004 Informatik
Refine
Year of publication
Document Type
- Conference Proceeding (93)
- Article (68)
- Bachelor Thesis (46)
- Report (22)
- Master's Thesis (15)
- Working Paper (10)
- Book (3)
- Part of a Book (3)
- Other (1)
- Preprint (1)
Language
- English (143)
- German (118)
- Multiple languages (1)
Is part of the Bibliography
- no (262)
Keywords
- Computersicherheit (23)
- Künstliche Intelligenz (19)
- E-Learning (18)
- Digitalisierung (13)
- Programmierung (13)
- Benutzererlebnis (12)
- Computerunterstütztes Lernen (12)
- Grader (11)
- IT-Sicherheit (11)
- Angewandte Botanik (10)
Institute
- Fakultät IV - Wirtschaft und Informatik (191)
- Fakultät III - Medien, Information und Design (40)
- Fakultät I - Elektro- und Informationstechnik (34)
- Data|H - Institute for Applied Data Science Hannover (8)
- ISA - Institut für Sensorik und Automation (5)
- Sonstige Einrichtungen (3)
- Fakultät II - Maschinenbau und Bioverfahrenstechnik (2)
Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
(2024)
Advanced persistent threat (APT) attacks present a significant challenge for any organization, as they are difficult to detect due to their elusive nature and characteristics. In this article, we conduct a comprehensive literature review to investigate the various APT attack detection systems and approaches and classify them based on their threat model and detection method. Our findings reveal common obstacles in APT attack detection, such as correctly attributing anomalous behavior to APT attack activities, limited availability of public datasets and inadequate evaluation methods, challenges with detection procedures, and misinterpretation of requirements. Based on our findings, we propose a reference architecture to enhance the comparability of existing systems and provide a framework for classifying detection systems. In addition, we look in detail at the problems encountered in current evaluations and other scientific gaps, such as a neglected consideration of integrating the systems into existing security architectures and their adaptability and durability. While no one-size-fits-all solution exists for APT attack detection, this review shows that graph-based approaches hold promising potential. However, further research is required for real-world usability, considering the systems’ adaptability and explainability.
This article looks at a proposed list of generalized requirements for a unified modelling of event processing networks (EPNs) and its application to Microsoft Azure Stream Analytics. It enhances our previous work in this area, in which we recently analyzed Apache Storm, Amazon Kinesis Data Analytics and earlier also the EPiA model, the BEMN model, and the RuleCore model. Our proposed EPN requirements look at both: The logical model of EPNs and the concrete technical implementation of them. Therefore, our article provides requirements for EPN models based on attributes derived from event processing in general as well as existing models. Moreover, as its core contribution our article applies those requirements by an in depth analysis of Microsoft Azure Stream Analytics as a concrete implementation foundation of an EPN model.
We present a novel approach for simulating eclipses, incorporating effects of light scattering and refraction in the occluder's atmosphere. Our approach not only simulates the eclipse shadow, but also allows for watching the Sun being eclipsed by the occluder. The latter is a spectacular sight which has never been seen by human eyes: For an observer on the lunar surface, the atmosphere around Earth turns into a glowing red ring as sunlight is refracted around the planet. To simulate this, we add three key contributions: First, we extend the Bruneton atmosphere model to simulate refraction. This allows light rays to be bent into the shadow cone. Refraction also adds realism to the atmosphere as it deforms and displaces the Sun during sunrise and sunset. Second, we show how to precompute the eclipse shadow using this extended atmosphere model. Third, we show how to efficiently visualize the glowing atmosphere ring around the occluder. Our approach produces visually accurate results suited for scientific visualizations, science communication, and video games. It is not limited to the Earth‐Moon system, but can also be used to simulate the shadow of Mars and potentially other bodies. We demonstrate the physical soundness of our approach by comparing the results to reference data. Because no data is available for eclipses beyond the Earth‐Moon system, we predict how an eclipse on a Martian moon will look like. Our implementation is available under the terms of the MIT license.
