Refine
Year of publication
Document Type
- Conference Proceeding (50)
- Master's Thesis (34)
- Report (17)
- Article (9)
- Bachelor Thesis (3)
- Doctoral Thesis (3)
- Other Publications (3)
- Working Paper (2)
Language
- English (63)
- German (56)
- Multiple languages (2)
Keywords
- .NET Remoting (1)
- 2 D environment Laser data (1)
- AAL (2)
- ADO.NET (1)
- ASP.NET (1)
- Accelerometers (1)
- Active Server Pages (1)
- ActiveX Data Objects (ADO) (1)
- Activity monitoring (1)
- Agenten-Plattform (1)
- Akquisition <Vertrieb> (1)
- Ambient assisted living (1)
- Analog-Digital-Umsetzer (1)
- Analog-to-digital-Converter ; Spice Simulation ; Analog integrated circuit design ; (1)
- Annotation (1)
- Anwendung (1)
- Apnoe (1)
- Arbeitsablauf (1)
- Arbeitsplatzcomputer (1)
- Archivierung (1)
- Artefaktkorrektur (1)
- Assisted living (1)
- Atmung (2)
- Atmungssignal (1)
- Audi (1)
- Auftragsabwicklung (1)
- Automatisches Eintakten (1)
- Automotive (1)
- Autonomous Mobile Indoor Robot (1)
- BCG (2)
- BW (1)
- Balanced Scorecard (1)
- Ballistocardiography (1)
- Ballistokardiographie (1)
- Benutzerinteraktion (1)
- Benutzeroberfläche (1)
- Betriebssystem (1)
- Bewegung (1)
- Bewegungssignal (1)
- Bio-vital data (1)
- Biomedical Signal Capturing (1)
- Biomedical signals (1)
- Biosignal analysis (1)
- Biosignal processing (1)
- Biovital signal (2)
- Blockchain (1)
- Bootloader (1)
- Breathing (1)
- Breathing rate (1)
- C sharp (1)
- C++ (1)
- CL <C++> (1)
- CRM (1)
- CSTA (1)
- Canny Edge Detector (1)
- Canny-Kantendetektor (1)
- Checkstyle (1)
- Client Management System ; Haaland Internet Productions ; Client Relationship Management ; workflow (1)
- Codierung (1)
- Common Criteria (1)
- Computer Telephony Integration (1)
- Computersimulation (1)
- Controlling (1)
- Convolution (1)
- Convolutional neural network (1)
- Correlation (1)
- Cross Site Scripting (1)
- DTD (1)
- Data fusion (1)
- Datenbankmodellierung (1)
- Datenstruktur (1)
- Datentypeditor (1)
- Deep Convolutional Neural Network (1)
- Deep learning (2)
- Detektiv Langohr (1)
- Dijkstra Algorithm (1)
- Dijkstra Algorithmus (1)
- Distributed ledger (1)
- Dokumentenerstellung (1)
- Dokumententyp (1)
- Dokumentvorlage (1)
- Driving (1)
- Driving safety (1)
- Driving stress (1)
- Drowsiness (1)
- E-Health (1)
- ECG (5)
- EEG (1)
- EJB (1)
- EKG (1)
- ELF (1)
- EMG (1)
- Echtzeitsystem (1)
- Eindringerkennung (1)
- Einkommensteuer (1)
- Electrocardiography (2)
- Electromyography (1)
- Entwurfsmuster (1)
- Erkennung (1)
- FACS (1)
- FSR sensor (1)
- Facial Action Coding System (1)
- Facility-Management (1)
- Fehlersuche (1)
- Feldbus (1)
- Filter (1)
- Force resistor sensor (1)
- Formel (1)
- Framework (1)
- Framework <Informatik> (2)
- Freistellungssemesterbericht (17)
- GDPR (1)
- GUI (1)
- Geschäftsprozessmodellierung (1)
- Gesetz <Physik> (1)
- Graphische Benutzeroberfläche (1)
- Grundschule (1)
