---
_id: '11915'
abstract:
- lang: eng
  text: With the human factor being identified as the weakest link in the chain of
    information security, we investigate the effects of the COVID-19 pandemic on approaches
    to develop awareness trainings. Following the literature approach of vom Brocke,
    we identify five focus areas in recent literature which we are able to divide
    further into supporting effects and human factors for information security awareness
    trainings. Furthermore, we identify research gaps in current literature which
    can inspire future investigations.
author:
- first_name: Robin
  full_name: Meister, Robin
  id: '81256'
  last_name: Meister
- first_name: Nadine
  full_name: Guhr, Nadine
  id: '77748'
  last_name: Guhr
  orcid: 0000-0001-8812-1488
citation:
  ama: 'Meister R, Guhr N. <i>Recent Insights in Information Security Awareness Training:
    A Systematic Literature Review </i>. (Association for Information Systems , ed.).
    WI; 2024:16.'
  apa: 'Meister, R., &#38; Guhr, N. (2024). Recent Insights in Information Security
    Awareness Training: A Systematic Literature Review . In Association for Information
    Systems  (Ed.), <i>Wirtschaftsinformatik 2024 Proceedings</i> (p. 16). WI.'
  bjps: '<b>Meister R and Guhr N</b> (2024) <i>Recent Insights in Information Security
    Awareness Training: A Systematic Literature Review </i>, Association for Information
    Systems  (ed.). Würzburg: WI.'
  chicago: 'Meister, Robin, and Nadine Guhr. <i>Recent Insights in Information Security
    Awareness Training: A Systematic Literature Review </i>. Edited by Association
    for Information Systems . <i>Wirtschaftsinformatik 2024 Proceedings</i>. Würzburg:
    WI, 2024.'
  chicago-de: 'Meister, Robin und Nadine Guhr. 2024. <i>Recent Insights in Information
    Security Awareness Training: A Systematic Literature Review </i>. Hg. von Association
    for Information Systems . <i>Wirtschaftsinformatik 2024 Proceedings</i>. Würzburg:
    WI.'
  din1505-2-1: '<span style="font-variant:small-caps;">Meister, Robin</span> ; <span
    style="font-variant:small-caps;">Guhr, Nadine</span> ; <span style="font-variant:small-caps;">Association
    for Information Systems </span> (Hrsg.): <i>Recent Insights in Information Security
    Awareness Training: A Systematic Literature Review </i>. Würzburg : WI, 2024'
  havard: 'R. Meister, N. Guhr, Recent Insights in Information Security Awareness
    Training: A Systematic Literature Review , WI, Würzburg, 2024.'
  ieee: 'R. Meister and N. Guhr, <i>Recent Insights in Information Security Awareness
    Training: A Systematic Literature Review </i>. Würzburg: WI, 2024, p. 16.'
  mla: 'Meister, Robin, and Nadine Guhr. “Recent Insights in Information Security
    Awareness Training: A Systematic Literature Review .” <i>Wirtschaftsinformatik
    2024 Proceedings</i>, edited by Association for Information Systems , WI, 2024,
    p. 16.'
  short: 'R. Meister, N. Guhr, Recent Insights in Information Security Awareness Training:
    A Systematic Literature Review , WI, Würzburg, 2024.'
  ufg: '<b>Meister, Robin/Guhr, Nadine</b>: Recent Insights in Information Security
    Awareness Training: A Systematic Literature Review , hg. von Association for Information
    Systems , Würzburg 2024.'
  van: 'Meister R, Guhr N. Recent Insights in Information Security Awareness Training:
    A Systematic Literature Review . Association for Information Systems , editor.
    Wirtschaftsinformatik 2024 Proceedings. Würzburg: WI; 2024.'
conference:
  end_date: 2024-09-19
  location: Würzburg
  name: 19. Internationale Tagung Wirtschaftsinformatik
  start_date: 2024-09-16
corporate_editor:
- 'Association for Information Systems '
date_created: 2024-09-17T11:03:28Z
date_updated: 2025-07-22T07:00:14Z
department:
- _id: DEP1523
keyword:
- Information Security
- Literature Review
- Human Factor
- Education
- Awareness
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://aisel.aisnet.org/wi2024/124
oa: '1'
page: '16'
place: Würzburg
publication: Wirtschaftsinformatik 2024 Proceedings
publication_status: published
publisher: WI
status: public
title: 'Recent Insights in Information Security Awareness Training: A Systematic Literature
  Review '
type: conference_editor_article
user_id: '83781'
year: '2024'
...
---
_id: '12831'
abstract:
- lang: eng
  text: The overall Industry 4.0 developments and the highly dynamic threat landscape
    enhance the need for continuous security engineering of industrial components,
    modules, and systems. Security risk assessments play a major role to ensure a
    secure operation of Industrial Automation and Control Systems (IACSs) but are
    mostly neglected due to missing resources and a lack of human experts for the
    sophisticated manual tasks. Therefore, a method for information and process modelling
    regarding the automation of security risk assessments has been previously designed,
    but not yet evaluated. This work in progress begins the evaluation of the automated
    security risk assessment concept by investigating the related work and identifying
    the main deficits. The results include a requirements analysis for the verification
    and an outlook towards future evaluation aspects.
author:
- first_name: Marco
  full_name: Ehrlich, Marco
  id: '61562'
  last_name: Ehrlich
- first_name: Georg
  full_name: Lukas, Georg
  last_name: Lukas
- first_name: Henning
  full_name: Trsek, Henning
  id: '1486'
  last_name: Trsek
  orcid: 0000-0002-0133-0656
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
- first_name: Wolfgang
  full_name: Kastner, Wolfgang
  last_name: Kastner
- first_name: Christian
  full_name: Diedrich, Christian
  last_name: Diedrich
citation:
  ama: Ehrlich M, Lukas G, Trsek H, Jasperneite J, Kastner W, Diedrich C. <i>Requirements
    Analysis for the Evaluation of Automated Security Risk Assessments</i>. IEEE;
    2024:180-183. doi:<a href="https://doi.org/10.1109/wfcs60972.2024.10540830">10.1109/wfcs60972.2024.10540830</a>
  apa: Ehrlich, M., Lukas, G., Trsek, H., Jasperneite, J., Kastner, W., &#38; Diedrich,
    C. (2024). Requirements Analysis for the Evaluation of Automated Security Risk
    Assessments. In <i>2024 IEEE 20th International Conference on Factory Communication
    Systems (WFCS)</i> (pp. 180–183). IEEE. <a href="https://doi.org/10.1109/wfcs60972.2024.10540830">https://doi.org/10.1109/wfcs60972.2024.10540830</a>
  bjps: '<b>Ehrlich M <i>et al.</i></b> (2024) <i>Requirements Analysis for the Evaluation
    of Automated Security Risk Assessments</i>. [Piscataway, NJ]: IEEE.'
  chicago: 'Ehrlich, Marco, Georg Lukas, Henning Trsek, Jürgen Jasperneite, Wolfgang
    Kastner, and Christian Diedrich. <i>Requirements Analysis for the Evaluation of
    Automated Security Risk Assessments</i>. <i>2024 IEEE 20th International Conference
    on Factory Communication Systems (WFCS)</i>. IEEE International Workshop on Factory
    Communication Systems. [Piscataway, NJ]: IEEE, 2024. <a href="https://doi.org/10.1109/wfcs60972.2024.10540830">https://doi.org/10.1109/wfcs60972.2024.10540830</a>.'
  chicago-de: 'Ehrlich, Marco, Georg Lukas, Henning Trsek, Jürgen Jasperneite, Wolfgang
    Kastner und Christian Diedrich. 2024. <i>Requirements Analysis for the Evaluation
    of Automated Security Risk Assessments</i>. <i>2024 IEEE 20th International Conference
    on Factory Communication Systems (WFCS)</i>. IEEE International Workshop on Factory
    Communication Systems. [Piscataway, NJ]: IEEE. doi:<a href="https://doi.org/10.1109/wfcs60972.2024.10540830">10.1109/wfcs60972.2024.10540830</a>,
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Ehrlich, Marco</span> ; <span
    style="font-variant:small-caps;">Lukas, Georg</span> ; <span style="font-variant:small-caps;">Trsek,
    Henning</span> ; <span style="font-variant:small-caps;">Jasperneite, Jürgen</span>
    ; <span style="font-variant:small-caps;">Kastner, Wolfgang</span> ; <span style="font-variant:small-caps;">Diedrich,
    Christian</span>: <i>Requirements Analysis for the Evaluation of Automated Security
    Risk Assessments</i>, <i>IEEE International Workshop on Factory Communication
    Systems</i>. [Piscataway, NJ] : IEEE, 2024'
  havard: M. Ehrlich, G. Lukas, H. Trsek, J. Jasperneite, W. Kastner, C. Diedrich,
    Requirements Analysis for the Evaluation of Automated Security Risk Assessments,
    IEEE, [Piscataway, NJ], 2024.
  ieee: 'M. Ehrlich, G. Lukas, H. Trsek, J. Jasperneite, W. Kastner, and C. Diedrich,
    <i>Requirements Analysis for the Evaluation of Automated Security Risk Assessments</i>.
