Publikationen

Hier finden Sie eine stetig wachsende Wissenssammlung zu den Themen rund um IUNO. Unsere Publikationsseite enthält die Arbeitsergebnisse der IUNO-Partner, Strategiepapiere und weitere Veröffentlichungen auf Konferenzen und sonstigen Veranstaltungen.

  1. Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions

    Sven Plaga, Norbert Wiedermann, Simon Duque Antón, Stefan Tatschner, Hans Dieter Schotten, Thomas Newe
    In: Elsevier Future Generation Computer Systems (FGCS), Volume 93, April 2019, Pages 596-608.

  2. Dateneigentum in der vierten industriellen Revolution?

    Johannes Müller
    In: Datenschutz und Datensicherheit (DuD), Springer Fachmedien Wiesbaden, Volume 43, Issue 3, March 2019, Pages 159–166.

  3. Enabling Users to Specify Correct Privacy Requirements

    Manuel Rudolph, Svenja Polst, Joerg Doerr
    In: Proceedings of the 25th International Working Conference (REFSQ 2019), March 2019, Essen, Germany.

  4. Enabling Trust in IIoT: A Physec based Approach

    Christoph Lipps, Simon Duque Antón, Hans Dieter Schotten
    In: Proceedings of the ACPI 14th International Conference on Cyber Warfare and Security (ICCWS), Stellenbosch, South Africa.

  5. Implementing SCADA Scenarios and Introducing Attacks do Obtain Training Data for Intrusion Detection Methods

    Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten
    In: Proceedings of the ACPI 14th International Conference on Cyber Warfare and Security (ICCWS), Stellenbosch, South Africa.

  6. Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations

    Peter Schneider, Alexander Giehl
    In: Katsikas S. et al. (eds) Computer Security. SECPRE 2018, CyberICPS 2018. Lecture Notes in Computer Science, vol 11387. Springer, Cham

  7. IT Security in Industry 4.0

    Sven Plaga
    Digital Twin Workshop @Centre of Smart Manufacturing CONFIRM, December 2018, Limerick, Ireland.

  8. Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support

    Sven Plaga, Norbert Wiedermann, Matthias Niedermaier, Alexander Giehl, Thomas Newe
    In: Proceedings of the 12th IEEE International Conference on Sensing Technology (ICST), December 2018, University of Limerick, Ireland.

  9. Projekt IUNO – Sicherheit in der Industrie

    Sven Plaga
    VDE Tec Summit 2018, November 2018, Berlin, Germany.

  10. Time is of of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data

    Simon Duque Antón, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten
    In: Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW),  November 2018, Singapore, Singapore.

  11. Putting Things in Context: Securing Industrial Authentication with Context Information

    Simon Duque Antón, Daniel Fraunholz, Christoph Lipps, Khurshid Alam, Hans Dieter Schotten
    In: International Journal on Cyber Situational Awareness (IJCSA) 3 1 C-MRiC 11/2018.

  12. Catch Me If You Can: Dynamic Concealment of Network Entities

    Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten 
    In:  Proceedings of the 5th ACM Workshop on Moving Target Defense. ACM Workshop on Moving Target Defense (MTD-2018), November 2018, Toronto, Canada.

  13. Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web Services

    Daniel Fraunholz, Daniel Reti, Simon Duque Antón, Hans Dieter Schotten 
    In: Proceedings of the 5th ACM Workshop on Moving Target Defense. ACM Workshop on Moving Target Defense (MTD-2018), November 2018, Toronto, Canada.

  14. Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments

    Daniel Fraunholz, Daniel Schneider, Janis Zemitis, Hans Dieter Schotten 
    In: Proceedings of the 2nd ACM Central European Cybersecurity Conference (CECC-2018), November 2018, Ljubljana, Slovenia.

  15. Implementing a performant security control for Industrial Ethernet

    Alexander Giehl, Sven Plaga
    In: Proceedings of the IEEE International Conference on Signal Processing and Information Security (ICSPIS), November 2018,  Dubai, United Arab Emirates.

     

  16. High-Performance Unsupervised Anomaly Detection for Cyber-Physical System Networks

    Peter Schneider,  Konstantin Böttinger
    In:  Proceedings of the 2018 ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), October 2018, Toronto, Canada.

     

  17. Satisfying and Efficient Privacy Settings

    Manuel Rudolph, Svenja Polst
    In: In: Dachselt, R. & Weber, G. (Hrsg.), Mensch und Computer 2018 - Tagungsband. Bonn: Gesellschaft für Informatik e.V., September 2018.

