@misc{12831,
  abstract     = {{The overall Industry 4.0 developments and the highly dynamic threat landscape enhance the need for continuous security engineering of industrial components, modules, and systems. Security risk assessments play a major role to ensure a secure operation of Industrial Automation and Control Systems (IACSs) but are mostly neglected due to missing resources and a lack of human experts for the sophisticated manual tasks. Therefore, a method for information and process modelling regarding the automation of security risk assessments has been previously designed, but not yet evaluated. This work in progress begins the evaluation of the automated security risk assessment concept by investigating the related work and identifying the main deficits. The results include a requirements analysis for the verification and an outlook towards future evaluation aspects.}},
  author       = {{Ehrlich, Marco and Lukas, Georg and Trsek, Henning and Jasperneite, Jürgen and Kastner, Wolfgang and Diedrich, Christian}},
  booktitle    = {{2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)}},
  isbn         = {{979-8-3503-1935-4}},
  issn         = {{2835-8511}},
  keywords     = {{Industry 4.0, Security, Risk Assessment, Automation, Requirements, Evaluation, Verification}},
  location     = {{Toulouse, FRANCE}},
  pages        = {{180--183}},
  publisher    = {{IEEE}},
  title        = {{{Requirements Analysis for the Evaluation of Automated Security Risk Assessments}}},
  doi          = {{10.1109/wfcs60972.2024.10540830}},
  year         = {{2024}},
}

@misc{11158,
  abstract     = {{Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of systems necessitate continuous security engineering. Therefore, this work in progress presents the specification and prototypical implementation for automated security risk assessments. In addition, an outlook towards the associated validation, verification, evaluation, and hypothesis testing is given.}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Trsek, Henning and Jasperneite, Jürgen and Diedrich, Christian}},
  booktitle    = {{2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{979-8-3503-3992-5}},
  location     = {{ Sinaia, Romania }},
  publisher    = {{IEEE}},
  title        = {{{Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments}}},
  doi          = {{10.1109/etfa54631.2023.10275455}},
  year         = {{2023}},
}

@misc{12875,
  abstract     = {{Manufacturing systems based on Industry 4.0 concepts provide a greater availability of data and have modular characteristics enabling frequent changes. This raises the need for new security engineering concepts that cover the increasing complexity and frequency of mandatory security risk assessments. In contrast, the current standardization landscape used for the assessment of these systems only offers abstract, static, manual, and resource-intensive procedures. Therefore, this work proposes a method that further specifies the IEC 62443 aiming to automate the security risk assessments in such a way that manual efforts can be reduced and a consistent quality can be achieved. The methodology is presented using network segmentation as a guiding example and consists of four main steps: Information collection based on a process analysis, information formalisation with a semi-formal model, information usage applying first order logic to extract expert knowledge, and information access using the concept of the digital twin. In addition, the applicability of the IEC 62443 standard to the risk assessment of modular manufacturing systems is evaluated.}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Diedrich, Christian and Jasperneite, Jürgen}},
  booktitle    = {{Automatisierungstechnik : AT }},
  issn         = {{2196-677X}},
  keywords     = {{sasset administration shell, automation, information model, modular manufacturing system, risk assessment, security}},
  number       = {{6}},
  pages        = {{453--466}},
  publisher    = {{Walter de Gruyter GmbH}},
  title        = {{{Towards automated risk assessments for modular manufacturing systems}}},
  doi          = {{10.1515/auto-2022-0098}},
  volume       = {{71}},
  year         = {{2023}},
}

@misc{12995,
  abstract     = {{Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of system structures necessitate a continuous and automated security engineering, especially by application of the mandatory security risk assessments. Collecting the required information for these assessments and formalising expert knowledge shall improve the security of modular manufacturing systems in the future. In order to automate the security risk assessment process, this work proposes a method to determine the Target Security Level (SL-T) in conformance to the IEC 62443 standard based on the MITRE ATT&CK framework and the Intel Threat Agent Library (TAL).}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Diedrich, Christian and Jasperneite, Jürgen and Kastner, Wolfgang and Trsek, Henning}},
  booktitle    = {{2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany}},
  editor       = {{Jasperneite, Jürgen}},
  isbn         = {{978-1-6654-9314-7}},
  keywords     = {{Integrated circuits, Industries, Libraries, Security, Risk management, IEC Standards, Interviews}},
  location     = {{Lemgo}},
  publisher    = {{IEEE}},
  title        = {{{Determining the Target Security Level for Automated Security Risk Assessments}}},
  doi          = {{10.1109/indin51400.2023.10217902}},
  year         = {{2023}},
}