    [Piscataway, NJ]: IEEE, 2024, pp. 180–183. doi: <a href="https://doi.org/10.1109/wfcs60972.2024.10540830">10.1109/wfcs60972.2024.10540830</a>.'
  mla: Ehrlich, Marco, et al. “Requirements Analysis for the Evaluation of Automated
    Security Risk Assessments.” <i>2024 IEEE 20th International Conference on Factory
    Communication Systems (WFCS)</i>, IEEE, 2024, pp. 180–83, <a href="https://doi.org/10.1109/wfcs60972.2024.10540830">https://doi.org/10.1109/wfcs60972.2024.10540830</a>.
  short: M. Ehrlich, G. Lukas, H. Trsek, J. Jasperneite, W. Kastner, C. Diedrich,
    Requirements Analysis for the Evaluation of Automated Security Risk Assessments,
    IEEE, [Piscataway, NJ], 2024.
  ufg: '<b>Ehrlich, Marco u. a.</b>: Requirements Analysis for the Evaluation of Automated
    Security Risk Assessments, [Piscataway, NJ] 2024 (IEEE International Workshop
    on Factory Communication Systems).'
  van: 'Ehrlich M, Lukas G, Trsek H, Jasperneite J, Kastner W, Diedrich C. Requirements
    Analysis for the Evaluation of Automated Security Risk Assessments. 2024 IEEE
    20th International Conference on Factory Communication Systems (WFCS). [Piscataway,
    NJ]: IEEE; 2024. (IEEE International Workshop on Factory Communication Systems).'
conference:
  end_date: 2024-04-19
  location: Toulouse, FRANCE
  name: 20th International Conference on Factory Communication Systems (WFCS)
  start_date: 2024-04-17
date_created: 2025-04-23T07:50:00Z
date_updated: 2025-06-25T12:59:44Z
department:
- _id: DEP5023
doi: 10.1109/wfcs60972.2024.10540830
keyword:
- Industry 4.0
- Security
- Risk Assessment
- Automation
- Requirements
- Evaluation
- Verification
language:
- iso: eng
page: 180-183
place: '[Piscataway, NJ]'
publication: 2024 IEEE 20th International Conference on Factory Communication Systems
  (WFCS)
publication_identifier:
  eisbn:
  - 979-8-3503-1934-7
  isbn:
  - 979-8-3503-1935-4
  - 979-8-3503-1933-0
  issn:
  - 2835-8511
publication_status: published
publisher: IEEE
series_title: IEEE International Workshop on Factory Communication Systems
status: public
title: Requirements Analysis for the Evaluation of Automated Security Risk Assessments
type: conference_editor_article
user_id: '83781'
year: '2024'
...
---
_id: '12875'
abstract:
- lang: eng
  text: 'Manufacturing systems based on Industry 4.0 concepts provide a greater availability
    of data and have modular characteristics enabling frequent changes. This raises
    the need for new security engineering concepts that cover the increasing complexity
    and frequency of mandatory security risk assessments. In contrast, the current
    standardization landscape used for the assessment of these systems only offers
    abstract, static, manual, and resource-intensive procedures. Therefore, this work
    proposes a method that further specifies the IEC 62443 aiming to automate the
    security risk assessments in such a way that manual efforts can be reduced and
    a consistent quality can be achieved. The methodology is presented using network
    segmentation as a guiding example and consists of four main steps: Information
    collection based on a process analysis, information formalisation with a semi-formal
    model, information usage applying first order logic to extract expert knowledge,
    and information access using the concept of the digital twin. In addition, the
    applicability of the IEC 62443 standard to the risk assessment of modular manufacturing
    systems is evaluated.'
alternative_title:
- Process analysis and information model proposal
author:
- first_name: Marco
  full_name: Ehrlich, Marco
  id: '61562'
  last_name: Ehrlich
- first_name: Andre
  full_name: Bröring, Andre
  id: '65130'
  last_name: Bröring
- first_name: Christian
  full_name: Diedrich, Christian
  last_name: Diedrich
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
citation:
  ama: 'Ehrlich M, Bröring A, Diedrich C, Jasperneite J. Towards automated risk assessments
    for modular manufacturing systems. <i>Automatisierungstechnik : AT </i>. 2023;71(6):453-466.
    doi:<a href="https://doi.org/10.1515/auto-2022-0098">10.1515/auto-2022-0098</a>'
  apa: 'Ehrlich, M., Bröring, A., Diedrich, C., &#38; Jasperneite, J. (2023). Towards
    automated risk assessments for modular manufacturing systems. <i>Automatisierungstechnik :
    AT </i>, <i>71</i>(6), 453–466. <a href="https://doi.org/10.1515/auto-2022-0098">https://doi.org/10.1515/auto-2022-0098</a>'
  bjps: '<b>Ehrlich M <i>et al.</i></b> (2023) Towards Automated Risk Assessments
    for Modular Manufacturing Systems. <i>Automatisierungstechnik : AT </i> <b>71</b>,
    453–466.'
  chicago: 'Ehrlich, Marco, Andre Bröring, Christian Diedrich, and Jürgen Jasperneite.
    “Towards Automated Risk Assessments for Modular Manufacturing Systems.” <i>Automatisierungstechnik :
    AT </i> 71, no. 6 (2023): 453–66. <a href="https://doi.org/10.1515/auto-2022-0098">https://doi.org/10.1515/auto-2022-0098</a>.'
  chicago-de: 'Ehrlich, Marco, Andre Bröring, Christian Diedrich und Jürgen Jasperneite.
    2023. Towards automated risk assessments for modular manufacturing systems. <i>Automatisierungstechnik :
    AT </i> 71, Nr. 6: 453–466. doi:<a href="https://doi.org/10.1515/auto-2022-0098">10.1515/auto-2022-0098</a>,
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Ehrlich, Marco</span> ; <span
    style="font-variant:small-caps;">Bröring, Andre</span> ; <span style="font-variant:small-caps;">Diedrich,
    Christian</span> ; <span style="font-variant:small-caps;">Jasperneite, Jürgen</span>:
    Towards automated risk assessments for modular manufacturing systems. In: <i>Automatisierungstechnik :
    AT </i> Bd. 71. Berlin, Walter de Gruyter GmbH (2023), Nr. 6, S. 453–466'
  havard: 'M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, Towards automated
    risk assessments for modular manufacturing systems, Automatisierungstechnik :
    AT . 71 (2023) 453–466.'
  ieee: 'M. Ehrlich, A. Bröring, C. Diedrich, and J. Jasperneite, “Towards automated
    risk assessments for modular manufacturing systems,” <i>Automatisierungstechnik :
    AT </i>, vol. 71, no. 6, pp. 453–466, 2023, doi: <a href="https://doi.org/10.1515/auto-2022-0098">10.1515/auto-2022-0098</a>.'
  mla: 'Ehrlich, Marco, et al. “Towards Automated Risk Assessments for Modular Manufacturing
    Systems.” <i>Automatisierungstechnik : AT </i>, vol. 71, no. 6, 2023, pp. 453–66,
    <a href="https://doi.org/10.1515/auto-2022-0098">https://doi.org/10.1515/auto-2022-0098</a>.'
  short: 'M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, Automatisierungstechnik :
    AT  71 (2023) 453–466.'
  ufg: '<b>Ehrlich, Marco u. a.</b>: Towards automated risk assessments for modular
    manufacturing systems, in: <i>Automatisierungstechnik : AT </i> 71 (2023), H.
    6,  S. 453–466.'
  van: 'Ehrlich M, Bröring A, Diedrich C, Jasperneite J. Towards automated risk assessments
    for modular manufacturing systems. Automatisierungstechnik : AT . 2023;71(6):453–66.'
date_created: 2025-04-29T07:17:44Z
date_updated: 2025-06-25T13:14:59Z
department:
- _id: DEP5023
doi: 10.1515/auto-2022-0098
external_id:
  isi:
  - '001004217900004'
intvolume: '        71'
isi: '1'
issue: '6'
keyword:
- sasset administration shell
- automation
- information model
- modular manufacturing system
- risk assessment
- security
language:
- iso: eng
page: 453-466
place: Berlin
publication: 'Automatisierungstechnik : AT '
publication_identifier:
  eissn:
  - 2196-677X
  issn:
  - 0178-2312
publication_status: published
publisher: Walter de Gruyter GmbH
status: public
title: Towards automated risk assessments for modular manufacturing systems
type: scientific_journal_article
user_id: '83781'
volume: 71
year: '2023'
...
---
_id: '12995'
abstract:
- lang: eng
  text: Due to Industry 4.0 developments, the demanded modularity of manufacturing
    systems generates additional manual efforts for security experts to guarantee
    a secure operation. The rising utilization of information and the frequent changes
    of system structures necessitate a continuous and automated security engineering,
    especially by application of the mandatory security risk assessments. Collecting
    the required information for these assessments and formalising expert knowledge
    shall improve the security of modular manufacturing systems in the future. In
    order to automate the security risk assessment process, this work proposes a method
    to determine the Target Security Level (SL-T) in conformance to the IEC 62443
    standard based on the MITRE ATT&CK framework and the Intel Threat Agent Library
    (TAL).
author:
- first_name: Marco
  full_name: Ehrlich, Marco
  id: '61562'
  last_name: Ehrlich
- first_name: Andre
  full_name: Bröring, Andre
  id: '65130'
  last_name: Bröring
- first_name: Christian
  full_name: Diedrich, Christian
  last_name: Diedrich
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
- first_name: Wolfgang
  full_name: Kastner, Wolfgang
  last_name: Kastner
- first_name: Henning
  full_name: Trsek, Henning
  id: '1486'
  last_name: Trsek
  orcid: 0000-0002-0133-0656
citation:
  ama: Ehrlich M, Bröring A, Diedrich C, Jasperneite J, Kastner W, Trsek H. <i>Determining
    the Target Security Level for Automated Security Risk Assessments</i>. (Jasperneite
    J, Institute of Electrical and Electronics Engineers, eds.). IEEE; 2023. doi:<a
    href="https://doi.org/10.1109/indin51400.2023.10217902">10.1109/indin51400.2023.10217902</a>
  apa: 'Ehrlich, M., Bröring, A., Diedrich, C., Jasperneite, J., Kastner, W., &#38;
    Trsek, H. (2023). Determining the Target Security Level for Automated Security
    Risk Assessments. In J. Jasperneite &#38; Institute of Electrical and Electronics
    Engineers (Eds.), <i>2023 IEEE 21st International Conference on Industrial Informatics :
    INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>. IEEE. <a href="https://doi.org/10.1109/indin51400.2023.10217902">https://doi.org/10.1109/indin51400.2023.10217902</a>'
  bjps: '<b>Ehrlich M <i>et al.</i></b> (2023) <i>Determining the Target Security
    Level for Automated Security Risk Assessments</i>, Jasperneite J and Institute
    of Electrical and Electronics Engineers (eds). [Piscataway, NJ]: IEEE.'
  chicago: 'Ehrlich, Marco, Andre Bröring, Christian Diedrich, Jürgen Jasperneite,
    Wolfgang Kastner, and Henning Trsek. <i>Determining the Target Security Level
    for Automated Security Risk Assessments</i>. Edited by Jürgen Jasperneite and
    Institute of Electrical and Electronics Engineers. <i>2023 IEEE 21st International
    Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>.