- HTML (1)
- Handy (1)
- Harris Corner Detector (1)
- Harris-Eckendetektor (1)
- Health information exchange (1)
- Heart rate (5)
- Heart rate variability (1)
- Helpdesk-System (1)
- Herzfrequenz (2)
- I3M (1)
- Illuminance (1)
- Impedance measurement (1)
- Implementierung (1)
- Information Security Management (1)
- Installation (1)
- Interfaceeditor (1)
- Internet of Things (1)
- Interpretability (1)
- Intranet (1)
- IoT (1)
- J2EE (1)
- JDBC (1)
- JTAPI (1)
- Java (2)
- Java 2 Enterprise Edition (2)
- Java <Programmiersprache> (2)
- Java Beans (1)
- Java Naming and Directory Interface (1)
- Java Server Pages (1)
- Joi (1)
- Karosseriebau (1)
- Khepera (1)
- Komponente (1)
- Konfigurationsmanagement (1)
- Konfigurationsverwaltung (1)
- Kontaktloses Hardware-System (1)
- Kraftfahrzeugbau (1)
- Kundenmanagement (1)
- Künstliche Intelligenz (1)
- LDAP (1)
- LVP (1)
- Laser-Sensor (1)
- Laserimpuls (1)
- Lasermesstechnik (1)
- Layout (1)
- Lehrveranstaltungsplan (1)
- Lernprogramm (1)
- Link Handler (1)
- Logimatik TM/3 (1)
- Logopädie (1)
- Lohn (1)
- Lohnsteuer (1)
- Lohnsteuerabzug (1)
- Low-pass filters (1)
- Lösung (1)
- MIDP (1)
- Machine learning (2)
- Marktanalyse (1)
- Maschinelles Lernen (1)
- Medical systems (1)
- Mess- und Steuerungssystem ; DDNA (1)
- Mimik (1)
- Mobile-Agenten (1)
- Mobilfunk (1)
- Mobilfunkprotokoll (1)
- Model View Controller (1)
- Monitoring (1)
- Monitoring <Informatik> (1)
- Movement detection (3)
- Multinomial logistic regression (2)
- Mund-Kiefer-Gesichtsbereich (1)
- MySQL 4.0 (1)
- Müdigkeitserkennung (1)
- Namenskonvention (1)
- Navigation (1)
- Navigieren (1)
- Nebenstellenanlage (1)
- Neuronal Netze (1)
- Neuronales Netz (1)
- Nokia (1)
- Non-invasive (1)
- Non-invasive sleep study (2)
- Nortel Meridian (1)
- OLAP (1)
- OSE (1)
- Oberflächeninspektion von Pressteilen (1)
- Oberflächenprüfung (1)
- Objektorientierung (1)
- OnTechnology ; CCM ; OnCommand ; Deployment Werkzeuge ; unattended Setup (1)
- Organisationsform (1)
- Outlook (1)
- PHP (1)
- PPG (1)
- PSG (1)
- PSQI (1)
- Pattern recognition (1)
- Pflichtenheft (1)
- Photoplethysmography (1)
- Physical activity (1)
- Physiognomik (1)
- Point Operations (1)
- Portal (1)
- Portal-Komponenenten (1)
- Posture tracking (1)
- PowerPC (1)
- Pressure sensor (1)
- Pressure sensors (2)
- Privacy by Design (1)
- Probabilistic modeling (1)
- Probability of Exploitation (1)
- Produktion (1)
- Produkttest (1)
- Programmierstil (1)
- Programmierumgebung (1)
- Prozesskette (1)
- Prozessleitsystem (1)
- Prozessmanagement (1)
- Prozessmodell (1)
- Punktoperationen (1)
- Qt (1)
- Qualitätsmanagement (1)
- Qualitätssicherung (1)
- Qualitätssicherung im Automobilbau (1)
- Quellenabzug (1)
- Quellenprinzip (1)
- RMI (1)
- Releasemanagement (1)
- Remediation Strategies (1)
- Remote Access (1)
- Requirements Engineering (1)
- Residual Neural Network (1)
- Respiration Rate (1)