@inproceedings{11167,
  abstract     = {{Integrity as one property of trustworthiness is an important aspect for the adoption of the Asset Administration Shell (AAS) as a data exchange format and source for data driven services. Until now, the AAS offers an access control solution as a preventive integrity measure. Nevertheless, preventive methods lack in detecting integrity violations due to accidental or malicious modifications from access permitted endpoints. This work in progress paper proposes a concept to complement the access control with a detective integrity measure. By signing submodels of the AAS, business partners along the life cycle can verify the integrity of the data inside the AAS. Therefore, a Certificates Submodel and a Signature Submodel are proposed in the concept to enable a flexible and interoperable integrity verification. In future work, the concept will be implemented and evaluated.}},
  author       = {{Bröring, Andre and Ehrlich, Marco and Wisniewski, Lukasz and Trsek, Henning and Heiss, Stefan}},
  booktitle    = {{2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{ 9781665499965 }},
  location     = {{ Stuttgart}},
  pages        = {{1--4}},
  publisher    = {{IEEE}},
  title        = {{{Towards an Asset Administration Shell Integrity Verification Scheme}}},
  doi          = {{10.1109/ETFA52439.2022.9921521}},
  year         = {{2022}},
}

@inproceedings{11168,
  author       = {{Bröring, Andre and Ehrlich, Marco and Wisniewski, Lukasz and Trsek, Henning and Heiss, Stefan}},
  booktitle    = {{Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022}},
  editor       = {{Jasperneite, Jürgen and Jumar, Ulrich}},
  isbn         = {{978-3-9818463-3-1}},
  location     = {{Lemgo}},
  pages        = {{192--203}},
  publisher    = {{Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe }},
  title        = {{{An Asset Administration Shell Version Control to Enforce Integrity Protection}}},
  doi          = {{10.25644/a4ws-9a49}},
  year         = {{2022}},
}

@inproceedings{11160,
  abstract     = {{The current static risk assessment processes and concepts do not match the increasing requirements with regard to flexibility within the industrial automation domain. The amount of manual tasks and needed efforts for risk assessments are too high in order to adequately cover the rising rate of system reconfigurations. Analysing the typical risk assessment processes from the IEC 62443 will show resource constraints with regard to time, bottlenecks, and the main cost drivers. If the most rewarding process steps can be identified and automated, the overall performance of risk assessments can be enhanced to keep up with the demanded flexibility.}},
  author       = {{Ehrlich, Marco and Lukas, Georg and Trsek, Henning and Jasperneite, Jürgen and Diedrich, Christian}},
  booktitle    = {{Workshop on Factory Communication Systems (WFCS)}},
  isbn         = {{978-1-6654-1087-8}},
  location     = {{Pavia, Italy }},
  publisher    = {{IEEE}},
  title        = {{{Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments}}},
  doi          = {{10.1109/WFCS53837.2022.9779174}},
  year         = {{2022}},
}

@inproceedings{6931,
  abstract     = {{The Asset Administration Shell (AAS) is a core element for Industrie 4.0. In addition, the security of industrial systems is a permanent topic that could be improved by the AAS and should have a high priority for future developments and implementations of the AAS. This paper evaluates the current threat landscape for Industrial Control Systems (ICS) communicating to the AAS, as well as for IT systems hosting the AAS. The relevance of these threats is evaluated for the AAS and the threats with the highest relevance, namely BasicWeb Application Attacks and Malware Infections, are analysed in detail. The recommended countermeasures for these threats are compared with the state of the art of AAS security concepts and result in missing countermeasures and research gaps for an overall security of the AAS.}},
  author       = {{Bröring, Andre and Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz}},
  booktitle    = {{Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021}},
  editor       = {{Jumar, Ulrich and Jasperneite, Jürgen}},
  isbn         = {{978-3-948749101 }},
  location     = {{virtuell}},
  publisher    = {{Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität }},
  title        = {{{Secure usage of asset administration shells : an overview and analysis of best practises}}},
  doi          = {{10.25673/39569}},
  year         = {{2021}},
}