    [Piscataway, NJ]: IEEE, 2023. <a href="https://doi.org/10.1109/indin51400.2023.10217902">https://doi.org/10.1109/indin51400.2023.10217902</a>.'
  chicago-de: 'Ehrlich, Marco, Andre Bröring, Christian Diedrich, Jürgen Jasperneite,
    Wolfgang Kastner und Henning Trsek. 2023. <i>Determining the Target Security Level
    for Automated Security Risk Assessments</i>. Hg. von Jürgen Jasperneite und Institute
    of Electrical and Electronics Engineers. <i>2023 IEEE 21st International Conference
    on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>.
    [Piscataway, NJ]: IEEE. doi:<a href="https://doi.org/10.1109/indin51400.2023.10217902">10.1109/indin51400.2023.10217902</a>,
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Ehrlich, Marco</span> ; <span
    style="font-variant:small-caps;">Bröring, Andre</span> ; <span style="font-variant:small-caps;">Diedrich,
    Christian</span> ; <span style="font-variant:small-caps;">Jasperneite, Jürgen</span>
    ; <span style="font-variant:small-caps;">Kastner, Wolfgang</span> ; <span style="font-variant:small-caps;">Trsek,
    Henning</span> ; <span style="font-variant:small-caps;">Jasperneite, J.</span>
    ; <span style="font-variant:small-caps;">Institute of Electrical and Electronics
    Engineers</span> (Hrsg.): <i>Determining the Target Security Level for Automated
    Security Risk Assessments</i>. [Piscataway, NJ] : IEEE, 2023'
  havard: M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, W. Kastner, H. Trsek,
    Determining the Target Security Level for Automated Security Risk Assessments,
    IEEE, [Piscataway, NJ], 2023.
  ieee: 'M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, W. Kastner, and H. Trsek,
    <i>Determining the Target Security Level for Automated Security Risk Assessments</i>.
    [Piscataway, NJ]: IEEE, 2023. doi: <a href="https://doi.org/10.1109/indin51400.2023.10217902">10.1109/indin51400.2023.10217902</a>.'
  mla: 'Ehrlich, Marco, et al. “Determining the Target Security Level for Automated
    Security Risk Assessments.” <i>2023 IEEE 21st International Conference on Industrial
    Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>, edited by Jürgen
    Jasperneite and Institute of Electrical and Electronics Engineers, IEEE, 2023,
    <a href="https://doi.org/10.1109/indin51400.2023.10217902">https://doi.org/10.1109/indin51400.2023.10217902</a>.'
  short: M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, W. Kastner, H. Trsek,
    Determining the Target Security Level for Automated Security Risk Assessments,
    IEEE, [Piscataway, NJ], 2023.
  ufg: '<b>Ehrlich, Marco u. a.</b>: Determining the Target Security Level for Automated
    Security Risk Assessments, hg. von Jasperneite, Jürgen, Institute of Electrical
    and Electronics Engineers, [Piscataway, NJ] 2023.'
  van: 'Ehrlich M, Bröring A, Diedrich C, Jasperneite J, Kastner W, Trsek H. Determining
    the Target Security Level for Automated Security Risk Assessments. Jasperneite
    J, Institute of Electrical and Electronics Engineers, editors. 2023 IEEE 21st
    International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023,
    Lemgo, Germany. [Piscataway, NJ]: IEEE; 2023.'
conference:
  end_date: 2023-07-20
  location: Lemgo
  name: 21st International Conference on Industrial Informatics (INDIN)
  start_date: 2023-07-18
corporate_editor:
- Institute of Electrical and Electronics Engineers
date_created: 2025-06-18T13:30:31Z
date_updated: 2025-06-18T13:37:07Z
department:
- _id: DEP5023
doi: 10.1109/indin51400.2023.10217902
editor:
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
keyword:
- Integrated circuits
- Industries
- Libraries
- Security
- Risk management
- IEC Standards
- Interviews
language:
- iso: eng
place: '[Piscataway, NJ]'
publication: '2023 IEEE 21st International Conference on Industrial Informatics :
  INDIN 2023 : 17-20 July 2023, Lemgo, Germany'
publication_identifier:
  eisbn:
  - 978-1-6654-9313-0
  isbn:
  - 978-1-6654-9314-7
publication_status: published
publisher: IEEE
status: public
title: Determining the Target Security Level for Automated Security Risk Assessments
type: conference_editor_article
user_id: '83781'
year: '2023'
...
---
_id: '6932'
abstract:
- lang: eng
  text: n order to ensure the safety and security of industrial systems with regard
    to all life cycle phases from development through operation to disposal, specific
    regulatory and normative requirements are imposed. Due to the digitalization,
    interconnection, and constantly increasing complexity of manufacturing systems
    in the context of Industrie 4.0, the manual effort necessary to achieve the required
    safety and security is becoming ever greater and almost impossible to manage,
    especially for small and medium-sized enterprises. Therefore, this paper examines
    the existing challenges in this area in more detail and gives an outlook on the
    possible solutions to ensure safety and security much quicker and with less manual
    effort. The overall vision is a (partially) automated risk assessment of modular
    systems with respect to safety and security, including the alignment of the corresponding
    processes from both domains and the formalization of the information models needed.
author:
- first_name: Marco
  full_name: Ehrlich, Marco
  id: '61562'
  last_name: Ehrlich
- first_name: Andre
  full_name: Bröring, Andre
  id: '65130'
  last_name: Bröring
- first_name: Dimitri
  full_name: Harder, Dimitri
  id: '69147'
  last_name: Harder
- first_name: Torben
  full_name: Auhagen-Meyer, Torben
  last_name: Auhagen-Meyer
- first_name: Philip
  full_name: Kleen, Philip
  id: '44776'
  last_name: Kleen
- first_name: Lukasz
  full_name: Wisniewski, Lukasz
  id: '1710'
  last_name: Wisniewski
- first_name: Henning
  full_name: Trsek, Henning
  id: '1486'
  last_name: Trsek
  orcid: 0000-0002-0133-0656
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
citation:
  ama: 'Ehrlich M, Bröring A, Harder D, et al. Alignment of safety and security risk
    assessments for modular production systems. <i>Elektrotechnik und Informationstechnik :
    e &#38; i</i>. 2021;138(6):454-461. doi:<a href="https://doi.org/10.1007/s00502-021-00927-9">10.1007/s00502-021-00927-9</a>'
  apa: 'Ehrlich, M., Bröring, A., Harder, D., Auhagen-Meyer, T., Kleen, P., Wisniewski,
    L., Trsek, H., &#38; Jasperneite, J. (2021). Alignment of safety and security
    risk assessments for modular production systems. <i>Elektrotechnik Und Informationstechnik :
    E &#38; i</i>, <i>138</i>(6), 454–461. <a href="https://doi.org/10.1007/s00502-021-00927-9">https://doi.org/10.1007/s00502-021-00927-9</a>'
  bjps: '<b>Ehrlich M <i>et al.</i></b> (2021) Alignment of Safety and Security Risk
    Assessments for Modular Production Systems. <i>Elektrotechnik und Informationstechnik :
    e &#38; i</i> <b>138</b>, 454–461.'
  chicago: 'Ehrlich, Marco, Andre Bröring, Dimitri Harder, Torben Auhagen-Meyer, Philip
    Kleen, Lukasz Wisniewski, Henning Trsek, and Jürgen Jasperneite. “Alignment of
    Safety and Security Risk Assessments for Modular Production Systems.” <i>Elektrotechnik
    Und Informationstechnik : E &#38; i</i> 138, no. 6 (2021): 454–61. <a href="https://doi.org/10.1007/s00502-021-00927-9">https://doi.org/10.1007/s00502-021-00927-9</a>.'
  chicago-de: 'Ehrlich, Marco, Andre Bröring, Dimitri Harder, Torben Auhagen-Meyer,
    Philip Kleen, Lukasz Wisniewski, Henning Trsek und Jürgen Jasperneite. 2021. Alignment
    of safety and security risk assessments for modular production systems. <i>Elektrotechnik
    und Informationstechnik : e &#38; i</i> 138, Nr. 6: 454–461. doi:<a href="https://doi.org/10.1007/s00502-021-00927-9">10.1007/s00502-021-00927-9</a>,
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Ehrlich, Marco</span> ; <span
    style="font-variant:small-caps;">Bröring, Andre</span> ; <span style="font-variant:small-caps;">Harder,
    Dimitri</span> ; <span style="font-variant:small-caps;">Auhagen-Meyer, Torben</span>
    ; <span style="font-variant:small-caps;">Kleen, Philip</span> ; <span style="font-variant:small-caps;">Wisniewski,
    Lukasz</span> ; <span style="font-variant:small-caps;">Trsek, Henning</span> ;
    <span style="font-variant:small-caps;">Jasperneite, Jürgen</span>: Alignment of
    safety and security risk assessments for modular production systems. In: <i>Elektrotechnik
    und Informationstechnik : e &#38; i</i> Bd. 138, Springer (2021), Nr. 6, S. 454–461'
  havard: 'M. Ehrlich, A. Bröring, D. Harder, T. Auhagen-Meyer, P. Kleen, L. Wisniewski,
    H. Trsek, J. Jasperneite, Alignment of safety and security risk assessments for
    modular production systems, Elektrotechnik Und Informationstechnik : E &#38; i.