Mit zunehmender Komplexität der Lieferketten durch Globalisierung und Entwicklung der Technologie steigt auch die Notwendigkeit des Austausches von Informationen zwischen kooperierenden, aber unabhängigen Unternehmen. Dabei stehen sie vor der Herausforderung, eine Balance zwischen der erforderlichen Transparenz zur übergreifenden Optimierung der Lieferkette und dem Schutz sensibler Daten aus ihren Produktionssystemen zu finden. Angesichts zunehmender Bedrohungen durch Cyberkriminalität, von gezielten Angriffen auf Produktionssysteme bis hin zum Datendiebstahl geistigen Eigentums, ist der Schutz digitaler Infrastrukturen für Unternehmen unverzichtbar. Im Rahmen des Teilprojekts „IT-Infrastruktur und IT-Sicherheit“ hat das Zukunftslabor Produktion den Prototyp einer Unterstützungsplattform für einen unternehmensübergreifenden Datenaustausch unter Bewahrung von Datensouveränität entwickelt und zusammen mit Praxispartnern evaluiert. Ihre Funktionsweise wird in diesem Beitrag erläutert, der den vierten und letzten einer Serie bildet, in der die Projektpartner jeweils ihre Teilergebnisse vorstellen.
With this systematic literature review we investigate the use of graphical tools and standard notations, such as the Business Process Modelling Notation (BPMN) and the Unified Modelling Language (UML), in the development of simulations. In our review, we focus on different simulation methods, such as agentbased simulation, discrete event simulation, system dynamic simulation and hybrid simulation approaches. We examine more than 1.000 scientific articles, which cover simulation approaches in the area of operations management and business. Our results provide insights into the frequency of the use of notations in simulation development, the relationship between notations and simulation methods and secondarily the frequency of used simulation methods in the business environment.
In diesem Beitrag wird zunächst ein Reifegradmodell zur Messung des Digitalisierungsgrades von landwirtschaftlichen Betrieben vorgeschlagen. Es basiert auf bestehenden Reifegradmodellen, welche an die landwirtschaftlichen Besonderheiten angepasst wurden. Im zweiten Teil werden die Ergebnisse einer Befragung von 151 Landwirten in Deutschland geschildert, in der sich Landwirte mit den Stufen des Reifegradmodells identifizieren sollten. Zusätzlich wurde gefragt, warum sich Landwirte in einen bestimmten Reifegrad eingruppiert haben und was sie daran hindert, einen höheren Reifegrad zu erreichen.
Agile methods are state of the art in software development. Companies worldwide apply agile to counter the dynamics of the markets. We know, that various factors like culture influence the successful application of agile methods in practice and that sucess varies from company to company. To counter these problems, we combine two causal models presented in literature: The Agile Practices Impact Model and the Model of Cultural Impact. In this paper, we want to better understand the two facets of factors in agile: Those influencing their application and those impacting the results when applying them. This papers core contribution is the Agile Influence and Impact Model, describing the factors influencing agile elements and the impact on specific characteristics in a systematic manner.
Event-driven architectures (EDA) have been proposed as a new architectural paradigm for event-based systems to process complex event streams. However, EDA have not yet reached the maturity of well-established software architectures because methodologies, models and standards are still missing. Despite the fact that EDA-based systems are essentially built on events, there is a lack of a general event modelling approach. In this paper we put forward a semantic approach to event modelling that is expressive enough to cover a broad variety of domains. Our approach is based on semantically rich event models using ontologies that allow the representation of structural properties of event types and constraints between them. Then, we argue in favour of a declarative approach to complex event processing that draws upon well established rule languages such as JESS and integrates the structural event model. We illustrate the adequacy of our approach with relation to a prototype for an event-bas ed road traffic management system.
Entwurf einer zukunftsfähigen Architektur für einen H5P-Inhaltstypen am Beispiel einer Lernanwendung
(2024)
In dieser Bachelorarbeit wird eine zukunftsfähige Architektur für einen H5P-Inhaltstyp am Beispiel der Lernanwendung „Collect Skills“ entwickelt. Ziel der Arbeit ist es, zu klären, wie eine Softwarearchitektur für H5P-Inhaltstypen so gestaltet werden kann, dass Aspekte wie Wartbarkeit, Modularität und Wiederverwendbarkeit verbessert werden.
Zu Beginn wird eine Analyse der bestehenden Architektur durchgeführt, wobei technologische Schwachstellen und Optimierungspotenziale identifiziert werden. Basierend auf den gewonnenen Erkenntnissen werden Anforderungen an eine nachhaltige und erweiterbare Softwarearchitektur definiert. Im weiteren Verlauf werden alternative Architekturen evaluiert und ein komponentenbasiertes Architekturkonzept auf Basis von React implementiert. Anschließend wurden die ursprüngliche Anwendung und die neue Anwendung anhand zuvor definierter Kriterien verglichen.
Die Ergebnisse zeigen, dass eine gezielte Verbesserung der Architektur die Zukunftsfähigkeit eines H5P-Inhaltstyps erheblich steigern kann. Die Wahl von React hat sich dabei als besonders vorteilhaft erwiesen.