@article{6932,
  abstract     = {{n order to ensure the safety and security of industrial systems with regard to all life cycle phases from development through operation to disposal, specific regulatory and normative requirements are imposed. Due to the digitalization, interconnection, and constantly increasing complexity of manufacturing systems in the context of Industrie 4.0, the manual effort necessary to achieve the required safety and security is becoming ever greater and almost impossible to manage, especially for small and medium-sized enterprises. Therefore, this paper examines the existing challenges in this area in more detail and gives an outlook on the possible solutions to ensure safety and security much quicker and with less manual effort. The overall vision is a (partially) automated risk assessment of modular systems with respect to safety and security, including the alignment of the corresponding processes from both domains and the formalization of the information models needed.}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Harder, Dimitri and Auhagen-Meyer, Torben and Kleen, Philip and Wisniewski, Lukasz and Trsek, Henning and Jasperneite, Jürgen}},
  issn         = {{1613-7620}},
  journal      = {{Elektrotechnik und Informationstechnik : e & i}},
  keywords     = {{safety, security, alignment, automation, processes, models}},
  number       = {{6}},
  pages        = {{454--461}},
  publisher    = {{Springer}},
  title        = {{{Alignment of safety and security risk assessments for modular production systems}}},
  doi          = {{10.1007/s00502-021-00927-9}},
  volume       = {{138}},
  year         = {{2021}},
}

@inproceedings{7087,
  abstract     = {{The Asset Administration Shell (AAS) is a core element for Industrie 4.0. In addition, the security of industrial systems is a permanent topic that could be improved by the AAS and should have a high priority for future developments and implementations of the AAS. This paper evaluates the current threat landscape for Industrial Control Systems (ICS) communicating to the AAS, as well as for IT systems hosting the AAS. The relevance of these threats is evaluated for the AAS and the threats with the highest relevance, namely BasicWeb Application Attacks and Malware Infections, are analysed in detail. The recommended countermeasures for these threats are compared with the state of the art of AAS security concepts and result in missing countermeasures and research gaps for an overall security of the AAS.}},
  author       = {{Bröring, André and Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz}},
  booktitle    = {{Kommunikation in der Automation - KommA 2021}},
  editor       = {{Jasperneite, Jürgen and Jumar, Ulrich}},
  pages        = {{97--106}},
  publisher    = {{ifak}},
  title        = {{{Secure Usage of Asset Administration Shells - An Overview and Analysis of Best Practises}}},
  doi          = {{http://dx.doi.org/10.25673/39569}},
  year         = {{2021}},
}

@inproceedings{11147,
  abstract     = {{The current developments towards the visions of Industrie 4.0 will create open and dynamic architectures being supervised by Industrial Automation and Control Systems. Due to this new connectivity and flexibility, future industrial production systems need to be inspected during all phases of the whole lifecycle from a security point of view as well. Frequent reconfiguration and adaptation based on smart services impose advanced requirements on the audits and certification with regard to security. To facilitate that, this work presents an approach for the modeling of security requirements and capabilities within the Industrial Reference Architecture and evaluates it based on the concrete system architectures of a number of industrial use cases. The result is the Sec4ICS tooling-based concept for the automated assessment of security-related functionalities within industrial systems.}},
  author       = {{Ehrlich, Marco and Gergeleit, Martin and Trsek, Henning and Lukas, Georg}},
  booktitle    = {{25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{978-1-7281-8957-4}},
  issn         = {{1946-0759}},
  keywords     = {{Security, Automation, OT, Sec4ICS, iRefA}},
  location     = {{Wien}},
  pages        = {{1640--1647}},
  publisher    = {{IEEE}},
  title        = {{{Towards Automated Security Evaluation within the Industrial Reference Architecture}}},
  doi          = {{10.1109/ETFA46521.2020.9211883}},
  year         = {{2020}},
}