  18. The Dos and Don'ts of Industrial Netwok Simulation: A Field Report

    Simon Duque Antón, Daniel Fraunholz, Dennis Krummacker, Christoph Fischer, Michael Karrenbauer, Hans Dieter Schotten
    In: Proceedings of the 2nd ACM International Symposium on Computer Science and Intelligent Control (ISCSIC),  September 2018,  Stockholm, Sweden.

  19. Adversarial malware binaries: Evading deep learning for malware detection in executables

    Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli
    In: Proceedings of the 26th IEEE European Signal Processing Conference (EUSIPCO), September 2018, Rome, Italy.

  20. Evaluation of Machine Learning-Based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

    Simon Duque Antón, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten
    In: Proceedings of the 13th ACM International Conference on Availability, Reliability and Security  (ARES), August 2018, Hamburg, Germany.

  21. Smashing the Stack Protector for Fun and Profit

    Bruno Bierbaumer, Julian Kirsch, Thomas Kittel,  Aurélien Francillon,  Apostolis Zarras
    In: Janczewski L., Kutyłowski M. (eds) ICT Systems Security and Privacy Protection. SEC 2018. IFIP Advances in Information and Communication Technology, vol 529. Springer, Cham

  22. Anti-Reconnaissance: Long Short-Term Memory based Detection, Classification and Mitigation of Hostile Network Exploration

    Daniel Fraunholz, Daniel Reti, Simon Duque Antón, Hans Dieter Schotten
    In: Proceedings of the 17th ACPI Conference on Cyber Warfare and Security (ECCWS), June 2018, University of Oslo, Norway.

  23. Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications

    Daniel Fraunholz, Daniel Krohmer, Carolina Nogueira, Hans Dieter Schotten 
    In: Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security-2018), June 2018, Glasgow, United Kingdom.

  24. Deception as a Service: A Reverse Web Proxy Framework [Poster]

    Daniel Fraunholz, Daniel Reti, Hans Dieter Schotten 
    In: Proceedings of the 17th ACPI Conference on Cyber Warfare and Security (ECCWS), June 2018, University of Oslo, Norway.

  25. Reforming Industrial Information Assurance: Experiments with OPC UA Honeypots

    Sriharsha Basavaraju, Amritha Herle, Daniel Fraunholz
    In: Proceedings of the 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2018), June 2018, Luxembourg,  Luxembourg.

  26. Secure your SSH Keys! – Motivation and Practical Implementation of a HSM-based Approach Securing Private SSH-Keys

    Sven Plaga, Norbert Wiedermann, Gerhard Hansch, Thomas Newe
    In: Proceedings of the 17th ACPI Conference on Cyber Warfare and Security (ECCWS), June 2018, University of Oslo, Norway.

  27. Why Users Ignore Privacy Policies: A Survey and Intention Model for Explaining User Privacy Behavior

    Manuel Rudolph, Denis Feth, Svenja Polst
    In:  Kurosu M. (eds) Human-Computer Interaction. Theories, Methods, and Human Issues. HCI 2018. Lecture Notes in Computer Science, vol 10901. Springer, Cham.

  28. Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case

    Sven Plaga, Melanie Niethammer, Norbert Wiedermann, Alexander Borisov
    In: Proceedings of the IEEE 1st  International Conference on Data Intelligence and Security (ICDIS),  April 2018, University of Texas Rio Grande Valley; South Padre Island, USA.

     

  29. Proof of Concept for IoT Device Authentication based on SRAM PUFs using ATMEGA 2560-MCU

    Christoph Lipps, Weinand Andreas, Dennis Krummacker, Christoph Fischer, Hans Dieter Schotten
    In: Proceedings of the IEEE 1st  International Conference on Data Intelligence and Security (ICDIS),  April 2018, University of Texas Rio Grande Valley; South Padre Island, USA. 

  30. Learning on a Budget for User Authentication on Mobile Devices

    Bojan Kolosnjaji, Antonia Hüfner, Claudia Eckert, Apostolis Zarras
    In: Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), April 2018, Calgary, Canada.

  31. Defending Web Servers with Feints, Distraction and Obfuscation

    Daniel Fraunholz, Hans Dieter Schotten
    In: Proceedings of the IEEE International Conference on Computing, Networking and Communications  (ICNC), March 2018,  Maui, HI, USA.

