Refine
Year of publication
Document Type
- Conference Proceeding (50)
- Master's Thesis (34)
- Report (17)
- Article (9)
- Bachelor Thesis (3)
- Doctoral Thesis (3)
- Other Publications (3)
- Working Paper (2)
Language
- English (63)
- German (56)
- Multiple languages (2)
Keywords
- .NET Remoting (1)
- 2 D environment Laser data (1)
- AAL (2)
- ADO.NET (1)
- ASP.NET (1)
- Accelerometers (1)
- Active Server Pages (1)
- ActiveX Data Objects (ADO) (1)
- Activity monitoring (1)
- Agenten-Plattform (1)
Institute
- Fakultät Informatik (121) (remove)
Selbstorganisierende Karten sind neuronale Netze, die imstande sind, Daten zu klassifizieren und zu reduzieren. Aus diesem Grund eignen sie sich sehr gut fuer die Steuerung von Robotern, da sie deren Sensoreingangswerte klassifizieren und daraus auf eine Reaktion schließen koennen. Die Architektur und Funktionsweise dieser neuronalen Netze sind der des menschlichen Kortex kuenstlich nachgebildet. Im Rahmen dieser Diplomarbeit wurde ein Java-Framework namens JFSOM implementiert, welches nach dem System einer selbstorganisierenden Karte Datenmengen klassifizieren kann. Das Framework ist so entworfen, dass sowohl Eingabedaten als auch Ausgabedaten trainiert werden koennen, um es auch als sensormotorische Karte nutzbarzu machen. JFSOM wurde verwendet, um den Miniaturroboter Khepera nach bestimmten Verhaltensweisen zu steuern. Als Verhaltensweisen wurden eine Hindernisvermeidung, eine Wandverfolgung, eine Korridorverfolgung und eine Objektverfolgung realisiert. Die Wandverfolgung laesst den Roboter aus jedem beliebigen azyklischen Labyrinth herausfinden.
To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, html context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different html context categories, the necessary Cross Site Scripting prevention mechanisms are described.
We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution are taxonomies of errors, sinks and fixes seen from a developer's point of view. The results are compared to the CWE taxonomy with an emphasis on vulnerability details. Additionally, some ideas are presented on how the taxonomy could be used to improve the software security education.
Smart-Future-Living-Bodensee
(2018)
This paper presents a bed system able to analyze a person’s movement, breathing and recognize the positions that the subject is lying on the bed during the night without any additional physical contact. The measurements are performed with sensors placed between the mattress and the bed-frame. An Intel Edison board was used as an endpoint that served as a communication node from the mesh network to external service. Two nodes and Intel Edison are attached to the bottom of the bed frame and they are connected to the sensors. First test results have indicated the potential of the proposed approach for the recognition of sleep positions with 83% of correct recognized positions.
This thesis emphasizes problems that reports generated by vulnerability scanners impose on the process of vulnerability management, which are a. an overwhelming amount of data and b. an insufficient prioritization of the scan results.
To assist the process of developing means to counteract those problems and to allow for quantitative evaluation of their solutions, two metrics are proposed for their effectiveness and efficiency. These metrics imply a focus on higher severity vulnerabilities and can be applied to any simplification process of vulnerability scan results, given it relies on a severity score and time of remediation estimation for each vulnerability.
A priority score is introduced which aims to improve the widely used Common Vulnerability Scoring System (CVSS) base score of each vulnerability dependent on a vulnerability’s ease of exploit, estimated probability of exploitation and probability of its existence.
Patterns within the reports generated by the Open Vulnerability Assessment System (OpenVAS) vulnerability scanner between vulnerabilities are discovered which identify criteria by which they can be categorized from a remediation actor standpoint. These categories lay the groundwork of a final simplified report and consist of updates that need to be installed on a host, severe vulnerabilities, vulnerabilities that occur on multiple hosts and vulnerabilities that will take a lot of time for remediation. The highest potential time savings are found to exist within frequently occurring vulnerabilities, minor- and major suggested updates.
Processing of the results provided by the vulnerability scanner and creation of the report is realized in the form of a python script. The resulting reports are short, straight to the point and provide a top down remediation process which should theoretically allow to minimize the institutions attack surface as fast as possible. Evaluation of the practicality must follow as the reports are yet to be introduced into the Information Security Management Lifecycle.