@misc{11153,
  abstract     = {{The developments in the area of Industrie 4.0 and Work 4.0 towards self-organized adaptive
production systems as well as self-organized companies create new demands on technical
and social systems. These include increased flexibility, faster decisions, and transparent com-
munication to address the currently volatile market pressure. As a result, the topic of self-
organization for the industrial domain has moved further into focus and concepts from different
areas, such as nature, social, or management, are being adapted for a technological use. This
article sheds light on self-organisation and the corresponding characteristics that will be nec-
essary for socio-technical systems in the future for industrial companies. The knowledge
gained allows us to establish connections between the technical development of the industrial
domain and the social structures of the involved companies. These insights are used to provide
recommendations for further steps towards the visions from Industrie 4.0.}},
  author       = {{Czybik, Björn and Ehrlich, Marco and Trsek, Henning and Oswald, Alfred}},
  booktitle    = {{Automation 2020}},
  isbn         = {{978-3-18-092375-8 }},
  location     = {{online}},
  pages        = {{1055--1068}},
  publisher    = {{VDI}},
  title        = {{{Eine differenzierte Betrachtung ganzheitlicher Selbstorganisation im Rahmen von Industrie 4.0}}},
  doi          = {{10.51202/9783181023754-1055}},
  volume       = {{2375}},
  year         = {{2020}},
}

@inproceedings{4857,
  abstract     = {{Increasing heterogeneity of industrial network systems is a fact and the chances that in the future one communication standard will be able to fulfill the requirements of all possible applications are utopian. With the increasing number of communication systems, their management, configuration, and maintenance become a significant issue. Additionally, due to the increasing amount of network services and traffic, the management of available network resources and the possibility of delivering certain levels of communication quality of service, especially across different network solutions becomes a big challenge. Therefore, in this paper a Controller of Controllers (CoC) concept for management of heterogeneous industrial networks is proposed. The concept is designed to support still widely spread legacy fieldbus systems, different Ethernet-based industrial solutions, and potentially upcoming network technologies. The goal is achieved by leveraging state-of-the-art architectural concepts such as software-defined networks, which allows for integration of abstract models in network management. The concept is described and discussed by way of a demonstrator concept for a heterogeneous system of fieldbus and Ethernet-based time-sensitive networks.}},
  author       = {{Ansah, F. and Soler Perez Olaya, S. and Krummacker, Dennis and Fischer, C. and Winkel, A. and Guillaume, René and Wisniewski, Lukasz and Ehrlich, Marco and Mandarawi, W. and Trsek, Henning and de Meer, Hermann and Wollschlaeger, Martin and Schotten, Hans D. and Jasperneite, Jürgen}},
  booktitle    = {{16th IEEE International Conference on Factory Communication Systems (WFCS)}},
  editor       = {{Almeida, Lus and Daoud, Ramez and Mifdaoui, Ahlem and Golatowski, Frank and Amer, Hassanein and Santos, Pedro}},
  isbn         = {{978-1-7281-5298-1}},
  keywords     = {{CYBER-PHYSICAL SYSTEMS}},
  location     = {{Porto, PORTUGAL}},
  pages        = {{35--42}},
  publisher    = {{IEEE}},
  title        = {{{Controller of Controllers Architecture for Management of Heterogeneous Industrial Networks}}},
  doi          = {{10.1109/wfcs47810.2020.9114506}},
  year         = {{2020}},
}

@inproceedings{4858,
  author       = {{Majumder, Mainak and Perez Olaya, Santiago Soler and Ehrlich, Marco and Wisniewski, Lukasz and Jasperneite, Jürgen and Wollschlaeger, Martin}},
  location     = {{Porto, Portugal}},
  title        = {{{Work-in-Progress: Semantic Knowledge Base as a Solution for Heterogeneous Industrial Network Management}}},
  year         = {{2020}},
}

@inproceedings{4861,
  author       = {{Panda, Santosh Kumar and Wisniewski, Lukasz and Ehrlich, Marco and Majumder, Mainak and Jasperneite, Jürgen}},
  location     = {{Porto, Portugal}},
  pages        = {{8}},
  title        = {{{Plug & Play Retrofitting Approach for Data Integration to the Cloud}}},
  year         = {{2020}},
}

@inproceedings{4877,
  author       = {{Ehrlich, Marco and Benk, Stefan and Harder, Dimitri and Kleen, Philip and Trsek, Henning and Schriegel, Sebastian and Jasperneite, Jürgen}},
  title        = {{{Automatische Bewertung und Überwachung von Safety & Security Eigenschaften – Strukturierung und Ausblick}}},
  year         = {{2020}},
}

