, Johannes (2018)
ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security (44), S. S. 1-9.
With SDN/NFV, the telecom industry embraces operational flexibility and cost optimization, while facing new risks from off-premise cloud computing, known as introspection by malicious operators. Introspection is identified as a serious risk only by the IT industry in general when considering cloud operation. To mitigate it, processor vendors have invested in the last decade to design Trusted Execution Environments (TEEs) plugged into their processor architectures. TEEs bring a quantum hardware-level security higher than any software-based security. They are all essentially aimed at protecting data and code when executed and processed in the cloud or in untrusted environment. In this paper, we emphasize on the blocking factors for the use of TEEs today: processor market fragmentation, major architectural and design deviations between TEEs from various CPU vendors and finally, a relatively complex enablement of these TEE technologies for non-security experts. We describe a code interpretation solution to break those blocking factors by providing a universal abstraction layer for TEEs. The paper gives a conceptual blueprint of a solution that enables Intel's SGX and AMD's SEV, defined as the most contemplated candidates in this paper for SDN/NFV or 5G deployment. Our study presents the key challenges and advanced functionalities we view as essential for meeting key SDN/NFV requirements and which are deploy ability, software performance and easy setup. Innovative directions are given to deal efficiently with these upcoming requirements.
Übler, David; Götzfried, Johannes; Müller, Tilo (2018)
Langweg, Hanno; Meier, Michael (Hrsg.) : Sicherheit 2018 (Sicherheit, Schutz und Zuverlässigkeit, Konstanz, 25.04 - 27.04.2018) 9, S. S. 195-205.
In this paper, we leverage SGX to provide a secure remote computation framework to be used in a cloud scenario. Our framework consists of two parts, a local part running on the user's machine and a remote part which is executed within the provider's environment. Users can connect and authenticate themselves to the remote side, verify the integrity of a newly spawned loading enclave, and deploy confidential code to the provider's machine. While we are not the first using SGX in a cloud scenario, we provide a full implementation considering all practical pitfalls, e.g., we use Intel's Attestation Services to prove the integrity of the loading enclave to our users. We also take care of establishing a secure bidirectional channel between the target enclave and the client running on the user's machine to send code, commands, and data. The performance overhead of CPU-bound applications using our framework is below 10% compared to remote computation without using SGX.
Alfons-Goppel-Platz 1
95028 Hof
T +49 9281 409 - 4690
valentin.plenk[at]hof-university.de