    138 (2021) 454–461.'
  ieee: 'M. Ehrlich <i>et al.</i>, “Alignment of safety and security risk assessments
    for modular production systems,” <i>Elektrotechnik und Informationstechnik : e
    &#38; i</i>, vol. 138, no. 6, pp. 454–461, 2021, doi: <a href="https://doi.org/10.1007/s00502-021-00927-9">10.1007/s00502-021-00927-9</a>.'
  mla: 'Ehrlich, Marco, et al. “Alignment of Safety and Security Risk Assessments
    for Modular Production Systems.” <i>Elektrotechnik Und Informationstechnik : E
    &#38; i</i>, vol. 138, no. 6, 2021, pp. 454–61, <a href="https://doi.org/10.1007/s00502-021-00927-9">https://doi.org/10.1007/s00502-021-00927-9</a>.'
  short: 'M. Ehrlich, A. Bröring, D. Harder, T. Auhagen-Meyer, P. Kleen, L. Wisniewski,
    H. Trsek, J. Jasperneite, Elektrotechnik Und Informationstechnik : E &#38; i 138
    (2021) 454–461.'
  ufg: '<b>Ehrlich, Marco u. a.</b>: Alignment of safety and security risk assessments
    for modular production systems, in: <i>Elektrotechnik und Informationstechnik :
    e &#38; i</i> 138 (2021), H. 6,  S. 454–461.'
  van: 'Ehrlich M, Bröring A, Harder D, Auhagen-Meyer T, Kleen P, Wisniewski L, et
    al. Alignment of safety and security risk assessments for modular production systems.
    Elektrotechnik und Informationstechnik : e &#38; i. 2021;138(6):454–61.'
date_created: 2021-12-23T17:37:45Z
date_updated: 2025-06-26T13:28:58Z
department:
- _id: DEP5019
- _id: DEP5023
doi: 10.1007/s00502-021-00927-9
external_id:
  isi:
  - '000696142100001'
intvolume: '       138'
isi: '1'
issue: '6'
keyword:
- safety
- security
- alignment
- automation
- processes
- models
language:
- iso: eng
page: 454-461
publication: 'Elektrotechnik und Informationstechnik : e & i'
publication_identifier:
  eissn:
  - 1613-7620
  issn:
  - 0932-383X
publication_status: published
publisher: Springer
status: public
title: Alignment of safety and security risk assessments for modular production systems
type: journal_article
user_id: '83781'
volume: 138
year: '2021'
...
---
_id: '11147'
abstract:
- lang: eng
  text: The current developments towards the visions of Industrie 4.0 will create
    open and dynamic architectures being supervised by Industrial Automation and Control
    Systems. Due to this new connectivity and flexibility, future industrial production
    systems need to be inspected during all phases of the whole lifecycle from a security
    point of view as well. Frequent reconfiguration and adaptation based on smart
    services impose advanced requirements on the audits and certification with regard
    to security. To facilitate that, this work presents an approach for the modeling
    of security requirements and capabilities within the Industrial Reference Architecture
    and evaluates it based on the concrete system architectures of a number of industrial
    use cases. The result is the Sec4ICS tooling-based concept for the automated assessment
    of security-related functionalities within industrial systems.
author:
- first_name: Marco
  full_name: Ehrlich, Marco
  id: '61562'
  last_name: Ehrlich
- first_name: Martin
  full_name: Gergeleit, Martin
  last_name: Gergeleit
- first_name: Henning
  full_name: Trsek, Henning
  id: '1486'
  last_name: Trsek
  orcid: 0000-0002-0133-0656
- first_name: Georg
  full_name: Lukas, Georg
  last_name: Lukas
citation:
  ama: 'Ehrlich M, Gergeleit M, Trsek H, Lukas G. Towards Automated Security Evaluation
    within the Industrial Reference Architecture. In: <i>25th IEEE International Conference
    on Emerging Technologies and Factory Automation (ETFA)</i>. IEEE; 2020:1640-1647.
    doi:<a href="https://doi.org/10.1109/ETFA46521.2020.9211883">10.1109/ETFA46521.2020.9211883</a>'
  apa: Ehrlich, M., Gergeleit, M., Trsek, H., &#38; Lukas, G. (2020). Towards Automated
    Security Evaluation within the Industrial Reference Architecture. <i>25th IEEE
    International Conference on Emerging Technologies and Factory Automation (ETFA)</i>,
    1640–1647. <a href="https://doi.org/10.1109/ETFA46521.2020.9211883">https://doi.org/10.1109/ETFA46521.2020.9211883</a>
  bjps: '<b>Ehrlich M <i>et al.</i></b> (2020) Towards Automated Security Evaluation
    within the Industrial Reference Architecture. <i>25th IEEE International Conference
    on Emerging Technologies and Factory Automation (ETFA)</i>. Piscataway, NJ: IEEE,
    pp. 1640–1647.'
  chicago: 'Ehrlich, Marco, Martin Gergeleit, Henning Trsek, and Georg Lukas. “Towards
    Automated Security Evaluation within the Industrial Reference Architecture.” In
    <i>25th IEEE International Conference on Emerging Technologies and Factory Automation
    (ETFA)</i>, 1640–47. Piscataway, NJ: IEEE, 2020. <a href="https://doi.org/10.1109/ETFA46521.2020.9211883">https://doi.org/10.1109/ETFA46521.2020.9211883</a>.'
  chicago-de: 'Ehrlich, Marco, Martin Gergeleit, Henning Trsek und Georg Lukas. 2020.
    Towards Automated Security Evaluation within the Industrial Reference Architecture.
    In: <i>25th IEEE International Conference on Emerging Technologies and Factory
    Automation (ETFA)</i>, 1640–1647. Piscataway, NJ: IEEE. doi:<a href="https://doi.org/10.1109/ETFA46521.2020.9211883">10.1109/ETFA46521.2020.9211883</a>,
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Ehrlich, Marco</span> ; <span
    style="font-variant:small-caps;">Gergeleit, Martin</span> ; <span style="font-variant:small-caps;">Trsek,
    Henning</span> ; <span style="font-variant:small-caps;">Lukas, Georg</span>: Towards
    Automated Security Evaluation within the Industrial Reference Architecture. In:
    <i>25th IEEE International Conference on Emerging Technologies and Factory Automation
    (ETFA)</i>. Piscataway, NJ : IEEE, 2020, S. 1640–1647'
  havard: 'M. Ehrlich, M. Gergeleit, H. Trsek, G. Lukas, Towards Automated Security
    Evaluation within the Industrial Reference Architecture, in: 25th IEEE International
    Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, Piscataway,
    NJ, 2020: pp. 1640–1647.'
  ieee: 'M. Ehrlich, M. Gergeleit, H. Trsek, and G. Lukas, “Towards Automated Security
    Evaluation within the Industrial Reference Architecture,” in <i>25th IEEE International
    Conference on Emerging Technologies and Factory Automation (ETFA)</i>, Wien, 2020,
    pp. 1640–1647. doi: <a href="https://doi.org/10.1109/ETFA46521.2020.9211883">10.1109/ETFA46521.2020.9211883</a>.'
  mla: Ehrlich, Marco, et al. “Towards Automated Security Evaluation within the Industrial
    Reference Architecture.” <i>25th IEEE International Conference on Emerging Technologies
    and Factory Automation (ETFA)</i>, IEEE, 2020, pp. 1640–47, <a href="https://doi.org/10.1109/ETFA46521.2020.9211883">https://doi.org/10.1109/ETFA46521.2020.9211883</a>.
  short: 'M. Ehrlich, M. Gergeleit, H. Trsek, G. Lukas, in: 25th IEEE International
    Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, Piscataway,
    NJ, 2020, pp. 1640–1647.'
  ufg: '<b>Ehrlich, Marco u. a.</b>: Towards Automated Security Evaluation within
    the Industrial Reference Architecture, in: o. Hg.: 25th IEEE International Conference
    on Emerging Technologies and Factory Automation (ETFA), Piscataway, NJ 2020, 
    S. 1640–1647.'
  van: 'Ehrlich M, Gergeleit M, Trsek H, Lukas G. Towards Automated Security Evaluation
    within the Industrial Reference Architecture. In: 25th IEEE International Conference
    on Emerging Technologies and Factory Automation (ETFA). Piscataway, NJ: IEEE;
    2020. p. 1640–7.'
conference:
  end_date: 2020-09-11
  location: Wien
  name: 25th IEEE International Conference on Emerging Technologies and Factory Automation
    (ETFA)
  start_date: 2020-09-08
date_created: 2024-03-01T08:41:28Z
date_updated: 2025-06-26T13:33:05Z
department:
- _id: DEP5023
doi: 10.1109/ETFA46521.2020.9211883
keyword:
- Security
- Automation
- OT
- Sec4ICS
- iRefA
language:
- iso: eng
page: 1640-1647
place: Piscataway, NJ
publication: 25th IEEE International Conference on Emerging Technologies and Factory
  Automation (ETFA)
publication_identifier:
  eisbn:
  - ' 978-1-7281-8956-7 '
  eissn:
  - 1946-0759
  isbn:
  - 978-1-7281-8957-4
  issn:
  - 1946-0740
publication_status: published
publisher: IEEE
status: public
title: Towards Automated Security Evaluation within the Industrial Reference Architecture
type: conference
user_id: '83781'
year: '2020'
...
---
_id: '4756'
abstract:
- lang: eng
  text: Due to the dynamic nature of the Industrie 4.0 developments, future production
    systems will be reconfigured more frequently and new system configurations will
    be deployed automatically. In order to keep pace with this development, it will
    be required to observe and ensure the needed security functionalities and corresponding
    certifications in an automated way. This implies an improvement of today's static
    procedures and manual efforts as much as possible in favor of a dynamic standard
    establishment. Therefore, this paper evaluates the state of the art of the industrial
    security standardization landscape and proposes a concept for the automated support
    of certification processes with information from industrial communication networks
    in order to enhance the usability of the standards establishments and the certifications
    within organizations and companies, especially small and medium-sized enterprises.
author:
- first_name: Marco
  full_name: Ehrlich, Marco
  id: '61562'
  last_name: Ehrlich
- first_name: Henning
  full_name: Trsek, Henning
  id: '1486'
  last_name: Trsek
  orcid: 0000-0002-0133-0656
- first_name: Lukasz
  full_name: Wisniewski, Lukasz
  id: '1710'
  last_name: Wisniewski
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
citation:
  ama: 'Ehrlich M, Trsek H, Wisniewski L, Jasperneite J. Survey of Security Standards
    for an automated Industrie 4.0 compatible Manufacturing. In:  IEEE Industrial
    Electronics Society. Annual Conference , IEEE Industrial Electronics Society ,
    Universidade Nova de Lisboa , Institute of Electrical and Electronics Engineers,
    eds. <i>IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics
    Society (IES)</i>. IEEE Industrial Electronics Society. IEEE; 2019:2849-2854.'
  apa: Ehrlich, M., Trsek, H., Wisniewski, L., &#38; Jasperneite, J. (2019). Survey
    of Security Standards for an automated Industrie 4.0 compatible Manufacturing.
