Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (237)
- Konferenzveröffentlichung (216)
- Teil eines Buches (Kapitel) (32)
- Sonstiges (31)
- Video (14)
- Buch (Monographie) (13)
- Preprint (12)
- Dissertation (4)
- Bericht (4)
- Arbeitspapier (4)
Sprache
- Englisch (572) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Dissipative Particle Dynamics (4)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Deep Learning (3)
- Erweiterte Realität <Informatik> (3)
- Gespenstschrecken (3)
- Haftorgan (3)
- OCSR (3)
- stick insects (3)
- Augmented Reality (2)
- CDK (2)
- Competency-Oriented Exams (2)
- DECIMER (2)
- Deep learning (2)
- Electrodeposition (2)
- Field measurement (2)
- Human-Robot Interaction (2)
- OCSR, Optical Chemical Structure Recognition (2)
- Solar modules (2)
- Transformer (2)
- Twitter <Softwareplattform> (2)
- biomimicry (2)
- hydraulic compression (2)
- modular stack design (2)
- open quantum systems (2)
- social innovation (2)
- water electrolysis (2)
- carbon nanofibers, platinum electrodeposition, ele ctrochemical surface area (1)
- 360 degree Feedback (1)
- 360° Panorama (1)
- AEM-Electrolysis (1)
- AI (1)
- API 1130 (1)
- Additive manufacturing Directed energy deposition-arc 316L stainless steel Corrosion behavior Electrochemical corrosion (1)
- Aerosol (1)
- Aggregation-prone (1)
- Air handling unit (1)
- AlphaFold, ColabFold, PyMOL (1)
- Alternative Geschäftsmodelle (1)
- Amylase, Enzymcharakterisierung (1)
- Anorganische Analyse (1)
- Artificial Intelligence (1)
- Assessment Center (1)
- Assisted living technologies (1)
- Assistive robotics (1)
- Augmented (1)
- Augmented Electromagnetic Accelerators (1)
- Augmented Multiphase (1)
- Augmented Multiphase Rail Launcher (1)
- Augmented Three-Phase AC-Railgun (1)
- Autonomous Agents (1)
- Bildverarbeitung (1)
- Biomechanics (1)
- Biomedical monitoring, Hospitals, Electrocardiography, Wireless communication, Patient monitoring, Wireless sensor networks (1)
- Biomimetics (1)
- Bone Morphogenetic Protein, BMP, BMP2 (1)
- Bone morphogenetic protein 2 (1)
- Brand theory (1)
- CFD Simulation (1)
- COIL (1)
- CPM (1)
- Carboxylate (1)
- Case-Study (1)
- Catalysis (1)
- Cell-free implant (1)
- Chemical image depiction (1)
- Chemical space (1)
- Chemical structure depictions (1)
- Cheminformatics (1)
- Chemistry Development Kit (1)
- Chemistry Development Kit, CDK, Molecule fragmentation, In silico fragmentation, Scaffolds, Functional groups, Glycosidic moieties, Rich client, Graphical user interface, GUI (1)
- Chief Executive Officer (1)
- Climate change (1)
- Clustering (1)
- Codegenerierung (1)
- Communication management (1)
- Constructive Alignment (1)
- Continuous Assessment (1)
- Continuous Queries (1)
- Cookie <Internet> (1)
- Cr(VI) and Zn(II) cations (1)
- Crowdfunding (1)
- Current Pulses (1)
- DPD, Dissipative Particle Dynamics (1)
- Data Collection (1)
- Data Journalism (1)
- Datalog (1)
- Datenjournalismus (1)
- Datensatz (1)
- Datenschutz (1)
- Deductive Databases (1)
- Depiction generator image augmentation (1)
- Deutschland / Technische Regeln für brennbare Flüssigkeiten (1)
- Dissipative particle dynamics, DPD, Surfactant, Bilayer, Lamellar, Simulation, Mesoscopic (1)
- Distributed Software Development (1)
- E. coli SHuffle® T7 (1)
- Elastizitätsmodul (1)
- Electrolysis (1)
- Electromagnetic Launcher (1)
- Elektrodenvorbereitung (1)
- Energy Storage Mode (1)
- Enterprise JavaBeans (1)
- Erneuerbare Energien (1)
