TY - GEN A1 - Zöller, Gert A1 - Holschneider, Matthias T1 - Reply to “Comment on ‘The Maximum Possible and the Maximum Expected Earthquake Magnitude for Production‐Induced Earthquakes at the Gas Field in Groningen, The Netherlands’ by Gert Zöller and Matthias Holschneider” by Mathias Raschke T2 - Bulletin of the Seismological Society of America Y1 - 2018 U6 - https://doi.org/10.1785/0120170131 SN - 0037-1106 SN - 1943-3573 VL - 108 IS - 2 SP - 1029 EP - 1030 PB - Seismological Society of America CY - Albany ER - TY - GEN A1 - Williams, Daniel A1 - Escudero, Paola A1 - Gafos, Adamantios I. T1 - Perceptual sensitivity to spectral change in Australian English close front vowels BT - an electroencephalographic investigation T2 - 19 th annual conference of the international speech communicaton association (INTERSPEECH 2018), VOLS 1-6: Speech research for emerging marjets in multilingual societies N2 - Speech scientists have long noted that the qualities of naturally-produced vowels do not remain constant over their durations regardless of being nominally "monophthongs" or "diphthongs". Recent acoustic corpora show that there are consistent patterns of first (F1) and second (F2) formant frequency change across different vowel categories. The three Australian English (AusE) close front vowels /i:, 1, i/ provide a striking example: while their midpoint or mean F1 and F2 frequencies are virtually identical, their spectral change patterns distinctly differ. The results indicate that, despite the distinct patterns of spectral change of AusE /i:, i, la/ in production, its perceptual relevance is not uniform, but rather vowel-category dependent. KW - vowels KW - pre-attentive discrimination KW - speech perception KW - speech acoustics KW - English dialects Y1 - 2018 SN - 978-1-5108-7221-9 U6 - https://doi.org/10.21437/Interspeech.2018-2505 SN - 2308-457X SP - 1442 EP - 1446 PB - ISCA-International Speech Communication Association CY - Baixas ER - TY - GEN A1 - Wiegmann, Alex A1 - Rutschmann, Ronja A1 - Willemsen, Pascale T1 - Correction to: Empirically Investigating the Concept of Lying (vol 34, pg 591, 2017) T2 - Journal of Indian Council of Philosophical Research Y1 - 2018 U6 - https://doi.org/10.1007/s40961-017-0123-9 SN - 0970-7794 SN - 2363-9962 VL - 35 IS - 1 SP - 223 EP - 223 PB - Springer CY - New Dehli ER - TY - GEN A1 - Weymar, Mathias A1 - Ventura-Bort, Carlos A1 - Wirkner, Janine A1 - Wendt, Julia A1 - Hamm, Alfons T1 - Effects of Transcutaneous Vagus Nerve Stimulation (TVNS) on unpleasant picture processing and long-term memory T2 - Psychophysiology : journal of the Society for Psychophysiological Research Y1 - 2018 SN - 0048-5772 SN - 1469-8986 VL - 55 SP - S18 EP - S18 PB - Wiley CY - Hoboken ER - TY - GEN A1 - Wang, Jingwen A1 - Rychkov, Dmitry A1 - Gerhard, Reimund T1 - Influence of Charge Density on Charge Decay in Chemically Modified Polypropylene Films T2 - 2018 IEEE 2nd International Conference on Dielectrics (ICD) N2 - Previous work has shown that surface modification with orthophosphoric acid can significantly enhance the charge stability on polypropylene (PP) surface by generating deeper traps. In the present study, thermally stimulated potential-decay measurements revealed that the chemical treatment may also significantly increase the number of available trapping sites on the surface. Thus, as a consequence, the so-called "cross-over" phenomenon, which is observed on as-received and thermally treated PP electrets, may be overcome in a certain range of initial charge densities. Furthermore, the discharge behavior of chemically modified samples indicates that charges can be injected from the treated surface into the bulk, and/or charges of opposite polarity can be pulled from the rear electrode into the bulk at elevated temperatures and at the high electric fields that are caused by the deposited charges. In the bulk, a lack of deep traps causes rapid charge decay already in the