Refine
Has Fulltext
- no (83)
Document Type
- Other (83) (remove)
Language
- English (83) (remove)
Is part of the Bibliography
- yes (83)
Keywords
- E-Learning (4)
- Scrum (4)
- MOOC (3)
- Security Metrics (3)
- Security Risk Assessment (3)
- Teamwork (3)
- 3D printing (2)
- Android (2)
- Blockchain (2)
- Cloud-Security (2)
- Information flow control (2)
- Kanban (2)
- Lecture Video Archive (2)
- Machine Learning (2)
- Secure Configuration (2)
- Social Media Analysis (2)
- capstone course (2)
- evaluation (2)
- fabrication (2)
- retrospective (2)
- software process improvement (2)
- user experience (2)
- variable geometry truss (2)
- 3D Point Clouds (1)
- Agile (1)
- Agile methods (1)
- Algorithms (1)
- Answer set programming (1)
- Application Container Security (1)
- Audit (1)
- Automatic domain term extraction (1)
- BPMN (1)
- Bandwidth (1)
- Big Five Model (1)
- Blockchain Governance (1)
- Blockchain-enabled Governance (1)
- Boolean Networks (1)
- Brand Personality (1)
- Business process models (1)
- Business process simulation (1)
- CMOS technology (1)
- Case Management (1)
- Cloud Audit (1)
- Cloud Computing (1)
- Cloud Service Provider (1)
- Co-production (1)
- Collaborative learning (1)
- Conceptual Fit (1)
- DMN (1)
- Data compression (1)
- Data mining (1)
- Data mining Machine learning (1)
- Data partitioning (1)
- Data profiling (1)
- Decision models (1)
- Declarative modelling (1)
- Digitization (1)
- Distance Learning (1)
- Diverse solution enumeration (1)
- E-Learning exam preparation (1)
- E-Lecture (1)
- Educational Data Mining (1)
- Educational Technology (1)
- Embedded Programming (1)
- Emotion Mining (1)
- Energy efficiency (1)
- Entropy (1)
- Expert knowledge (1)
- Extensibility (1)
- Fabrication (1)
- Flash (1)
- GMDH (1)
- GTEx (1)
- Geospatial intelligence (1)
- Graph Algorithms (1)
- Graph Theory (1)
- HLS (1)
- HPI Schul-Cloud (1)
- HTML5 (1)
- Hyperbolic Geometry (1)
- IEEE 802.15.4 (1)
- IT project (1)
- Industry 4.0 (1)
- Information system (1)
- Intent analysis (1)
- Interacting processes (1)
- Internet (1)
- Internet of Things (1)
- Interoperability (1)
- Java (1)
- JavaScript (1)
- K-12 (1)
- Learning Factory (1)
- Lecture Recording (1)
- MAC security (1)
- MOOC Remote Lab (1)
- MOOCs (1)
- MQTT (1)
- Meltdown (1)
- Memory Dumping (1)
- Metamaterials (1)
- Microservices Security (1)
- Minimum spanning tree (1)
- Mobile Learning (1)
- Mobiles (1)
- Model checking (1)
- Model extraction (1)
- Moving Target Defense (1)
- NETCONF (1)
- Nash equilibrium (1)
- Natural Language Processing (1)
- Natural language processing (1)
- Network Science (1)
- Network creation games (1)
- Neural Networks (1)
- New Public Governance (1)
- Offline-Enabled (1)
- Ontology (1)
- Peer Assessment (1)
- Peer assessment (1)
- Personality Prediction (1)
- Process architecture (1)
- Process landscape (1)
- Process map (1)
- Process model (1)
- Process-related data (1)
- Programming course (1)
- Project-based learning (1)
- Psychological Emotions (1)
- Python (1)
- RNAseq (1)
- Roadmap (1)
- SAFE (1)
- SET effects (1)
- School (1)
- Secondary Education (1)
- Security (1)
- Security analytics (1)
- Semantic Web (1)
- Servicification (1)
- Smart Home Education (1)
- Spatial data handling systems (1)
- Spatio-Temporal Data (1)
- Spatio-temporal data analysis (1)
- Spectre (1)
- Static analysis (1)
- Subject-oriented learning (1)
- Survey (1)
- TCGA (1)
- Team Assessment (1)
- Team based assignment (1)
- Team-based Learning (1)
- Threat Models (1)
- Time series data (1)
- Topic modeling (1)