- Respiration rate (1)
- Respiratory sounds (1)
- Roboter (2)
- SAP AG (1)
- SAP Enterprise Portal (1)
- SAP LE-TRA (1)
- SAP R/3 (1)
- SAP Vertriebs-Manager-Portal (1)
- SAX <Programmierumgebung> (1)
- SOAP <Protokoll> (1)
- SPICE <Programm> (1)
- SQL (1)
- SQL Injection (1)
- SVG (1)
- Sales Performance Analyse (1)
- Schlaf (1)
- Schlafanalyse (4)
- Schlafphasen (1)
- Schlafphasenerkennung (1)
- Schlafstadien (1)
- Schlafstudie (1)
- Schriftzeichenerkennung (1)
- Schweizerische Versicherungs-Gesellschaft (1)
- Scoring Systems (1)
- SeMoA (1)
- Security by Design (1)
- Seitenformatierung (1)
- Seitenlayout (1)
- Selbstorganisierende Karte (1)
- Sensor Bed (1)
- Sensor grid (1)
- Sensors (1)
- Sicherheit (1)
- Signal acquisition (1)
- Signal processing (3)
- Skin (1)
- Sleep (2)
- Sleep Stages (1)
- Sleep apnea (1)
- Sleep apnoea (1)
- Sleep efficiency (1)
- Sleep latency (1)
- Sleep medicine (3)
- Sleep phase (1)
- Sleep positions (2)
- Sleep quality (3)
- Sleep stage classification (1)
- Sleep stages (2)
- Sleep study (11)
- Sleep tracking (1)
- Sleep/Wake states (1)
- Smart Home (1)
- Smart bed (1)
- Smart cushion (1)
- Smart home (1)
- Smart-care (1)
- Softwareentwicklung (2)
- Softwareentwicklung / Projekt (1)
- Softwarekomponenten (1)
- Softwareproduktionsumgebung (1)
- Sprachstörung (1)
- Static Code Analysis (1)
- Statistics (1)
- Stethoscope (1)
- Steuerung (1)
- Stress (3)
- Stress detection (2)
- Stress measurement (1)
- Struts (1)
- Swing (1)
- System design (1)
- TSAPI (1)
- TSN (1)
- Tauchen (1)
- Tauchphysik (1)
- Telemedicine (2)
- Test (1)
- Test Suite (1)
- Transistortechnologie (1)
- Transportproblem (1)
- Transportsteuerung (1)
- Treiber <Programm> (1)
- Un-certainty (1)
- Unterstützungssystem <Informatik> (1)
- Update (1)
- Verbindungsoptimierung (1)
- Vergleich (1)
- Versionsverwaltung (1)
- Verteiltes System (1)
- Visual C++ (1)
- VisualBASIC für Applikationen (1)
- Vulnerability Prioritization (1)
- WML (1)
- WSDL (1)
- Wearable (1)
- Web Services (3)
- WebObjects 5 (1)
- Webanwendung (1)
- Winterthur (1)
- Wissensmanagement (1)
- World wide web (1)
- XML (6)
- XML-Anwendungsdeskriptor (1)
- XPath (1)
- XSL (1)
- XSL-FO (2)
- XSLT (2)
- Zeichenerkennung (1)
- Zeitreihenklassifikation (1)
- Zürcher Kantonalbank (1)
- chat system (1)
- distance measurement (1)
- dual-ported RAM (1)
- facial expression recognition ; action unit recognition (1)
- integrierte Java Laufzeitumgebung (1)
- istant messaging system (1)
- low-level feature extraction (1)
- mySAP Enterprise Portal (1)
- pFlow (1)
- support vector machines (1)
Institute
- Fakultät Informatik (121) (remove)
IT-Compliance in KMU
(2023)
This thesis emphasizes problems that reports generated by vulnerability scanners impose on the process of vulnerability management, which are a. an overwhelming amount of data and b. an insufficient prioritization of the scan results.