    In  IEEE Industrial Electronics Society. Annual Conference , IEEE Industrial Electronics
    Society , Universidade Nova de Lisboa , &#38; Institute of Electrical and Electronics
    Engineers (Eds.), <i>IECON 2019 - 45th Annual Conference of the IEEE Industrial
    Electronics Society (IES)</i> (pp. 2849–2854). IEEE.
  bjps: '<b>Ehrlich M <i>et al.</i></b> (2019) Survey of Security Standards for an
    Automated Industrie 4.0 Compatible Manufacturing. In  IEEE Industrial Electronics
    Society. Annual Conference  et al. (eds), <i>IECON 2019 - 45th Annual Conference
    of the IEEE Industrial Electronics Society (IES)</i>. [Piscataway, NJ]: IEEE,
    pp. 2849–2854.'
  chicago: 'Ehrlich, Marco, Henning Trsek, Lukasz Wisniewski, and Jürgen Jasperneite.
    “Survey of Security Standards for an Automated Industrie 4.0 Compatible Manufacturing.”
    In <i>IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society
    (IES)</i>, edited by  IEEE Industrial Electronics Society. Annual Conference ,
    IEEE Industrial Electronics Society , Universidade Nova de Lisboa , and Institute
    of Electrical and Electronics Engineers, 2849–54. IEEE Industrial Electronics
    Society. [Piscataway, NJ]: IEEE, 2019.'
  chicago-de: 'Ehrlich, Marco, Henning Trsek, Lukasz Wisniewski und Jürgen Jasperneite.
    2019. Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing.
    In: <i>IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics
    Society (IES)</i>, hg. von  IEEE Industrial Electronics Society. Annual Conference
    , IEEE Industrial Electronics Society , Universidade Nova de Lisboa , und Institute
    of Electrical and Electronics Engineers, 2849–2854. IEEE Industrial Electronics
    Society. [Piscataway, NJ]: IEEE.'
  din1505-2-1: '<span style="font-variant:small-caps;">Ehrlich, Marco</span> ; <span
    style="font-variant:small-caps;">Trsek, Henning</span> ; <span style="font-variant:small-caps;">Wisniewski,
    Lukasz</span> ; <span style="font-variant:small-caps;">Jasperneite, Jürgen</span>:
    Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing.
    In: <span style="font-variant:small-caps;"> IEEE Industrial Electronics Society.
    Annual Conference </span> ; <span style="font-variant:small-caps;">IEEE Industrial
    Electronics Society </span> ; <span style="font-variant:small-caps;">Universidade
    Nova de Lisboa </span> ; <span style="font-variant:small-caps;">Institute of Electrical
    and Electronics Engineers</span> (Hrsg.): <i>IECON 2019 - 45th Annual Conference
    of the IEEE Industrial Electronics Society (IES)</i>, <i>IEEE Industrial Electronics
    Society</i>. [Piscataway, NJ] : IEEE, 2019, S. 2849–2854'
  havard: 'M. Ehrlich, H. Trsek, L. Wisniewski, J. Jasperneite, Survey of Security
    Standards for an automated Industrie 4.0 compatible Manufacturing, in:  IEEE Industrial
    Electronics Society. Annual Conference , IEEE Industrial Electronics Society ,
    Universidade Nova de Lisboa , Institute of Electrical and Electronics Engineers
    (Eds.), IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics
    Society (IES), IEEE, [Piscataway, NJ], 2019: pp. 2849–2854.'
  ieee: M. Ehrlich, H. Trsek, L. Wisniewski, and J. Jasperneite, “Survey of Security
    Standards for an automated Industrie 4.0 compatible Manufacturing,” in <i>IECON
    2019 - 45th Annual Conference of the IEEE Industrial Electronics Society (IES)</i>,
    Lisbon, PORTUGAL, 2019, pp. 2849–2854.
  mla: Ehrlich, Marco, et al. “Survey of Security Standards for an Automated Industrie
    4.0 Compatible Manufacturing.” <i>IECON 2019 - 45th Annual Conference of the IEEE
    Industrial Electronics Society (IES)</i>, edited by  IEEE Industrial Electronics
    Society. Annual Conference  et al., IEEE, 2019, pp. 2849–54.
  short: 'M. Ehrlich, H. Trsek, L. Wisniewski, J. Jasperneite, in:  IEEE Industrial
    Electronics Society. Annual Conference , IEEE Industrial Electronics Society ,
    Universidade Nova de Lisboa , Institute of Electrical and Electronics Engineers
    (Eds.), IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics
    Society (IES), IEEE, [Piscataway, NJ], 2019, pp. 2849–2854.'
  ufg: '<b>Ehrlich, Marco u. a.</b>: Survey of Security Standards for an automated
    Industrie 4.0 compatible Manufacturing, in: <i> IEEE Industrial Electronics Society.
    Annual Conference  u. a. (Hgg.)</i>: IECON 2019 - 45th Annual Conference of the
    IEEE Industrial Electronics Society (IES), [Piscataway, NJ] 2019 (IEEE Industrial
    Electronics Society),  S. 2849–2854.'
  van: 'Ehrlich M, Trsek H, Wisniewski L, Jasperneite J. Survey of Security Standards
    for an automated Industrie 4.0 compatible Manufacturing. In:  IEEE Industrial
    Electronics Society. Annual Conference , IEEE Industrial Electronics Society ,
    Universidade Nova de Lisboa , Institute of Electrical and Electronics Engineers,
    editors. IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics
    Society (IES). [Piscataway, NJ]: IEEE; 2019. p. 2849–54. (IEEE Industrial Electronics
    Society).'
conference:
  end_date: 2019-10-19
  location: Lisbon, PORTUGAL
  name: 45th Annual Conference of the IEEE Industrial Electronics Society (IECON)
  start_date: 2019-10-14
corporate_editor:
- ' IEEE Industrial Electronics Society. Annual Conference '
- 'IEEE Industrial Electronics Society '
- 'Universidade Nova de Lisboa '
- Institute of Electrical and Electronics Engineers
date_created: 2021-01-28T14:47:12Z
date_updated: 2025-06-26T13:31:27Z
department:
- _id: DEP5023
- _id: DEP5019
keyword:
- Industrial Automation
- Security
- Toolchain
- Standardization
- Communication Networks
language:
- iso: eng
page: 2849-2854
place: '[Piscataway, NJ]'
publication: IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics
  Society (IES)
publication_identifier:
  eisbn:
  - 978-1-7281-4878-6
  isbn:
  - 978-1-7281-4879-3
  issn:
  - 1553-572X
publication_status: published
publisher: IEEE
series_title: IEEE Industrial Electronics Society
status: public
title: Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing
type: conference
user_id: '83781'
year: '2019'
...
---
_id: '4331'
abstract:
- lang: eng
  text: When a user enters a personal identification number (PIN) into an automated
    teller machine or a point of sale terminal, there is a risk of some one watching
    from behind, trying to guess the PIN code. Such shoulder-surfing is a major security
    threat. In order to overcome this problem different PIN entry methods have been
    suggested. In this regard, gaze interaction methods are receiving attention in
    recent years, owing to the lowering cost of eye tracking technology. In this paper,
    we present SafetyPIN - an eye tracking based PIN entry system - which is aimed
    at making the PIN entry more secure with the help of an eye tracking device. We
    discuss the implementation and the initial evaluation of this system.
author:
- first_name: Mythreya
  full_name: Seetharama, Mythreya
  last_name: Seetharama
- first_name: Volker
  full_name: Paelke, Volker
  last_name: Paelke
- first_name: Carsten
  full_name: Röcker, Carsten
  id: '61525'
  last_name: Röcker
citation:
  ama: 'Seetharama M, Paelke V, Röcker C. SafetyPIN: Secure PIN Entry through Eye
    Tracking. In: Tryfonas T, Askoxylakis I, eds. <i>Human Aspects of Information
    Security, Privacy, and Trust</i>. Vol 9190. Lecture Notes in Computer Science ; 
    Information Systems and Applications, incl. Internet/Web, and HCI. Springer; 2015:426-435.
    doi:<a href="https://doi.org/10.1007/978-3-319-20376-8_38">10.1007/978-3-319-20376-8_38</a>'
  apa: 'Seetharama, M., Paelke, V., &#38; Röcker, C. (2015). SafetyPIN: Secure PIN
    Entry through Eye Tracking. In T. Tryfonas &#38; I. Askoxylakis (Eds.), <i>Human
    Aspects of Information Security, Privacy, and Trust</i> (Vol. 9190, pp. 426–435).
    Springer. <a href="https://doi.org/10.1007/978-3-319-20376-8_38">https://doi.org/10.1007/978-3-319-20376-8_38</a>'
  bjps: '<b>Seetharama M, Paelke V and Röcker C</b> (2015) SafetyPIN: Secure PIN Entry
    through Eye Tracking. In Tryfonas T and Askoxylakis I (eds), <i>Human Aspects
    of Information Security, Privacy, and Trust</i>, vol. 9190. Cham: Springer, pp.
    426–435.'
  chicago: 'Seetharama, Mythreya, Volker Paelke, and Carsten Röcker. “SafetyPIN: Secure
    PIN Entry through Eye Tracking.” In <i>Human Aspects of Information Security,
    Privacy, and Trust</i>, edited by Theo Tryfonas and Ioannis Askoxylakis, 9190:426–35.
    Lecture Notes in Computer Science ;  Information Systems and Applications, Incl.