  32. On The Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework

    Daniel Fraunholz , Daniel Krohmer, Frederic Pohl, Hans Dieter Schotten
    In: Proceedings of the 9th IEEE IFIP International Conference on New Technologies, Mobility and Security (NTMS),  Feb 2018, Paris, France.

  33. Rowhammer - A Survey Assessing the Severity of this Attack Vector

    Norbert Wiedermann, Sven Plaga
    In: Proceedings of the Embedded World Conference 2018, February 2018, Nuremberg, Germany,  ISBN: 978-3-645-50173-6.

  34. Strategic Defense and Attack in Deception Based Network Security

    Daniel Fraunholz, Hans Dieter Schotten
    In: Proceedings of the IEEE 32nd International Conference on Information Networking (ICOIN), Jan 2018,  Chiang Mai, Thailand.

  35. Data Mining in Long-Term Honeypot Data

    Daniel Fraunholz, Marc Zimmermann, Alexander Hafner, Hans Dieter Schotten 
    In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), November 2017, New Orleans, USA.

  36. A Question of Context: Enhancing Intrusion Detection by Providing Context Information

    Simon Duque Anton, Daniel Fraunholz , Stephan Teuber, Hans Dieter Schotten
    In: Proceedings of the IEEE 13th Conference of Telecommunication, Media and Internet Techno-Economics (CTTE); located at Joint CTTE and CMI, November 2017, Copenhagen, Denmark.

  37. Two Decades of SCADA Exploitation: A Brief History

    Simon Duque Antón, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann, Hans Dieter Schotten
    In: Proceedings of the IEEE Conference on Application, Information and Network Security (AINS), November 2017, Miri, Malaysia.

  38. YAAS - On the Attribution of Honeypot Data

    Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, and Hans Dieter Schotten
    In: International Journal on Cyber Situational Awareness (IJCSA), Volume 2, No. 1 2017, pp31-48.

  39. Datenschutz, Datensicherheit und IT-Sicherheit in der Arbeitswelt im Zeichen von Industrie 4.0 und Big Data, Teil 3

    Philipp Richter, Johannes Müller
    In: Sicher ist Sicher, September 2017, pp. 506-509.

  40. Dynamic loader oriented programming on Linux

    Julian Kirsch, Bruno Bierbaumer, Thomas Kittel, Claudia Eckert
    In: Proceedings of the ACM 1st Reversing and Offensive-oriented Trends Symposium, November 2017, Vienna, Austria.

  41. Deception in Information Security: Legal Considerations in the Context of German and European Law

    Daniel Fraunholz, Christoph Lipps, Marc Zimmermann, Simon Duque Antón, Johannes Karl Martin Müller, Hans Dieter Schotten
    In: Imine A., Fernandez J., Marion JY., Logrippo L., Garcia-Alfaro J. (eds) Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science, vol 10723. Springer, Cham

  42. Datenschutz, Datensicherheit und IT-Sicherheit in der Arbeitswelt im Zeichen von Industrie 4.0 und Big Data, Teil 2

    Philipp Richter, Johannes Müller
    In: Sicher ist Sicher, Oktober 2017, pp. 446-451.

  43. Packet-wise Compression and Forwarding of Industrial Network Captures

    Gerhard Hansch, Peter Schneider, Sven Plaga
    In: Proceedings of the IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), September 2017, University “Politehnica” of Bucharest,  Bucharest, Romania.

     

  44. Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of and IPSec Performance

    Daniel Fraunholz, Hans Dieter Schotten 
    In: De Paoli F., Schulte S., Broch Johnsen E. (eds) Service-Oriented and Cloud Computing. ESOCC 2017. Lecture Notes in Computer Science, vol 10465. Springer, Cham

  45. Datenschutz, Datensicherheit und IT-Sicherheit in der Arbeitswelt im Zeichen von Industrie 4.0 und Big Data, Teil 1

    Philipp Richter, Johannes Müller
    In: Sicher ist Sicher, September 2017, pp. 367-372.

  46. Introducing GAMfIS: A Generic Attacker Model for Information Security

    Simon Duque Antón, Fraunholz, Stephan Teuber,  Hans Dieter Schotten
    In: Proceedings of the IEEE 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM),  September 2017, Split, Croatia.

  47. Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks

    Apostolis Zarras, Federico Maggi
    In: Proceedings of the 15th Annual Conference on Privacy, Security and Trust (PST), August 2017, Calgary, AB, Canada.