To assist the process of developing means to counteract those problems and to allow for quantitative evaluation of their solutions, two metrics are proposed for their effectiveness and efficiency. These metrics imply a focus on higher severity vulnerabilities and can be applied to any simplification process of vulnerability scan results, given it relies on a severity score and time of remediation estimation for each vulnerability.
A priority score is introduced which aims to improve the widely used Common Vulnerability Scoring System (CVSS) base score of each vulnerability dependent on a vulnerability’s ease of exploit, estimated probability of exploitation and probability of its existence.
Patterns within the reports generated by the Open Vulnerability Assessment System (OpenVAS) vulnerability scanner between vulnerabilities are discovered which identify criteria by which they can be categorized from a remediation actor standpoint. These categories lay the groundwork of a final simplified report and consist of updates that need to be installed on a host, severe vulnerabilities, vulnerabilities that occur on multiple hosts and vulnerabilities that will take a lot of time for remediation. The highest potential time savings are found to exist within frequently occurring vulnerabilities, minor- and major suggested updates.
Processing of the results provided by the vulnerability scanner and creation of the report is realized in the form of a python script. The resulting reports are short, straight to the point and provide a top down remediation process which should theoretically allow to minimize the institutions attack surface as fast as possible. Evaluation of the practicality must follow as the reports are yet to be introduced into the Information Security Management Lifecycle.
Dynamic Real-Time Range Queries (DRRQ) are a common means to handle mobile clients in high-density areas where both, clients requested by the query and the inquirers, are mobile. In contrast to the very well-known continuous range queries, only a few approaches, such as Adaptive Quad Streaming (AQS), address the mandatory scalability and real-time requirements of these so-called ad-hoc mobility challenges. In this paper we present the highly decentralized solution Adaptive Quad Streaming Flexible (AQSflex) as an extension of the already existing more theoretical AQS approach. Beside a highly distributed cell structure without data structures and a lightweight streaming communication, we use a multi-cell-assignment on limited pool resources instead of an idealistic unlimited cell-per-server assignment. The described experimental results show the potential of our local capacity balancing scheme for cell handover in a strongly decentralized setting. Leafs of a cell hierarchy define a kind of self-optimizing fuzzy edge for the processing resources in high-density systems without any centralized controlling or cloud component.
The influence of sleep on human life, including physiological, psychological, and mental aspects, is remarkable. Therefore, it is essential to apply appropriate therapy in the case of sleep disorders. For this, however, the irregularities must first be recognised, preferably conveniently for the person concerned. This dissertation, structured as a composition of research articles, presents the development of mathematically based algorithmic principles for a sleep analysis system. The particular focus is on the classification of sleep stages with a minimal set of physiological parameters. In addition, the aspects of using the sleep analysis system as part of the more complex healthcare systems are explored. Design of hardware for non-obtrusive measurement of relevant physiological parameters and the use of such systems to detect other sleep disorders, such as sleep apnoea, are also referred to. Multinomial logistic regression was selected as the basis for development resulting from the investigations carried out. By following a methodical procedure, the number of physiological parameters necessary for the classification of sleep stages was successively reduced to two: Respiratory and Movement signals. These signals might be measured in a contactless way. A prototype implementation of the developed algorithms was performed to validate the proposed method, and the evaluation of 19324 sleep epochs was carried out. The results, with the achieved accuracy of 73% in the classification of Wake/NREM/REM stages and Cohen's kappa of 0.44, outperform the state of the art and demonstrate the appropriateness of the selected approach. In the future, this method could enable convenient, cost-effective, and accurate sleep analysis, leading to the detection of sleep disorders at an early stage so that therapy can be initiated as soon as possible, thus improving the general population's health status and quality of life.