    Internet/Web, and HCI. Cham: Springer, 2015. <a href="https://doi.org/10.1007/978-3-319-20376-8_38">https://doi.org/10.1007/978-3-319-20376-8_38</a>.'
  chicago-de: 'Seetharama, Mythreya, Volker Paelke und Carsten Röcker. 2015. SafetyPIN:
    Secure PIN Entry through Eye Tracking. In: <i>Human Aspects of Information Security,
    Privacy, and Trust</i>, hg. von Theo Tryfonas und Ioannis Askoxylakis, 9190:426–435.
    Lecture Notes in Computer Science ;  Information Systems and Applications, incl.
    Internet/Web, and HCI. Cham: Springer. doi:<a href="https://doi.org/10.1007/978-3-319-20376-8_38">10.1007/978-3-319-20376-8_38</a>,
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Seetharama, Mythreya</span>
    ; <span style="font-variant:small-caps;">Paelke, Volker</span> ; <span style="font-variant:small-caps;">Röcker,
    Carsten</span>: SafetyPIN: Secure PIN Entry through Eye Tracking. In: <span style="font-variant:small-caps;">Tryfonas,
    T.</span> ; <span style="font-variant:small-caps;">Askoxylakis, I.</span> (Hrsg.):
    <i>Human Aspects of Information Security, Privacy, and Trust</i>, <i>Lecture Notes
    in Computer Science ;  Information Systems and Applications, incl. Internet/Web,
    and HCI</i>. Bd. 9190. Cham : Springer, 2015, S. 426–435'
  havard: 'M. Seetharama, V. Paelke, C. Röcker, SafetyPIN: Secure PIN Entry through
    Eye Tracking, in: T. Tryfonas, I. Askoxylakis (Eds.), Human Aspects of Information
    Security, Privacy, and Trust, Springer, Cham, 2015: pp. 426–435.'
  ieee: 'M. Seetharama, V. Paelke, and C. Röcker, “SafetyPIN: Secure PIN Entry through
    Eye Tracking,” in <i>Human Aspects of Information Security, Privacy, and Trust</i>,
    Los Angeles, CA, USA, 2015, vol. 9190, pp. 426–435. doi: <a href="https://doi.org/10.1007/978-3-319-20376-8_38">10.1007/978-3-319-20376-8_38</a>.'
  mla: 'Seetharama, Mythreya, et al. “SafetyPIN: Secure PIN Entry through Eye Tracking.”
    <i>Human Aspects of Information Security, Privacy, and Trust</i>, edited by Theo
    Tryfonas and Ioannis Askoxylakis, vol. 9190, Springer, 2015, pp. 426–35, <a href="https://doi.org/10.1007/978-3-319-20376-8_38">https://doi.org/10.1007/978-3-319-20376-8_38</a>.'
  short: 'M. Seetharama, V. Paelke, C. Röcker, in: T. Tryfonas, I. Askoxylakis (Eds.),
    Human Aspects of Information Security, Privacy, and Trust, Springer, Cham, 2015,
    pp. 426–435.'
  ufg: '<b>Seetharama, Mythreya/Paelke, Volker/Röcker, Carsten</b>: SafetyPIN: Secure
    PIN Entry through Eye Tracking, in: <i>Tryfonas, Theo/Askoxylakis, Ioannis (Hgg.)</i>:
    Human Aspects of Information Security, Privacy, and Trust, Bd. 9190, Cham 2015
    (Lecture Notes in Computer Science ;  Information Systems and Applications, incl.
    Internet/Web, and HCI),  S. 426–435.'
  van: 'Seetharama M, Paelke V, Röcker C. SafetyPIN: Secure PIN Entry through Eye
    Tracking. In: Tryfonas T, Askoxylakis I, editors. Human Aspects of Information
    Security, Privacy, and Trust. Cham: Springer; 2015. p. 426–35. (Lecture Notes
    in Computer Science ;  Information Systems and Applications, incl. Internet/Web,
    and HCI; vol. 9190).'
conference:
  end_date: 2015-08-07
  location: Los Angeles, CA, USA
  name: 3. International Conference, HAS 2015, Held as Part of HCI International 2015
  start_date: 2015-08-02
date_created: 2021-01-08T12:03:45Z
date_updated: 2025-04-11T09:03:48Z
department:
- _id: DEP5023
doi: 10.1007/978-3-319-20376-8_38
editor:
- first_name: Theo
  full_name: Tryfonas, Theo
  last_name: Tryfonas
- first_name: Ioannis
  full_name: Askoxylakis, Ioannis
  last_name: Askoxylakis
intvolume: '      9190'
keyword:
- PIN entry
- Eye tracking
- Security
- Usability
- Point of sale terminals
language:
- iso: eng
page: 426-435
place: Cham
publication: Human Aspects of Information Security, Privacy, and Trust
publication_identifier:
  eisbn:
  - 978-3-319-20376-8
  isbn:
  - 978-3-319-20375-1
publication_status: published
publisher: Springer
series_title: Lecture Notes in Computer Science ;  Information Systems and Applications,
  incl. Internet/Web, and HCI
status: public
title: 'SafetyPIN: Secure PIN Entry through Eye Tracking'
type: conference
user_id: '83781'
volume: 9190
year: '2015'
...
---
_id: '5601'
abstract:
- lang: ger
  text: Das Projekt SEC_PRO verfolgte die Möglichkeit der Erarbeitung einer neuartigen
    IT-Sicherheitslösung für Automatisierungssysteme. Die Ermittlung des Stands der
    Technik zeigte, dass die IT-Sicherheit in der Automatisierungstechnik von Lösungen
    der Standard-IT in Büronetzwerken geprägt ist, ohne auf spezielle Anforderungen
    der Automatisierungstechnik einzugehen. Eine Anforderungsanalyse erbrachte, dass
    IT-Sicherheitslösungen benötigt werden, die sich mit dem zunehmenden Vernetzungsgrad
    von Automatisierungssystemen in Einklang bringen lassen. Dazu ist eine IT-Sicherheitsschicht
    für das PROFINET-Protokoll konzipiert und implementiert worden, die einen integrierten
    Schutz der Kommunikation und der Komponenten selbst ermöglicht. Dabei kommen gezielt
    Security Token Technologien zum Einsatz. Eine Evaluierung der kryptografischen
    Funktionen zeigte, dass deren Verwendung unter gewissen Voraussetzungen möglich
    ist. Mit Hilfe eines Demonstrators ist konnte die Echtzeitfähigkeit der IT-Sicherheitsschicht
    validiert und dessen Schutzwirkung nachgewiesen werden. SEC_PRO kann als Ausgangspunkt
    für weitere Vorhaben bezüglich integrierter IT-Sicherheitsmaßnahmen gesehen werden,
    die auf eine Anwendung der Kryptografie in der Automatisierungstechnik abzielen.
author:
- first_name: Markus
  full_name: Runde, Markus
  last_name: Runde
- first_name: Stefan
  full_name: Hausmann, Stefan
  last_name: Hausmann
- first_name: Christopher
  full_name: Tebbe, Christopher
  last_name: Tebbe
- first_name: Björn
  full_name: Czybik, Björn
  id: '76180'
  last_name: Czybik
- first_name: Karl-Heinz
  full_name: Niemann, Karl-Heinz
  last_name: Niemann
- first_name: Stefan
  full_name: Heiss, Stefan
  id: '1031'
  last_name: Heiss
- first_name: Jürgen
  full_name: Jasperneite, Jürgen
  id: '1899'
  last_name: Jasperneite
citation:
  ama: 'Runde M, Hausmann S, Tebbe C, et al. <i>SEC_PRO : sichere Produktion mit verteilten
    Automatisierungssystemen</i>. Hannover : Hochschule Hannover ; 2014. doi:<a href="https://doi.org/10.25968/opus-499">https://doi.org/10.25968/opus-499</a>'
  apa: 'Runde, M., Hausmann, S., Tebbe, C., Czybik, B., Niemann, K.-H., Heiss, S.,
    &#38; Jasperneite, J. (2014). <i>SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen</i>.
    Hannover : Hochschule Hannover . <a href="https://doi.org/10.25968/opus-499">https://doi.org/10.25968/opus-499</a>'
  bjps: '<b>Runde M <i>et al.</i></b> (2014) <i>SEC_PRO : sichere Produktion mit verteilten
    Automatisierungssystemen</i>. Hannover : Hochschule Hannover .'
  chicago: 'Runde, Markus, Stefan Hausmann, Christopher Tebbe, Björn Czybik, Karl-Heinz
    Niemann, Stefan Heiss, and Jürgen Jasperneite. <i>SEC_PRO : sichere Produktion
    mit verteilten Automatisierungssystemen</i>. Hannover : Hochschule Hannover ,
    2014. <a href="https://doi.org/10.25968/opus-499">https://doi.org/10.25968/opus-499</a>.'
  chicago-de: 'Runde, Markus, Stefan Hausmann, Christopher Tebbe, Björn Czybik, Karl-Heinz
    Niemann, Stefan Heiss und Jürgen Jasperneite. 2014. <i>SEC_PRO : sichere Produktion
    mit verteilten Automatisierungssystemen</i>. Hannover : Hochschule Hannover .
    doi:<a href="https://doi.org/10.25968/opus-499,">https://doi.org/10.25968/opus-499,</a>
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Runde, Markus</span> ; <span
    style="font-variant:small-caps;">Hausmann, Stefan</span> ; <span style="font-variant:small-caps;">Tebbe,
    Christopher</span> ; <span style="font-variant:small-caps;">Czybik, Björn</span>
    ; <span style="font-variant:small-caps;">Niemann, Karl-Heinz</span> ; <span style="font-variant:small-caps;">Heiss,
    Stefan</span> ; <span style="font-variant:small-caps;">Jasperneite, Jürgen</span>:
    <i>SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen</i>. Hannover
     : Hochschule Hannover , 2014'
  havard: 'M. Runde, S. Hausmann, C. Tebbe, B. Czybik, K.-H. Niemann, S. Heiss, J.
    Jasperneite, SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen,
    Hochschule Hannover , Hannover , 2014.'
  ieee: 'M. Runde <i>et al.</i>, <i>SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen</i>.
