@article{2017-Kroll_et_al-atp_edition-Modellfabrik_muPlant, abstract = {Modellfabriken werden mittlerweile häufig in Forschung und Lehre eingesetzt, aber über ihren Aufbau und ihre Funktionen ist wenig zu lesen. Im Beitrag wird eine Übersicht über in Deuschland vorhandene Modellfabriken gegeben. Zudem werden Details der selbst konzipierten und realisierten Modellfabrik µPlant vorgestellt. Diese besteht aus mehreren mit Transportrobotern verbundenen Produktionsinseln/-zellen, die jeweils lokal über angepasste Automatisierungssysteme verfügen. Alle Module sind stofflich und informationstechnisch integriert und die Modellfabrik kann voll automatisiert betrieben werden. Der Beitrag richtet sich an Personen mit Interesse an Aufbau, Beschaffung oder Nutzung von Modellfabriken}, author = {Kroll, Andreas and Dürrbaum, Axel and Arengas, David and {Al Mawla}, Hassan and Kistner, Lars and Rehmer, Alexander}, interhash = {c8ecef5f4d0cc0a00f1423dfb60f9adf}, intrahash = {b1bebca026d89fc2b7642adbca41fe78}, journal = {atp edition}, language = {german}, month = {September}, mrtnote = {peer, muPlant, FEE}, mrturla = {http://141.51.48.24/MRT/Bibliothek/Publikationen/2017-Kroll-atp-Modellfabrik_muPlant-PUB.pdf}, number = 9, owner = {duerrbaum}, pages = {40-53}, title = {µPlant: Eine automatisierungstechnisch-orientierte Modellfabrik für vernetzte heterogene Systeme}, url = {https://www.di-verlag.de/de/Zeitschriften/atp-edition/2017/09/Plant:-Modellfabrik-fuer-vernetzte-heterogene-Anlagen}, volume = 59, year = 2017 } @inproceedings{srinivasan2008protecting, abstract = {In this paper, we first present a new privacy leak in residential wireless ubiquitous computing systems, and then we propose guidelines for designing future systems to prevent this problem. We show that we can observe private activities in the home such as cooking, showering, toileting, and sleeping by eavesdropping on the wireless transmissions of sensors in a home, even when all of the transmissions are encrypted. We call this the Fingerprint and Timing-based Snooping (FATS) attack. This attack can already be carried out on millions of homes today, and may become more important as ubiquitous computing environments such as smart homes and assisted living facilities become more prevalent. In this paper, we demonstrate and evaluate the FATS attack on eight different homes containing wireless sensors. We also propose and evaluate a set of privacy preserving design guidelines for future wireless ubiquitous systems and show how these guidelines can be used in a hybrid fashion to prevent against the FATS attack with low implementation costs.}, address = {New York, NY, USA}, author = {Srinivasan, Vijay and Stankovic, John and Whitehouse, Kamin}, booktitle = {UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing}, doi = {10.1145/1409635.1409663}, interhash = {493934da14b0afdda73bdb91c145351c}, intrahash = {0efc5c0ef9a17c35402c654ff76247b0}, isbn = {978-1-60558-136-1}, location = {Seoul, Korea}, pages = {202--211}, publisher = {ACM}, title = {Protecting your daily in-home activity information from a wireless snooping attack}, url = {http://portal.acm.org/citation.cfm?id=1409663}, year = 2008 } @book{Hanson.2003, address = {Hershey, Pa.}, author = {Hanson, Ardis and Levin, Bruce Lubotsky}, interhash = {f6915fc805dae82555dbefc58faff1c1}, intrahash = {b4d3e3d8b80152119822c4c0b5ee7c62}, isbn = {1591401062}, publisher = {Information Science Pub}, title = {Building a virtual library}, url = {http://www.gbv.de/dms/goettingen/350592179.pdf}, year = 2003 }