Refine
Year of publication
- 2018 (347) (remove)
Document Type
- Conference Proceeding (84)
- Part of a Book (78)
- Bachelor Thesis (44)
- Article (reviewed) (41)
- Article (unreviewed) (26)
- Other (16)
- Book (13)
- Working Paper (12)
- Contribution to a Periodical (11)
- Master's Thesis (7)
- Letter to Editor (4)
- Patent (4)
- Report (3)
- Doctoral Thesis (2)
- Periodical Part (2)
Conference Type
- Konferenzartikel (62)
- Konferenz-Abstract (14)
- Konferenz-Poster (3)
- Sonstiges (3)
- Konferenzband (2)
Keywords
- Digitalisierung (13)
- Data Analytics (12)
- Industrie 4.0 (12)
- Social Media Marketing (12)
- Big Data (11)
- Fraud Analytics (11)
- Smart City (11)
- Surveillance (11)
- Autonomie (4)
- Betriebstypenmarke (3)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (143)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (104)
- Fakultät Wirtschaft (W) (47)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (44)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (17)
- INES - Institut für nachhaltige Energiesysteme (13)
- ACI - Affective and Cognitive Institute (7)
- CRT - Campus Research & Transfer (4)
- POIM - Peter Osypka Institute of Medical Engineering (2)
- WLRI - Work-Life Robotics Institute (2)
Open Access
- Closed Access (202)
- Open Access (102)
- Bronze (8)
- Closed (6)
- Diamond (1)
- Gold (1)
Cell lifetime diagnostics and system be-havior of stationary LFP/graphite lithium-ion batteries
(2018)
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
Benchmarking
(2018)
Online-Marktforschung
(2018)
Social CRM
(2018)