  48. Towards Deployment Strategies for Deception Systems

    Daniel Fraunholz, Marc Zimmermann, Hans Dieter Schotten
    In: Advances in Science, Technology and Engineering Systems Journal (ASTESJ),  Volume 2, Number  3-2017, pp. 1272-1279.

  49. Finding the needle: A study of the PE32 rich header and respective malware triage

    George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert
    In: Polychronakis M., Meier M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2017. Lecture Notes in Computer Science, vol 10327. Springer, Cham

  50. Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot

    Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten 
    In: IEEE International Conference On Cyber Security And Protection Of Digital Services (Cyber Security-17), June 2017, London, United Kingdom.

  51. Towards Basic Design Principles for High- and Medium-Interaction Honeypots

    Daniel Fraunholz, Frederic Pohl, Hans Dieter Schotten 
    In: Proceedings of the 16th ACPI European Conference on Cyber Warfare and Security (ECCWS), June 2017, Dublin, Ireland.

  52. Empowering convolutional networks for malware classification and analysis

    Bojan Kolosnjaji, Ghadir Eraisha, George Webster, Apostolis Zarras, Claudia Eckert
    In: Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN), May 2017, Anchorage, AK, USA.

  53. Combating Control Flow Linearization

    Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, Claudia Eckert
    In: Proceedings of the 32nd IFIP TC 11 International Conference (SEC 2017), May 2017, Rome, Italy.

  54. Towards automated classification of firmware images and identification of embedded devices

    Andrei Costin, Apostolis Zarras, Aurélien Francillon
    In: De Capitani di Vimercati S., Martinelli F. (eds) ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, vol 502. Springer, Cham

  55. Das Projekt IUNO - Nationales Referenzprojekt zur IT-Sicherheit in Industrie 4.0

    Yübo Wang, Thomas Wolfenstetter, Erdal Tantik, Reiner Anderl, Ernst Esslinger
    In: Proceedings of the 15. Deutscher IT-Sicherheitskongress des BSI, May 2017, Bonn, Germany.

  56. Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO

    Simon Duque Antón,Daniel Fraunholz, Hans Dieter Schotten
    In: Proceedings of the  22. VDE/ITG Fachtagung Mobilkommunikation in Osnabrueck, May 2017, Osnabrück, Germany.

  57. Datenschutz und Datensicherheit – Bedeutung für die Arbeitswelt im Zeichen von ‚Big Data‘

    Philipp Richter, Johannes Müller
    In: Pieper, Ralf / Lang, Karl-Heinz (Hrsg.), Sicherheitswissenschaftliches Kolloquium 2015- 2016 (Band 12), ASER Forschungsberichte, 2017, S.17-37.

  58. Secure Transmission of Data in Wireless Sensor Networks

    Zeal Kothari, Nadine Sinner
    In: Proceedings of the 2017th Embedded World Conference, March 2017, Nuremberg, Germany.

  59. Combined Secure Process and Data Model for IT-Security in Industrie 4.0

    Yübo Wang, Riham Fakhry, Sebastian Rohr, Reiner Anderl
    In: Proceedings of the 2017th International MultiConference of Engineers and Computer Scientists (IMECS 2017),  March 2017, Hong Kong, PRC.

  60. Highly Scaleable and Flexible Model for Effective Aggregation of Context-Based Data in Generic IIoT Scenarios

    Simon Duque Antón, Daniel Fraunholz, Janis Zemitis, Frederic Pohl, Hans Dieter Schotten
    In: Proceedings of the 9th CEUR Central European Workshop on Services and their Composition (ZEUS), February 2017, Lugano Switzerland.  

  61. An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

    Daniel Fraunholz,  Marc Zimmermann, Hans Dieter Schotten
    In: Proceedings of the 19th IEEE Advanced Communication Technology International Conference (ICACT), February 2017, Bongpyeong, South Korea.

  62. Distributed and Highly-Scalable WAN Network Attack Sensing and Sophisticated Analysing Framework based on Honeypot Technology

    Daniel Fraunholz, Marc Zimmermann, Simon Duque Antón, Jörg Schneider, Hans Dieter Schotten
    In: 7th International Conference on Cloud Computing, Data Science & Engineering (Confluence-2017) , January 2017, Noida, India.

  63. Deceptive Cyber Defense for IIoT

    Daniel Fraunholz, Hans Dieter Schotten 
    In: The Ninth International Conference on Mobile Computing and Ubiquitous Networking (ICMU-16), October 2016, Kaiserslautern, Germany.