temperature range around 95 degrees C. KW - polypropylene KW - surface charge stability KW - thermally stimulated discharge KW - cross-over effect KW - chemical modification Y1 - 2018 SN - 978-1-5386-6389-9 U6 - https://doi.org/10.1109/ICD.2018.8514718 PB - IEEE CY - New York ER - TY - GEN A1 - Wagner, Kathrin A1 - Oswald, Sascha A1 - Frick, Annett T1 - Multitemporal soil moisture monitoring by use of optical remote sensing data in a dike relocation area T2 - Remote Sensing for Agriculture, Ecosystems, and Hydrology XX N2 - The nature restoration project ‘Lenzener Elbtalaue’, realised from 2002 to 2011 at the river Elbe, included the first large scale dike relocation in Germany (420 ha). Its aim was to initiate the development of endangered natural wetland habitats and processes, accompanied by greater biodiversity in the former grassland dominated area. The monitoring of spatial and temporal variations of soil moisture in this dike relocation area is therefore particularly important for estimating the restoration success. The topsoil moisture monitoring from 1990 to 2017 is based on the Soil Moisture Index (SMI)1 derived with the triangle method2 by use of optical remotely sensed data: land surface temperature and Normalized Differnce Vegetation Index are calculated from Landsat 4/5/7/8 data and atmospheric corrected by use of MODIS data. Spatial and temporal soil moisture variations in the restored area of the dike relocation are compared to the agricultural and pasture area behind the new dike. Ground truth data in the dike relocation area was obtained from field measurements in October 2017 with a FDR device. Additionally, data from a TERENO soil moisture sensor network (SoilNet) and mobile cosmic ray neutron sensing (CRNS) rover measurements are compared to the results of the triangle method for a region in the Harz Mountains (Germany). The SMI time series illustrates, that the dike relocation area has become significantly wetter between 1990 and 2017, due to restructuring measurements. Whereas the SMI of the dike hinterland reflects constant and drier conditions. An influence of climate is unlikely. However, validation of the dimensionless index with ground truth measurements is very difficult, mostly due to large differences in scale. KW - soil moisture KW - time series KW - SMI KW - triangle method KW - Landsat KW - restoration Y1 - 2018 SN - 978-1-5106-2150-3 U6 - https://doi.org/10.1117/12.2325319 SN - 0277-786X SN - 1996-756X VL - 10783 PB - SPIE-INT Soc Optical Engineering CY - Bellingham ER - TY - GEN A1 - Vasishth, Shravan A1 - Mertzen, Daniela A1 - Jäger, Lena Ann A1 - Gelman, Andrew T1 - Corrigendum to: Shravan Vasishth, Daniela Mertzen, Lena A. Jäger, Andrew Gelman; The statistical significance filter leads to overoptimistic expectations of replicability. - Journal of Memory and Language. - 103 (2018), pg. 151 - 175 T2 - Journal of memory and language Y1 - 2018 U6 - https://doi.org/10.1016/j.jml.2018.09.004 SN - 0749-596X SN - 1096-0821 VL - 104 SP - 128 EP - 128 PB - Elsevier CY - San Diego ER - TY - GEN A1 - Uhlig, Katja A1 - Gehre, Christian P. A1 - Kammerer, Sarah A1 - Küpper, Jan-Heiner A1 - Coleman, Charles Dominic A1 - Püschel, Gerhard Paul A1 - Duschl, Claus T1 - Real-time monitoring of oxygen consumption of hepatocytes in a microbioreactor T2 - Toxicology letters Y1 - 2018 U6 - https://doi.org/10.1016/j.toxlet.2018.06.652 SN - 0378-4274 SN - 1879-3169 VL - 295 SP - S115 EP - S115 PB - Elsevier CY - Clare ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Strauss, Tim A1 - Graupner, Hendrik A1 - Cheng, Feng A1 - Meinel, Christoph T1 - CSBAuditor BT - proactive security risk analysis for cloud storage broker systems T2 - 17th International Symposium on Network Computing and Applications (NCA) N2 - Cloud Storage Brokers (CSB) provide seamless and concurrent access to multiple Cloud Storage Services (CSS) while abstracting cloud complexities from end-users. However, this