- Trajectory Data Management (1)
- Tree maintenance (1)
- Ubiquitous (1)
- Unified logging system (1)
- Video annotations (1)
- Virtual Machine (1)
- Vulnerability analysis (1)
- WALA (1)
- YANG (1)
- accelerator architectures (1)
- action problems (1)
- agile (1)
- allocation problem (1)
- bachelor project (1)
- behavior psychotherapy (1)
- cloud monitoring (1)
- combinational logic (1)
- comparison (1)
- computational hardness (1)
- computer science education (1)
- computer-mediated therapy (1)
- data integration (1)
- data transfer (1)
- database replication (1)
- decoupling cells (1)
- development artifacts (1)
- edge-weighted networks (1)
- emotion measurement (1)
- game dynamics (1)
- gene selection (1)
- geographical distribution (1)
- graphical query language (1)
- hardware (1)
- human-computer interaction (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- labeling (1)
- large scale mechanism (1)
- large-scale mechanism (1)
- learning factories (1)
- learning platform (1)
- linear programming (1)
- link layer security (1)
- low-duty-cycling (1)
- medical documentation (1)
- microstructures (1)
- multimodal wireless sensor network (1)
- non-photorealistic rendering (1)
- note-taking (1)
- oneM2M (1)
- point-based rendering (1)
- price of anarchy (1)
- production networks (1)
- programmable matter (1)
- project based learning (1)
- radiation hardening (1)
- real-time rendering (1)
- rekeying (1)
- secure multi-execution (1)
- security analytics (1)
- simulation (1)
- soccer analytics (1)
- software development (1)
- software engineering (1)
- style transfer (1)
- task realization strategies (1)
- tissue-awareness (1)
- user research framework (1)
- user-centered design (1)
- visualization (1)
- vocational training (1)
- wake-up radio (1)
- web-based rendering (1)
Institute
- Hasso-Plattner-Institut für Digital Engineering GmbH (83) (remove)
JavaScript is the most popular programming language for web applications. Static analysis of JavaScript applications is highly challenging due to its dynamic language constructs and event-driven asynchronous executions, which also give rise to many security-related bugs. Several static analysis tools to detect such bugs exist, however, research has not yet reported much on the precision and scalability trade-off of these analyzers. As a further obstacle, JavaScript programs structured in Node. js modules need to be collected for analysis, but existing bundlers are either specific to their respective analysis tools or not particularly suitable for static analysis.
Audit - and then what?
(2019)
Current trends such as digital transformation, Internet of Things, or Industry 4.0 are challenging the majority of learning factories. Regardless of whether a conventional learning factory, a model factory, or a digital learning factory, traditional approaches such as the monotonous execution of specific instructions don‘t suffice the learner’s needs, market requirements as well as especially current technological developments. Contemporary teaching environments need a clear strategy, a road to follow for being able to successfully cope with the changes and develop towards digitized learning factories. This demand driven necessity of transformation leads to another obstacle: Assessing the status quo and developing and implementing adequate action plans. Within this paper, details of a maturity-based audit of the hybrid learning factory in the Research and Application Centre Industry 4.0 and a thereof derived roadmap for the digitization of a learning factory are presented.