- Europe (1)
- Evidence-based Management (1)
- Exams with Third-Party Applications (1)
- Fehlererkennung (1)
- Fehlerortung (1)
- Flat-Channel (1)
- Flipped Classroom (1)
- Flory-Huggins parameter (1)
- Flügelform (1)
- Formative Assessment (1)
- Fragmentation (1)
- Future capacity needs (1)
- Gas Diffusion Electrode (1)
- Greek dept crisis (1)
- Hand-drawn chemical structures (1)
- Hand-drawn images (1)
- Hands-free Interaction (1)
- High Reynold Numer (1)
- Homogene Kühlung (1)
- Human-centered computing (1)
- Hydraulic cell compression (1)
- Hydraulic compression, Carbon Nano Fibers, PEM Fuel Cells, Catalyst utilization (1)
- Hydrogen evolution reaction (1)
- Hydrophilicity enhanced hBMP2 variant (1)
- ICP-Massenspektrometrie (1)
- Implantat (1)
- In-silico-design (1)
- Incremental Evaluation (1)
- Indigo (1)
- Interactive Voting Systems (1)
- Intercultural Collaboration (1)
- Journalismus (1)
- Juristenausbildung (1)
- Kalman filter (1)
- Kernspintomografie (1)
- Kohlenstoff (1)
- Kohlenstoff-Nanoröhre (1)
- Laser Synthesis Electrocatalytic Water Splitting (1)
- Launcher (1)
- Leadership Competencies (1)
- Leak detection (1)
- Leckerkennung (1)
- Leckortung (1)
- Lecksuchgerät (1)
- Lecküberwachung (1)
- Linear Electromagnetic Accelerator (1)
- Lüftungsanlage (1)
- MITRE (1)
- Machine Learning (1)
- Magnetic Pressure (1)
- Mapping (1)
- Maus (1)
- Media Brands (1)
- Media brand characteristics (1)
- Media positioning (1)
- Membrane (1)
- Methodology (1)
- Middle-range Theory (1)
- Mikrofotografie (1)
- Mixed Reality (1)
- Modular Augmented Launcher (1)
- Modular Design (1)
- Molecule images (1)
- Multi-Agent System (1)
- Multiphase Rail Launcher (1)
- Mund-Nasen-Schutz (1)
- Muzzle Velocity (1)
- N,N,O Ligands (1)
- N,N′ Ligands (1)
- Nanofaser (1)
- Natural products (1)
- Naturstoff (1)
- NeRF (1)
- New Public Governance (1)
- New Public Management (1)
- New Work, Information and Communication Industry, Innovation, Organizational Goals, Survey (1)
- Ni-Mo alloy Catalyst (1)
- NiCrBSi coatings; flame spraying; induction remelting; wear resistance (1)
- Normalisierung (1)
- ORR OER (1)
- OSINT (1)
- Object Recognition (1)
- Object-relational Mapping (1)
- Objektverfolgung (1)
- Ohrwurm (1)
- Online Programming Exams (1)
- Online Supervision (1)
- Online-Werbung (1)
- Optical Chemical Structure Recognition (1)
- Ortsbestimmung (1)
- PEM Electrolysis, Hydrogen, Hydraulic Compression, High Pressure (1)
- PEM electrolysis (1)
- PEM fuel cell (1)
- PEM fuel cell electrocatalysts, Carbon nanofibers, Oxygen plasma activation, Pulsed electroplating. (1)
- PEM fuel cells (1)
- PEM water electrolysis (1)
- PEM-Brennstoffzelle (1)
- PEMWE (1)
- Peer Assessment (1)
- Peer Instruction (1)
- People with disabilities (1)
- Performance prediction (1)
- Persistenz <Informatik> (1)
- Physics-Informed Deep Learning (1)
- Physics-informed deep learning; unsupervised learning; Reynolds-averaged Navier-Stokesequations; high Reynolds number flow; turbulence modeling (1)
- Politische Berichterstattung (1)
- Polymere (1)
- Porous Transport Layers (1)
- Powder feed rate HVOF Cermet Wear Corrosion (1)
- Privatsphäre (1)
- Project-based Learning (1)
- PtCoMn (1)
- RDKit (1)
- RIS (1)
- Rail Launcher (1)
- Railgun (1)
- Regeln der Technik (1)
- Rescue Robotics (1)
- Robot assistive drinking (1)
- Robot assistive eating (1)
- Rwanda (1)
- SARS-CoV-2 (1)
- Sauerstoffplasmaaktivierung (1)
- Scaffold (1)
- Scaffold network (1)