@misc{11143,
  abstract     = {{Due to the dynamic nature of the Industrie 4.0, future production systems will be reconfigured frequently and as a part of the engineering process, new system configurations will be deployed automatically. In order to keep pace with this development, it will be required to achieve the needed security levels in an automated way and to reduce the current static procedures and manual efforts as much as possible. Therefore, the development and modelling of all cyber security related functionalities is needed. This paper describes an approach for such a modelling based on security requirements and levels of the international standard IEC 62443 part 3-3 and a system description based on OASIS TOSCA for the deployment. The approach is applied to an Industrie 4.0 use case scenario based on edge cloud computing and an evaluation is performed to demonstrate its feasibility.}},
  author       = {{Ehrlich, Marco and Gergeleit, Martin and Simkin, Kostyantyn and Trsek, Henning}},
  booktitle    = {{2019 International Conference on Networked Systems (NetSys)}},
  isbn         = {{978-1-7281-0569-7}},
  location     = {{Garching b. München}},
  publisher    = {{IEEE}},
  title        = {{{Automated Processing of Security Requirements and Controls for a common Industrie 4.0 Use Case}}},
  doi          = {{10.1109/netsys.2019.8854522}},
  year         = {{2019}},
}

@inproceedings{4756,
  abstract     = {{Due to the dynamic nature of the Industrie 4.0 developments, future production systems will be reconfigured more frequently and new system configurations will be deployed automatically. In order to keep pace with this development, it will be required to observe and ensure the needed security functionalities and corresponding certifications in an automated way. This implies an improvement of today's static procedures and manual efforts as much as possible in favor of a dynamic standard establishment. Therefore, this paper evaluates the state of the art of the industrial security standardization landscape and proposes a concept for the automated support of certification processes with information from industrial communication networks in order to enhance the usability of the standards establishments and the certifications within organizations and companies, especially small and medium-sized enterprises.}},
  author       = {{Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society (IES)}},
  isbn         = {{978-1-7281-4879-3}},
  issn         = {{1553-572X}},
  keywords     = {{Industrial Automation, Security, Toolchain, Standardization, Communication Networks}},
  location     = {{Lisbon, PORTUGAL}},
  pages        = {{2849--2854}},
  publisher    = {{IEEE}},
  title        = {{{Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing}}},
  year         = {{2019}},
}

@inproceedings{4760,
  author       = {{Ehrlich, Marco and Trsek, Henning and Paffrath, Julius and Gergeleit, Martin and Simkin, Kostyantyn and Jasperneite, Jürgen}},
  booktitle    = {{24th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  title        = {{{Secure and Flexible Deployment of Industrial Applications inside Cloud-Based Environments}}},
  year         = {{2019}},
}

@inproceedings{4762,
  author       = {{Panda, Santosh Kumar and Majumder, Mainak and Ehrlich, Marco and Neumann, Arne and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{IEEE Workshop on Factory Communication Systems 2019}},
  pages        = {{8}},
  publisher    = {{IEEE}},
  title        = {{{Topology Detection as a Base for Efficient Management of Heterogeneous Industrial Network Systems Using Software-Defined Networking}}},
  year         = {{2019}},
}

@inproceedings{4764,
  author       = {{Ehrlich, Marco and Neumann, Arne and Biendarra, Alexander and Jasperneite, Jürgen}},
  booktitle    = {{at - Automatisierungstechnik 67 (1), Special Issue: Methods for a reliable wireless communication in the industry}},
  pages        = {{69--78}},
  publisher    = {{De Gruyter}},
  title        = {{{Quality-of-Service Monitoring of Hybrid Industrial Communication Networks}}},
  year         = {{2019}},
}

@inproceedings{4840,
  author       = {{Ehrlich, Marco and Wisniewski, Lukasz and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Imperia (Italien)}},
  title        = {{{Modelling and Automatic Mapping of Cyber Security Requirements for Industrial Applications: Survey, Problem Exposition, and Research Focus}}},
  year         = {{2018}},
}

@inproceedings{4842,
  author       = {{Lang, Dorota and Friesen, Maxim and Ehrlich, Marco and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  location     = {{Porto, Portugal}},
  title        = {{{Pursuing the Vision of Industrie 4.0: Secure Plug and Produce by Means of the Asset Administration Shell and Blockchain Technology}}},
  year         = {{2018}},
}

@article{4844,
  author       = {{Ehrlich, Marco and Lang, Dorota and Mytych, Martin Jan and Jasperneite, Jürgen and Malischewski, Torsten}},
  journal      = {{Automation}},
  publisher    = {{VDI}},
  title        = {{{Preparing Smart Sensors for Industrie 4.0: Requirements, Potentials, and Solutions}}},
  year         = {{2018}},
}