Dynamic Real-Time Range Queries (DRRQ) are a common means to handle mobile clients in high-density areas where both, clients requested by the query and the inquirers, are mobile. In contrast to the very well-known continuous range queries, only a few approaches, such as Adaptive Quad Streaming (AQS), address the mandatory scalability and real-time requirements of these so-called ad-hoc mobility challenges. In this paper we present the highly decentralized solution Adaptive Quad Streaming Flexible (AQSflex) as an extension of the already existing more theoretical AQS approach. Beside a highly distributed cell structure without data structures and a lightweight streaming communication, we use a multi-cell-assignment on limited pool resources instead of an idealistic unlimited cell-per-server assignment. The described experimental results show the potential of our local capacity balancing scheme for cell handover in a strongly decentralized setting. Leafs of a cell hierarchy define a kind of self-optimizing fuzzy edge for the processing resources in high-density systems without any centralized controlling or cloud component.
Das häusliche Umfeld kann vor allem für langfristiges Schlafmonitoring verwendet werden. Gute Patientenakzeptanz erfordert niedrige Nutzer- und Installationsbarrieren. Für die Installation zu Hause sind klassische PSG-Systeme aufgrund von ihrer Komplexität wenig passend. Ziel der Entwicklung ist die qualifizierte Erhebung von Parametern, die einerseits eine hinreichend gute Klassifikation von Schlafphasen erlauben und die andererseits durch nicht-invasive Methoden erfasst werden können.
Basierend auf einer Literaturstudie und der Maßgabe nicht-invasive Methoden zu nutzen, wurden folgende Parameter ausgewählt: Körperbewegung, Atmung und Herzschlag. Diese Parameter können nicht-invasiv durch Matratzendrucksensoren erfasst werden. Die Sensorknoten sind als ein Netz von Drucksensoren implementiert, die mit einem leistungsarmen und performanten Mikrocontroller verbunden sind. Alle Knoten sind über einen systemweiten Bus mit Adressarbitrierung verbunden. Der eingebettete Prozessor ist der Mesh-Netzwerk-Endpunkt, der die Netzwerkkonfiguration, Speicherung und Vorverarbeitung der Daten, externen Datenzugriff und Visualisierung ermöglicht.
Das System wurde getestet, indem Experimente durchgeführt wurden, die den Schlaf verschiedener gesunder junger Personen aufzeichneten. Die erhaltenen Ergebnisse bestätigen die Fähigkeit des Systems, Atemfrequenz und Körperbewegung zu erfassen. Ein wesentlicher Unterschied dieses Systems im Vergleich zu anderen Ansätzen ist die innovative Art, die Sensoren unter der Matratze zu platzieren. Diese Eigenschaft erleichtert die kontinuierliche Nutzung des Systems ohne Einfluss auf den gemeinsamen Schlafprozess.
Um Schlafverhalten langfristig zu untersuchen, wird ein Hardwaresystem mit niedrigen Installationsbarrieren für den Einsatz im häuslichen Umfeld. Erste Ergebnisse weisen auf das Potenzial hin, außer Körperbewegung und Atemfrequenz, auch Herzfrequenz erfassen zu können. Die Werte können weiter verbessert werden, wenn die Sensorabfragefrequenz erhöht wird. Nach der Weiterentwicklung des Systems, soll es mit dem Softwarealgorithmus für die Schlafphasenerkennung verbunden werden.
The process of restoring our body and brain from fatigue is directly depend-ing on the quality of sleep. It can be determined from the report of the sleep study results. Classification of sleep stages is the first step of this study and this includes the measurement of biovital data and its further processing.
In this work, the sleep analysis system is based on a hardware sensor net, namely a grid of 24 pressure sensors, supporting sleep phase recognition. In comparison to the leading standard, which is polysomnography, the proposed approach is a non-invasive system. It recognises respiration and body move-ment with only one type of low-cost pressure sensors forming a mesh archi-tecture. The nodes implement as a series of pressure sensors connected to a low-power and performant microcontroller. All nodes are connected via a system wide bus with address arbitration. The embedded processor is the mesh network endpoint that enables network configuration, storing and pre-processing of the data, external data access and visualization.
The system was tested by executing experiments recording the sleep of different healthy young subjects. The results obtained have indicated the po-tential to detect breathing rate and body movement. A major difference of this system in comparison to other approaches is the innovative way to place the sensors under the mattress. This characteristic facilitates the continuous using of the system without any influence on the common sleep process.