- Scaffold tree (1)
- Segmentation; Correlation; Diseases; Convolutional Neural Networks (1)
- Semi-Infinite Plate (1)
- Sinusoidal (1)
- Small UAVs (1)
- Smart Grid (1)
- Social Innovation (1)
- Social Learning (1)
- Social Media (1)
- Spondylodese (1)
- Stack <Brennstoffzelle> (1)
- Stellite 6; HVOF-spraying; Laser remelting; Cavitation erosion; Coatings (1)
- Student Activation (1)
- TRFL (1)
- Temperature coefficients (1)
- Ternary alloy catalyst preparation (1)
- Tetraplegie (1)
- Thermal Performance (1)
- Thermal Stress (1)
- Titanium; Al2O3–TiO2 coatings; Nanoindentation (1)
- Tracking (1)
- Transformative Teaching (1)
- Twitter (1)
- Update Propagation (1)
- Upscaling laboratory models (1)
- Urban heat island (1)
- Visual Monocular SLAM (1)
- Young´s modulus (1)
- Zinc (1)
- Zustandsmaschine (1)
- academic and job-related self-control demands (1)
- activated sludge (1)
- additive manufacturing; polylactic acid (PLA); fused filament fabrication (FFF); fused deposition modeling (FDM); printing temperature; filament color; dimensional accuracy; tensile strength; friction performance; wear (1)
- advanced persistent threats (1)
- aerosol (1)
- air hygiene (1)
- airborne infection (1)
- antecedents (1)
- artificial intelligence (1)
- assistive robotics (1)
- augmented reality (1)
- bacterial toxicity (1)
- balance (1)
- barrel cortex, cell types, multielectrode recordings, perception, psychophysics (1)
- bio-inspired functional surface (1)
- bioinspired (1)
- biomimetic (1)
- biomimetic materials (1)
- biomimetics; functional morphology; plant biomechanics; plant motion; strain analysis; structure–function relationship; 3D digital image correlation (3D-DIC); Hakea sericea; Hakea salicifolia (1)
- bipolar plate (1)
- blockchain (1)
- bloxberg (1)
- carbon nano fibres (1)
- carbon nanofibers, platinum electrodeposition, electrocatalysts (1)
- cartilage defect (1)
- cartilage regeneration (1)
- chlorinated phenols (1)
- cluster (1)
- co-based alloys; hot corrosion; solid particle erosion; microstructure; brazing (1)
- coatings (1)
- cobot (1)
- collaborative online international learning (COIL) (1)
- compassionate love (1)
- composition (1)
- conical intersection (1)
- consent banner (1)
- cookie banner (1)
- cookies (1)
- corrosion resistance (1)
- corrosion; self-fluxing alloys; NiCrBSi; WC-12Co; cavitation; hard metals (1)
- critical review (1)
- cyber kill chain (1)
- demagnetization cooling (1)
- design process (1)
- distributed software development (1)
- diversity (1)
- dlt (1)
- dynamic capabilities (1)
- education; skills; competences; pandemic; online or face-to-face (1)
- efficiency of exciton transfer (1)
- electrode preparation (1)
- empowerment (1)
- entrepreneurial diversity (1)
- entrepreneurship (1)
- ethereum (1)
- ethics (1)
- excitation energy transfer (1)
- expert interviews (1)
- face mask (1)
- farming (1)
- fused deposition modeling (FDM); fused filament fabrication (FFF); polylactic acid (PLA); layer height; layer thickness; filament color; PLA color; dimensional accuracy; tensile strength (1)
- gender stereotypes (1)
- gender-sensitive design (1)
- gender-specific design (1)
- human robot interaction (1)
- human-centered design (1)
- human-robot collaboration (1)
- hybrid sensor system (1)
- hydraulic cell compression (1)
- infrared heating panel (1)
- ingots (1)
- innovation (1)
- intercultural collaboration (1)
- interdisciplinary students project (1)
- intermolecular interaction (1)