  64. Logboat – A Simulation Framework Enabling CAN Security Assessments

    Sven Plaga, Stefan Tatschner, Thomas Newe
    In: Proceedings of the IEEE 21st Applied Electronics International Conference (AE), September 2016, University of West Bohemia, Pilsen Czech Republic.

  65. Providing Physical Layer Security for Mission Critical Machine Type Communication

    Andreas Weinand, Abhijit Ambekar, Michael Karrenbauer, Hans Dieter Schotten
    In: Proceedings of the IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), September 2016, Berlin, Germany.

  66. Honeypots for Industrial IoT Applications

    Daniel Fraunholz, Jörg Schneider, Simon Duque Antón, Christoph Lipps, Hans Dieter Schotten
    In: Kleinheubacher Tagung (KH-2016), September2016, Miltenberg, Germany.

  67. Usable Security Policy Specification

    Manuel Rudolph,  Denis Feth
    In: Weyers, B. & Dittmar, A. (Hrsg.), Mensch und Computer 2016 – Workshopband. Aachen: Gesellschaft für Informatik e.V, September 2016.

  68. Requirements Elicitation and Derivation of Security Policy Templates—An Industrial Case Study

    Manuel Rudolph, Denis Feth, Joerg Doerr, Joerg Spilker
    In: Proceedings of the 24th IEEE International Requirements Engineering Conference (RE), September 2016, Bejing, PRC.

  69. A Framework for Generating User-and Domain-Tailored Security Policy Editors

    Manuel Rudolph, Cornelius Moucha, Denis Feth
    In: Proceedings of the 24th IEEE International Requirements Engineering Conference Workshops (REW), September 2016, Bejing, PRC.

  70. Secure Information Model for Data Marketplaces enabling Global Distributed Manufacturing

    Ghaidaa Shaabany, Marco Grimm, Reiner Anderl
    In:  Proceedings of the 26th CIRP Design Conference/Procedia CIRP, Volume 50, August 2016, Pages 360-365.

  71. Leveraging Internet services to evade censorship

    Apostolis Zarras
     In: Bishop M., Nascimento A. (eds) Information Security. ISC 2016. Lecture Notes in Computer Science, vol 9866. Springer, Cham

  72. Adaptive semantics-aware malware classification

    Bojan Kolosnjaji, Apostolis Zarras, Tamas Lengyel, George Webster, Claudia Eckert
    In: Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment , July 2016, San Sebastián, Spain.

  73. Angriffe à la carte - systematische Bewertung von Angriffsvektoren auf industrielle (Funk-)Netzwerke

    Michael Langfinger, Simon Duque Antón, Christoph Lipps, Andreas Weinand, Hans Dieter Schotten
    In: Proceedings of the 17. VDI Automatisierungskongress (AUTOMATION-2016),  June 2016, Baden-Baden, Germany, ISBN 978-3-18-092284-0.

  74. Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems

    Johannes Obermaier, Martin Hutle
    In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS ),  May 2016, Xi'an, China

  75. Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

    Andrei Costin, Apostolis Zarras, Aurélien Francillon
    In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 437-448, May 2016, Xi'an, China.

  76. Security in industry 4.0: challenges and solutions for the fourth industrial revolution

    Waidner, M., & Kasper, M. (2016, March).
    In: Proceedings of the IEEE  Design, Automation & Test in Europe Conference & Exhibition (DATE), March 2016,  Dresden, Germany.

  77. Comprehensive framework of the Industry 4.0 remote maintenance platform

    Tantik, E., Anderl, R
    International Conference on Healthcare, Applied Science and Engineering, 2016, Madrid, Spanien.

  78. Piracy Protection Navigator I4.0 for Industrial Systems

    Ghaidaa Shaabany, Simon Frisch, Katrin Pitz, Reiner Anderl
    In: Proceedings of the Global Conference on Applied Computing in Science & Engineering Conference, 2016

  79. Gefahren in der Industrie 4.0 und IT-Sicherheitslösungen des Nationalen Referenzprojekts IUNO - eine praktische Vorführung

    Frisch, S.,(2016, Seeheim-Jugenheim, Deutschland).
    Konferenzbeitrag, Siemens PLM Connection Deutschland.
     

  80. Industrie 4.0 – Digital Transformation in Product Engineering and Production

    Rainer Anderl
    Industrie 4.0–Digital Transformation in Product Engineering and Production, 2016.

  81. Absicherungskonzepte für Industrie 4.0

    Norbert Wiedermann
    In: Datenschutz und Datensicherheit-DuD, September 2015, Volume 39, Pages 652-656.