    Hannover : Hochschule Hannover , 2014.'
  mla: 'Runde, Markus, et al. <i>SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen</i>.
    Hochschule Hannover , 2014, doi:<a href="https://doi.org/10.25968/opus-499">https://doi.org/10.25968/opus-499</a>.'
  short: 'M. Runde, S. Hausmann, C. Tebbe, B. Czybik, K.-H. Niemann, S. Heiss, J.
    Jasperneite, SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen,
    Hochschule Hannover , Hannover , 2014.'
  ufg: '<b>Runde, Markus et. al. (2014)</b>: SEC_PRO : sichere Produktion mit verteilten
    Automatisierungssystemen, Hannover .'
  van: 'Runde M, Hausmann S, Tebbe C, Czybik B, Niemann K-H, Heiss S, et al. SEC_PRO :
    sichere Produktion mit verteilten Automatisierungssystemen. Hannover : Hochschule
    Hannover ; 2014. 99 p.'
date_created: 2021-04-19T09:28:14Z
date_updated: 2023-03-15T13:50:00Z
department:
- _id: DEP5000
- _id: DEP5023
doi: https://doi.org/10.25968/opus-499
keyword:
- Automatisierungstechnik
- IT-Sicherheit
- PROFINET
- SEC_PRO IT Security
language:
- iso: ger
page: '99'
place: 'Hannover '
publication_status: published
publisher: 'Hochschule Hannover '
status: public
title: 'SEC_PRO : sichere Produktion mit verteilten Automatisierungssystemen'
type: book
user_id: '15514'
year: 2014
...
---
_id: '4381'
abstract:
- lang: eng
  text: This article reports on two user studies exploring the knowledge of end users
    about technical processes of technology-enhanced home environments, which are
    often assumed to play an important role for attitudes such as privacy and security.
    In the first study (n=12 participants between 19-71 years of age), we analyzed
    user knowledge about technical processes using the teach-back methodology. In
    the second study, we additionally applied new developed questionnaires and analyzed
    participants’ data (n=24 participants between 19-76 years of age) regarding relations
    of user factors, users’ knowledge about technical processes and attitudes such
    as privacy and security of technology-enhanced environments. In contrast to existing
    assumptions, the results showed that general structural knowledge about technical
    processes was not related with attitudes such as privacy and security. Additionally,
    we found that most participants had only relatively superficial knowledge about
    technical processes, which was further influenced by age and technology experience.
author:
- first_name: Oliver
  full_name: Sack, Oliver
  last_name: Sack
- first_name: Carsten
  full_name: Röcker, Carsten
  id: '61525'
  last_name: Röcker
citation:
  ama: 'Sack O, Röcker C. Privacy and Security in Technology-Enhanced Environments:
    Exploring Users’ Knowledge about Technological Processes of Diverse User Groups.
    <i>Universal Journal of Psychology</i>. 2013;1(2):72-83. doi:<a href="https://doi.org/10.13189/ujp.2013.010207">10.13189/ujp.2013.010207</a>'
  apa: 'Sack, O., &#38; Röcker, C. (2013). Privacy and Security in Technology-Enhanced
    Environments: Exploring Users’ Knowledge about Technological Processes of Diverse
    User Groups. <i>Universal Journal of Psychology</i>, <i>1</i>(2), 72–83. <a href="https://doi.org/10.13189/ujp.2013.010207">https://doi.org/10.13189/ujp.2013.010207</a>'
  bjps: '<b>Sack O and Röcker C</b> (2013) Privacy and Security in Technology-Enhanced
    Environments: Exploring Users’ Knowledge about Technological Processes of Diverse
    User Groups. <i>Universal Journal of Psychology</i> <b>1</b>, 72–83.'
  chicago: 'Sack, Oliver, and Carsten Röcker. “Privacy and Security in Technology-Enhanced
    Environments: Exploring Users’ Knowledge about Technological Processes of Diverse
    User Groups.” <i>Universal Journal of Psychology</i> 1, no. 2 (2013): 72–83. <a
    href="https://doi.org/10.13189/ujp.2013.010207">https://doi.org/10.13189/ujp.2013.010207</a>.'
  chicago-de: 'Sack, Oliver und Carsten Röcker. 2013. Privacy and Security in Technology-Enhanced
    Environments: Exploring Users’ Knowledge about Technological Processes of Diverse
    User Groups. <i>Universal Journal of Psychology</i> 1, Nr. 2: 72–83. doi:<a href="https://doi.org/10.13189/ujp.2013.010207,">10.13189/ujp.2013.010207,</a>
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Sack, Oliver</span> ; <span
    style="font-variant:small-caps;">Röcker, Carsten</span>: Privacy and Security
    in Technology-Enhanced Environments: Exploring Users’ Knowledge about Technological
    Processes of Diverse User Groups. In: <i>Universal Journal of Psychology</i> Bd.
    1.   Alhambra, Calif., Horizion  (2013), Nr. 2, S. 72–83'
  havard: 'O. Sack, C. Röcker, Privacy and Security in Technology-Enhanced Environments:
    Exploring Users’ Knowledge about Technological Processes of Diverse User Groups,
    Universal Journal of Psychology. 1 (2013) 72–83.'
  ieee: 'O. Sack and C. Röcker, “Privacy and Security in Technology-Enhanced Environments:
    Exploring Users’ Knowledge about Technological Processes of Diverse User Groups,”
    <i>Universal Journal of Psychology</i>, vol. 1, no. 2, pp. 72–83, 2013.'
  mla: 'Sack, Oliver, and Carsten Röcker. “Privacy and Security in Technology-Enhanced
    Environments: Exploring Users’ Knowledge about Technological Processes of Diverse
    User Groups.” <i>Universal Journal of Psychology</i>, vol. 1, no. 2, Horizion
    , 2013, pp. 72–83, doi:<a href="https://doi.org/10.13189/ujp.2013.010207">10.13189/ujp.2013.010207</a>.'
  short: O. Sack, C. Röcker, Universal Journal of Psychology 1 (2013) 72–83.
  ufg: '<b>Sack, Oliver/Röcker, Carsten (2013)</b>: Privacy and Security in Technology-Enhanced
    Environments: Exploring Users’ Knowledge about Technological Processes of Diverse
    User Groups, in: <i>Universal Journal of Psychology</i> <i>1</i> (<i>2</i>), S.
    72–83.'
  van: 'Sack O, Röcker C. Privacy and Security in Technology-Enhanced Environments:
    Exploring Users’ Knowledge about Technological Processes of Diverse User Groups.
    Universal Journal of Psychology. 2013;1(2):72–83.'
date_created: 2021-01-15T10:49:18Z
date_updated: 2023-03-15T13:49:52Z
department:
- _id: DEP5023
doi: 10.13189/ujp.2013.010207
extern: '1'
intvolume: '         1'
issue: '2'
keyword:
- Technology-enhanced Environment
- Ambient Assisted Living
- Mental Model
- Teach Back
- Privacy
- Security
language:
- iso: eng
main_file_link:
- open_access: '1'
oa: '1'
page: 72 - 83
place: '  Alhambra, Calif.'
publication: Universal Journal of Psychology
publication_identifier:
  eissn:
  - '2332-3485 '
  isbn:
  - 2332-3477
publication_status: published
publisher: 'Horizion '
status: public
title: 'Privacy and Security in Technology-Enhanced Environments: Exploring Users’
  Knowledge about Technological Processes of Diverse User Groups'
type: journal_article
user_id: '15514'
volume: 1
year: 2013
...
---
_id: '2068'
abstract:
- lang: eng
  text: The production of printing goods is laborious. Furthermore, the print quality,
    especially in banknotes, must be assured. It is accepted, that print defects are
    generated because printing parameters, also machine parameters can change unnoticed.
    Therefore, a combined concept for a multi-sensory learning and classification
    model based on new adaptive fuzzy-pattern-classifiers for data inspection is proposed.
    This inspection concept, which combines optical, acoustical and other machine
    information, comes up with a large amount of data, which leads to multivariate
    methods for data analysis. Multivariate methods are useful for analysis of large
    and complex data sets that consist of many variables measured on large numbers
    of physical data.
author:
- first_name: Walter
  full_name: Dyck, Walter
  last_name: Dyck
- first_name: Thomas
  full_name: Türke, Thomas
  last_name: Türke
- first_name: Johannes
  full_name: Schaede, Johannes
  id: '2128'
  last_name: Schaede
- first_name: Volker
  full_name: Lohweg, Volker
  id: '1804'
  last_name: Lohweg
  orcid: 0000-0002-3325-7887
citation:
  ama: 'Dyck W, Türke T, Schaede J, Lohweg V. A Fuzzy-Pattern-Classifier-Based Adaptive
    Learning Model for Sensor Fusion. In: Thessaloniki, Greece: MLSP 2007 - International
    Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING; 2007:accepted for publication.
    doi:<a href="https://doi.org/10.1109/MLSP.2007.4414320">10.1109/MLSP.2007.4414320</a>'
  apa: 'Dyck, W., Türke, T., Schaede, J., &#38; Lohweg, V. (2007). A Fuzzy-Pattern-Classifier-Based
    Adaptive Learning Model for Sensor Fusion (p. accepted for publication). Thessaloniki,
    Greece: MLSP 2007 - International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING.
    <a href="https://doi.org/10.1109/MLSP.2007.4414320">https://doi.org/10.1109/MLSP.2007.4414320</a>'
  bjps: '<b>Dyck W <i>et al.</i></b> (2007) A Fuzzy-Pattern-Classifier-Based Adaptive
    Learning Model for Sensor Fusion. Thessaloniki, Greece: MLSP 2007 - International
    Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, p. accepted for publication.'
  chicago: 'Dyck, Walter, Thomas Türke, Johannes Schaede, and Volker Lohweg. “A Fuzzy-Pattern-Classifier-Based
    Adaptive Learning Model for Sensor Fusion,” accepted for publication. Thessaloniki,
    Greece: MLSP 2007 - International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING,
    2007. <a href="https://doi.org/10.1109/MLSP.2007.4414320">https://doi.org/10.1109/MLSP.2007.4414320</a>.'
  chicago-de: 'Dyck, Walter, Thomas Türke, Johannes Schaede und Volker Lohweg. 2007.