multi-cloud strategy faces several security challenges including enlarged attack surfaces, malicious insider threats, security complexities due to integration of disparate components and API interoperability issues. Novel security approaches are imperative to tackle these security issues. Therefore, this paper proposes CSBAuditor, a novel cloud security system that continuously audits CSB resources, to detect malicious activities and unauthorized changes e.g. bucket policy misconfigurations, and remediates these anomalies. The cloud state is maintained via a continuous snapshotting mechanism thereby ensuring fault tolerance. We adopt the principles of chaos engineering by integrating Broker Monkey, a component that continuously injects failure into our reference CSB system, Cloud RAID. Hence, CSBAuditor is continuously tested for efficiency i.e. its ability to detect the changes injected by Broker Monkey. CSBAuditor employs security metrics for risk analysis by computing severity scores for detected vulnerabilities using the Common Configuration Scoring System, thereby overcoming the limitation of insufficient security metrics in existing cloud auditing schemes. CSBAuditor has been tested using various strategies including chaos engineering failure injection strategies. Our experimental evaluation validates the efficiency of our approach against the aforementioned security issues with a detection and recovery rate of over 96 %. KW - Cloud-Security KW - Cloud Audit KW - Security Metrics KW - Security Risk Assessment KW - Secure Configuration Y1 - 2018 SN - 978-1-5386-7659-2 U6 - https://doi.org/10.1109/NCA.2018.8548329 PB - IEEE CY - New York ER - TY - GEN A1 - Torkura, Kennedy A. A1 - Sukmana, Muhammad Ihsan Haikal A1 - Meinig, Michael A1 - Kayem, Anne V. D. M. A1 - Cheng, Feng A1 - Meinel, Christoph A1 - Graupner, Hendrik T1 - Securing cloud storage brokerage systems through threat models T2 - Proceedings IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) N2 - Cloud storage brokerage is an abstraction aimed at providing value-added services. However, Cloud Service Brokers are challenged by several security issues including enlarged attack surfaces due to integration of disparate components and API interoperability issues. Therefore, appropriate security risk assessment methods are required to identify and evaluate these security issues, and examine the efficiency of countermeasures. A possible approach for satisfying these requirements is employment of threat modeling concepts, which have been successfully applied in traditional paradigms. In this work, we employ threat models including attack trees, attack graphs and Data Flow Diagrams against a Cloud Service Broker (CloudRAID) and analyze these security threats and risks. Furthermore, we propose an innovative technique for combining Common Vulnerability Scoring System (CVSS) and Common Configuration Scoring System (CCSS) base scores in probabilistic attack graphs to cater for configuration-based vulnerabilities which are typically leveraged for attacking cloud storage systems. This approach is necessary since existing schemes do not provide sufficient security metrics, which are imperatives for comprehensive risk assessments. We demonstrate the efficiency of our proposal by devising CCSS base scores for two common attacks against cloud storage: Cloud Storage Enumeration Attack and Cloud Storage Exploitation Attack. These metrics are then used in Attack Graph Metric-based risk assessment. Our experimental evaluation shows that our approach caters for the aforementioned gaps and provides efficient security hardening options. Therefore, our proposals can be employed to improve cloud security. KW - Cloud-Security KW - Threat Models KW - Security Metrics KW - Security Risk Assessment KW - Secure Configuration Y1 - 2018 SN - 978-1-5386-2195-0 U6 - https://doi.org/10.1109/AINA.2018.00114 SN - 1550-445X SP - 759 EP - 768 PB - IEEE CY - New York ER -