@inproceedings{4847,
  author       = {{Ehrlich, Marco and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Boppard am Rhein}},
  title        = {{{Automatische Evaluierung von Anforderungen bezüglich der Informationssicherheit für das zukünftige industrielle Netzwerkmanagement}}},
  year         = {{2018}},
}

@inproceedings{4848,
  author       = {{Ehrlich, Marco and Krummacker, Dennis and Fischer, Christoph and Guillaume, René and Perez Olaya, Santiago Soler and Frimpong, Ansah and de Meer, Hermann and Wollschläger, Martin and Schotten, Hans D. and Jasperneite, Jürgen}},
  location     = {{Turin, Italien}},
  title        = {{{Software-Defined Networking as an Enabler for Future Industrial Network Management}}},
  year         = {{2018}},
}

@inproceedings{4580,
  author       = {{Ehrlich, Marco and Biendarra, Alexander and Trsek, Henning and Wojtkowiak, Emanuel and Jasperneite, Jürgen}},
  booktitle    = {{Kommunikation in der Automation - KommA 2017}},
  title        = {{{Passive Flow Monitoring of Hybrid Network Connections regarding Quality of Service Parameters for the Industrial Automation}}},
  year         = {{2017}},
}

@inproceedings{4593,
  author       = {{Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Zypern}},
  title        = {{{Automatic Mapping of Cyber Security Requirements to support Network Slicing in Software-Defined Networks}}},
  year         = {{2017}},
}

@inproceedings{4601,
  author       = {{Ehrlich, Marco and Trsek, Henning and Lang, Dorota and Wisniewski, Lukasz and Wendt, Verena and Jasperneite, Jürgen}},
  booktitle    = {{Automation 2017}},
  pages        = {{1}},
  publisher    = {{VDI}},
  title        = {{{Security Concept for a Cloud-based Automation Service}}},
  year         = {{2017}},
}

@inproceedings{4603,
  abstract     = {{Nowadays, industrial networks are characterized by complex architectures of hybrid, wired and wireless segments, combining automation and information technology (IT). Their operation is supported by network management facilities. Network monitoring is a basis for management as it provides the necessary status information. This paper presents an approach to apply a monitoring concept coming from the IT domain for an industrial wireless network as a step towards a uniform monitoring and management of heterogeneous networks.}},
  author       = {{Neumann, Arne and Ehrlich, Marco and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{13th IEEE International Workshop on Factory Communication Systems, WFCS 2017, 31.05.2017- 02.06.2017, (best WIP paper award)}},
  title        = {{{Towards monitoring of hybrid industrial networks}}},
  year         = {{2017}},
}

@inproceedings{4854,
  abstract     = {{In this paper an investigation of the State of the Art of Industrial Wireless Sensor Networks (IWSNs) is performed. Therefore the given industrial requirements, different wireless communication protocols, the defined basic architecture and open research questions will be analysed. Furthermore, current challenges from the research domain will be discussed and a real use case of IWSNs from a research project in cooperation with a local industrial partner will be evaluated. To conclude this paper an outlook of further developments and possible future applications of IWSNs will be sketched.}},
  author       = {{Ehrlich, Marco and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  location     = {{Lemgo}},
  pages        = {{28--39}},
  title        = {{{State of the Art and Future Applications of Industrial Wireless Sensor Networks}}},
  year         = {{2016}},
}

@inproceedings{4607,
  abstract     = {{Usage of Retrofitting for Migration of Industrial Production Lines to Industry 4.0 Abstract: Today the term Industry 4.0 (I4.0) is omnipresent and many machine builders want to benefit from the researched advantages by integrating this new technologies such as OPC UA into their products. However, due to financial reasons it is not feasible to exchange existing industrial production lines with the new I4.0 ready technologies at once. Therefore this paper will propose a retrofitting approach for the gradual migration to I4.0 by providing a defined schedule with milestones and showing different problems which can occur during retrofitting. In addition to that a new business model called Retrofitting as a Service (RaaS) for future companies will be introduced to show a possible usage of retrofitting. }},
  author       = {{Ehrlich, Marco and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{KommA 2015 – Jahreskolloquium Kommunikation in der Automation}},
  title        = {{{Usage of Retrofitting for Migration of Industrial Production Lines to Industry 4.0}}},
  year         = {{2015}},
}