Die digitale Transformation von Geschäftsprozessen und die stärkere Einbindung von IT-Systemen erzeugen bei kleinen und mittelständischen Unternehmen (KMU) Chancen und Risiken zugleich. Risiken, die insbesondere in einer fehlenden IT-Compliance resultieren können. Wie Studien zeigen, sind KMU in Bezug auf IT-Compliance-Maßnahmen im Vergleich zu kapitalmarktorientierten Unternehmen jedoch im Rückstand [1]. Im Beitrag wird mithilfe von Experteninterviews und einer qualitativen Datenanalyse der Frage nachgegangen, welcher Status quo an Maßnahmen aktuell implementiert und wie der empfundene Compliance-Reifegrad ist. Weiterhin werden die Gründe und Motive erörtert, die zu diesem Zustand geführt haben. Letztlich sind Treiber identifiziert worden, die zu einem höheren Bewusstsein in der Zukunft führen können. Die Arbeit zeigt interessante Erkenntnisse aus der Praxis, da die Experteninterviews Einblicke in den aktuellen Status quo in Bezug auf IT-Compliance liefern.
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis
(2022)
Synthetic static code analysis test suites are important to test the basic functionality of tools. We present a framework that uses different source code patterns to generate Cross Site Scripting and SQL injection test cases. A decision tree is used to determine if the test cases are vulnerable. The test cases are split into two test suites. The first test suite contains 258,432 test cases that have influence on the decision trees. The second test suite contains 20 vulnerable test cases with different data flow patterns. The test cases are scanned with two commercial static code analysis tools to show that they can be used to benchmark and identify problems of static code analysis tools. Expert interviews confirm that the decision tree is a solid way to determine the vulnerable test cases and that the test suites are relevant.
Der Gegenstand dieser Bachelorarbeit ist die automatisierte Extraktion von Polygonzügen anhand eines Grundrissbildes. Diese Polygonzüge sollen die Räumlichkeiten wiedergeben. In dieser Bachelorarbeit wurde daher ein Algorithmus für die Grundrissbildverarbeitung mittels Python entwickelt und implementiert. Zuerst wird ein Grundrissbild bereinigt, d. h. es werden unerwünschte Bildstrukturen verwaschen. Mithilfe des Canny-Kantendetektors werden anschließend die Kanten detektiert. Danach werden die Ecken im Grundrissbild via Harris-Eckendetektor lokalisiert. Um die Ecken sinnvoll zu verbinden, wird eine abgewandelte Form des Dijkstra Algorithmus herangezogen. Die daraus gewonnen Daten dienen zur Erstellung der Polygonzüge, welche für die Simulation von pFlow benötigt werden. Der entwickelte Algorithmus eignet sich insbesondere für klare und simple Grundrissbilder.
Interpretability and uncertainty modeling are important key factors for medical applications. Moreover, data in medicine are often available as a combination of unstructured data like images and structured predictors like patient’s metadata. While deep learning models are state-of-the-art for image classification, the models are often referred to as ’black-box’, caused by the lack of interpretability. Moreover, DL models are often yielding point predictions and are too confident about the parameter estimation and outcome predictions.
On the other side with statistical regression models, it is possible to obtain interpretable predictor effects and capture parameter and model uncertainty based on the Bayesian approach. In this thesis, a publicly available melanoma dataset, consisting of skin lesions and patient’s age, is used to predict the melanoma types by using a semi-structured model, while interpretable components and model uncertainty is quantified. For Bayesian models, transformation model-based variational inference (TM-VI) method is used to determine the posterior distribution of the parameter. Several model constellations consisting of patient’s age and/or skin lesion were implemented and evaluated. Predictive performance was shown to be best by using a combined model of image and patient’s age, while providing the interpretable posterior distribution of the regression coefficient is possible. In addition, integrating uncertainty in image and tabular parts results in larger variability of the outputs corresponding to high uncertainty of the single model components.