    A Fuzzy-Pattern-Classifier-Based Adaptive Learning Model for Sensor Fusion. In:
    , accepted for publication. Thessaloniki, Greece: MLSP 2007 - International Workshop
    on MACHINE LEARNING FOR SIGNAL PROCESSING. doi:<a href="https://doi.org/10.1109/MLSP.2007.4414320,">10.1109/MLSP.2007.4414320,</a>
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Dyck, Walter</span> ; <span
    style="font-variant:small-caps;">Türke, Thomas</span> ; <span style="font-variant:small-caps;">Schaede,
    Johannes</span> ; <span style="font-variant:small-caps;">Lohweg, Volker</span>:
    A Fuzzy-Pattern-Classifier-Based Adaptive Learning Model for Sensor Fusion. In:
    . Thessaloniki, Greece : MLSP 2007 - International Workshop on MACHINE LEARNING
    FOR SIGNAL PROCESSING, 2007, S. accepted for publication'
  havard: 'W. Dyck, T. Türke, J. Schaede, V. Lohweg, A Fuzzy-Pattern-Classifier-Based
    Adaptive Learning Model for Sensor Fusion, in: MLSP 2007 - International Workshop
    on MACHINE LEARNING FOR SIGNAL PROCESSING, Thessaloniki, Greece, 2007: p. accepted
    for publication.'
  ieee: W. Dyck, T. Türke, J. Schaede, and V. Lohweg, “A Fuzzy-Pattern-Classifier-Based
    Adaptive Learning Model for Sensor Fusion,” 2007, p. accepted for publication.
  mla: Dyck, Walter, et al. <i>A Fuzzy-Pattern-Classifier-Based Adaptive Learning
    Model for Sensor Fusion</i>. MLSP 2007 - International Workshop on MACHINE LEARNING
    FOR SIGNAL PROCESSING, 2007, p. accepted for publication, doi:<a href="https://doi.org/10.1109/MLSP.2007.4414320">10.1109/MLSP.2007.4414320</a>.
  short: 'W. Dyck, T. Türke, J. Schaede, V. Lohweg, in: MLSP 2007 - International
    Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Thessaloniki, Greece, 2007,
    p. accepted for publication.'
  ufg: '<b>Dyck, Walter et. al. (2007)</b>: A Fuzzy-Pattern-Classifier-Based Adaptive
    Learning Model for Sensor Fusion, in: , Thessaloniki, Greece, S. accepted for
    publication.'
  van: 'Dyck W, Türke T, Schaede J, Lohweg V. A Fuzzy-Pattern-Classifier-Based Adaptive
    Learning Model for Sensor Fusion. In Thessaloniki, Greece: MLSP 2007 - International
    Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING; 2007. p. accepted for publication.'
date_created: 2019-11-29T13:50:28Z
date_updated: 2023-03-15T13:49:38Z
department:
- _id: DEP5023
doi: 10.1109/MLSP.2007.4414320
keyword:
- Sensor fusion
- Inspection
- Optical sensors
- Printing machinery
- Data security
- Data analysis
- Production
- Degradation
- Principal component analysis
- Karhunen-Loeve transforms
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4414320&tag=1
page: accepted for publication
place: Thessaloniki, Greece
publication_identifier:
  eisbn:
  - 978-1-4244-1566-3
  isbn:
  - 978-1-4244-1565-6
  issn:
  - '1551-2541 '
  unknown:
  - '2378-928X '
publication_status: published
publisher: MLSP 2007 - International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING
status: public
title: A Fuzzy-Pattern-Classifier-Based Adaptive Learning Model for Sensor Fusion
type: conference
user_id: '45673'
year: 2007
...
---
_id: '2062'
abstract:
- lang: eng
  text: 'Bank note inspection is a complex task. As more and more print techniques
    and new security features are established, total quality security and bank note
    printing must be assured. Therefore, this factor necessitates change of a sensorial
    concept in general. We propose an optical-acoustical inspection method based upon
    the concepts of information fusion and fuzzy interpretation of data measures.
    Furthermore, we present a simplified scheme for information fusion for pattern
    recognition and data classification based on parametrical unimodal potential functions
    and a Sugeno-type score value analysis. Digital Object Identifier: 10.1109/ICIF.2006.301779
    <br />'
author:
- first_name: Walter
  full_name: Dyck, Walter
  last_name: Dyck
- first_name: Johannes
  full_name: Schaede, Johannes
  id: '2128'
  last_name: Schaede
- first_name: Thomas
  full_name: Türke, Thomas
  last_name: Türke
- first_name: Volker
  full_name: Lohweg, Volker
  id: '1804'
  last_name: Lohweg
  orcid: 0000-0002-3325-7887
citation:
  ama: 'Dyck W, Schaede J, Türke T, Lohweg V. Information Fusion Application On Security
    Printing With Parametrical Fuzzy Classification. In: <i> 2006 9th International
    Conference on Information Fusion</i>. 9th International Conference on Information
    Fusion, 2006. ICIF ’06; 2006:1-8. doi:<a href="https://doi.org/10.1109/ICIF.2006.301779">10.1109/ICIF.2006.301779</a>'
  apa: Dyck, W., Schaede, J., Türke, T., &#38; Lohweg, V. (2006). Information Fusion
    Application On Security Printing With Parametrical Fuzzy Classification. In <i>
    2006 9th International Conference on Information Fusion</i> (pp. 1–8). 9th International
    Conference on Information Fusion, 2006. ICIF ’06. <a href="https://doi.org/10.1109/ICIF.2006.301779">https://doi.org/10.1109/ICIF.2006.301779</a>
  bjps: <b>Dyck W <i>et al.</i></b> (2006) Information Fusion Application On Security
    Printing With Parametrical Fuzzy Classification. <i> 2006 9th International Conference
    on Information Fusion</i>. 9th International Conference on Information Fusion,
    2006. ICIF ’06, pp. 1–8.
  chicago: Dyck, Walter, Johannes Schaede, Thomas Türke, and Volker Lohweg. “Information
    Fusion Application On Security Printing With Parametrical Fuzzy Classification.”
    In <i> 2006 9th International Conference on Information Fusion</i>, 1–8. 9th International
    Conference on Information Fusion, 2006. ICIF ’06, 2006. <a href="https://doi.org/10.1109/ICIF.2006.301779">https://doi.org/10.1109/ICIF.2006.301779</a>.
  chicago-de: 'Dyck, Walter, Johannes Schaede, Thomas Türke und Volker Lohweg. 2006.
    Information Fusion Application On Security Printing With Parametrical Fuzzy Classification.
    In: <i> 2006 9th International Conference on Information Fusion</i>, 1–8. 9th
    International Conference on Information Fusion, 2006. ICIF ’06. doi:<a href="https://doi.org/10.1109/ICIF.2006.301779,">10.1109/ICIF.2006.301779,</a>
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Dyck, Walter</span> ; <span
    style="font-variant:small-caps;">Schaede, Johannes</span> ; <span style="font-variant:small-caps;">Türke,
    Thomas</span> ; <span style="font-variant:small-caps;">Lohweg, Volker</span>:
    Information Fusion Application On Security Printing With Parametrical Fuzzy Classification.
    In: <i> 2006 9th International Conference on Information Fusion</i> : 9th International
    Conference on Information Fusion, 2006. ICIF ’06, 2006, S. 1–8'
  havard: 'W. Dyck, J. Schaede, T. Türke, V. Lohweg, Information Fusion Application
    On Security Printing With Parametrical Fuzzy Classification, in:  2006 9th International
    Conference on Information Fusion, 9th International Conference on Information
    Fusion, 2006. ICIF ’06, 2006: pp. 1–8.'
  ieee: W. Dyck, J. Schaede, T. Türke, and V. Lohweg, “Information Fusion Application
    On Security Printing With Parametrical Fuzzy Classification,” in <i> 2006 9th
    International Conference on Information Fusion</i>, 2006, pp. 1–8.
  mla: Dyck, Walter, et al. “Information Fusion Application On Security Printing With
    Parametrical Fuzzy Classification.” <i> 2006 9th International Conference on Information
    Fusion</i>, 9th International Conference on Information Fusion, 2006. ICIF ’06,
    2006, pp. 1–8, doi:<a href="https://doi.org/10.1109/ICIF.2006.301779">10.1109/ICIF.2006.301779</a>.
  short: 'W. Dyck, J. Schaede, T. Türke, V. Lohweg, in:  2006 9th International Conference
    on Information Fusion, 9th International Conference on Information Fusion, 2006.
    ICIF ’06, 2006, pp. 1–8.'
  ufg: '<b>Dyck, Walter et. al. (2006)</b>: Information Fusion Application On Security
    Printing With Parametrical Fuzzy Classification, in: <i> 2006 9th International
    Conference on Information Fusion</i>, S. 1–8.'
  van: 'Dyck W, Schaede J, Türke T, Lohweg V. Information Fusion Application On Security
    Printing With Parametrical Fuzzy Classification. In:  2006 9th International Conference
    on Information Fusion. 9th International Conference on Information Fusion, 2006.
    ICIF ’06; 2006. p. 1–8.'
date_created: 2019-11-29T13:35:03Z
date_updated: 2023-03-15T13:49:38Z
department:
- _id: DEP5023
doi: 10.1109/ICIF.2006.301779
keyword:
- Information security
- Inspection
- Printing machinery
- Optical sensors
- Data security
- Personnel
- Fuzzy systems
- Sensor systems
- Expert systems
- Ink
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/document/4086065/keywords#full-text-header
page: 1-8
publication: ' 2006 9th International Conference on Information Fusion'
publication_identifier:
  isbn:
  - ' 1-4244-0953-5'
publication_status: published
publisher: 9th International Conference on Information Fusion, 2006. ICIF '06
status: public
title: Information Fusion Application On Security Printing With Parametrical Fuzzy
  Classification
type: conference
user_id: '45673'
year: 2006
...