- international comparative study (1)
- intersectionality (1)
- irritation (1)
- leak locating (1)
- leak monitoring (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- machine learning (1)
- managerial vs. non-managerial actors (1)
- measurement study (1)
- media accountability (1)
- microfoundations (1)
- molecular force field (1)
- multi-level model of competence (1)
- narcissism (1)
- neutrality (1)
- nonadiabatic dynamics (1)
- noncommuting fluctuations (1)
- nonequilibrium quantum transport (1)
- normalisation (1)
- novel (1)
- open science (1)
- optical chemical structure recognition (1)
- oxygen plasma activation (1)
- pH-shift elution (1)
- participatory design (1)
- phishing (1)
- photovoltaic power systems (1)
- poa (1)
- poe (1)
- policymakers (1)
- political journalism (1)
- polymer electrolyte membrane (1)
- privacy (1)
- product development (1)
- project-based learning (1)
- projection (1)
- protein structure prediction (1)
- public policy (1)
- quality standards (1)
- quantum dissipation (1)
- reconnaissance (1)
- relevance (1)
- respiration inhibition (1)
- risk management (1)
- role identity (1)
- self-fluxing; ZrO2; NiCrBSi; vacuum post-treatment; thermal spraying (1)
- sensor fusion (1)
- servant leadership (1)
- shared user control (1)
- silicon (1)
- solar cells (1)
- solution finding (1)
- spatial policy (1)
- state machine (1)
- study and working time per week (1)
- sustainable development (1)
- television news coverage (1)
- theorising (1)
- trait self-control (1)
- transport (1)
- tree frog (1)
- user acceptance (1)
- ventilation (1)
- vibronic coupling (1)
- virtual reality (1)
- visual cues (1)
- visualization techniques (1)
- watchblogs (1)
- web measurement (1)
- Änderung (1)
Institut
- Westfälisches Institut für Gesundheit (115)
- Westfälisches Energieinstitut (61)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Institut für biologische und chemische Informatik (44)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
- Maschinenbau und Facilities Management (13)
- Institut für Innovationsforschung und -management (11)
- Fachbereiche (9)
- Wirtschaftsrecht (9)
- Mechatronik-Institut Bocholt (2)
- Strategische Projekte (2)
- Institute (1)
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed.
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.
Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e.g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021.
Measurement studies are essential for research and industry alike to understand the Web’s inner workings better and help quantify specific phenomena. Performing such studies is demanding due to the dynamic nature and size of the Web. An experiment’s careful design and setup are complex, and many factors might affect the results. However, while several works have independently observed differences in
the outcome of an experiment (e.g., the number of observed trackers) based on the measurement setup, it is unclear what causes such deviations. This work investigates the reasons for these differences by visiting 1.7M webpages with five different measurement setups. Based on this, we build ‘dependency trees’ for each page and cross-compare the nodes in the trees. The results show that the measured trees differ considerably, that the cause of differences can be attributed to specific nodes, and that even identical measurement setups can produce different results.
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.