CSBAuditor
(2018)
Cloud Storage Brokers (CSB) provide seamless and concurrent access to multiple Cloud Storage Services (CSS) while abstracting cloud complexities from end-users. However, this multi-cloud strategy faces several security challenges including enlarged attack surfaces, malicious insider threats, security complexities due to integration of disparate components and API interoperability issues. Novel security approaches are imperative to tackle these security issues. Therefore, this paper proposes CSBAuditor, a novel cloud security system that continuously audits CSB resources, to detect malicious activities and unauthorized changes e.g. bucket policy misconfigurations, and remediates these anomalies. The cloud state is maintained via a continuous snapshotting mechanism thereby ensuring fault tolerance. We adopt the principles of chaos engineering by integrating Broker Monkey, a component that continuously injects failure into our reference CSB system, Cloud RAID. Hence, CSBAuditor is continuously tested for efficiency i.e. its ability to detect the changes injected by Broker Monkey. CSBAuditor employs security metrics for risk analysis by computing severity scores for detected vulnerabilities using the Common Configuration Scoring System, thereby overcoming the limitation of insufficient security metrics in existing cloud auditing schemes. CSBAuditor has been tested using various strategies including chaos engineering failure injection strategies. Our experimental evaluation validates the efficiency of our approach against the aforementioned security issues with a detection and recovery rate of over 96 %.
Cloud storage brokerage is an abstraction aimed at providing value-added services. However, Cloud Service Brokers are challenged by several security issues including enlarged attack surfaces due to integration of disparate components and API interoperability issues. Therefore, appropriate security risk assessment methods are required to identify and evaluate these security issues, and examine the efficiency of countermeasures. A possible approach for satisfying these requirements is employment of threat modeling concepts, which have been successfully applied in traditional paradigms. In this work, we employ threat models including attack trees, attack graphs and Data Flow Diagrams against a Cloud Service Broker (CloudRAID) and analyze these security threats and risks. Furthermore, we propose an innovative technique for combining Common Vulnerability Scoring System (CVSS) and Common Configuration Scoring System (CCSS) base scores in probabilistic attack graphs to cater for configuration-based vulnerabilities which are typically leveraged for attacking cloud storage systems. This approach is necessary since existing schemes do not provide sufficient security metrics, which are imperatives for comprehensive risk assessments. We demonstrate the efficiency of our proposal by devising CCSS base scores for two common attacks against cloud storage: Cloud Storage Enumeration Attack and Cloud Storage Exploitation Attack. These metrics are then used in Attack Graph Metric-based risk assessment. Our experimental evaluation shows that our approach caters for the aforementioned gaps and provides efficient security hardening options. Therefore, our proposals can be employed to improve cloud security.
Microservice Architectures (MSA) structure applications as a collection of loosely coupled services that implement business capabilities. The key advantages of MSA include inherent support for continuous deployment of large complex applications, agility and enhanced productivity. However, studies indicate that most MSA are homogeneous, and introduce shared vulnerabilites, thus vulnerable to multi-step attacks, which are economics-of-scale incentives to attackers. In this paper, we address the issue of shared vulnerabilities in microservices with a novel solution based on the concept of Moving Target Defenses (MTD). Our mechanism works by performing risk analysis against microservices to detect and prioritize vulnerabilities. Thereafter, security risk-oriented software diversification is employed, guided by a defined diversification index. The diversification is performed at runtime, leveraging both model and template based automatic code generation techniques to automatically transform programming languages and container images of the microservices. Consequently, the microservices attack surfaces are altered thereby introducing uncertainty for attackers while reducing the attackability of the microservices. Our experiments demonstrate the efficiency of our solution, with an average success rate of over 70% attack surface randomization.
What Stays in Mind?
(2018)
Subject-oriented learning
(2019)
The transformation to a digitized company changes not only the work but also social context for the employees and requires inter alia new knowledge and skills from them. Additionally, individual action problems arise. This contribution proposes the subject-oriented learning theory, in which the employees´ action problems are the starting point of training activities in learning factories. In this contribution, the subject-oriented learning theory is exemplified and respective advantages for vocational training in learning factories are pointed out both theoretically and practically. Thereby, especially the individual action problems of learners and the infrastructure are emphasized as starting point for learning processes and competence development.
The relentless improvement of silicon photonics is making optical interconnects and networks appealing for use in miniaturized systems, where electrical interconnects cannot keep up with the growing levels of core integration due to bandwidth density and power efficiency limitations. At the same time, solutions such as 3D stacking or 2.5D integration open the door to a fully dedicated process optimization for the photonic die. However, an architecture-level integration challenge arises between the electronic network and the optical one in such tightly-integrated parallel systems. It consists of adapting signaling rates, matching the different levels of communication parallelism, handling cross-domain flow control, addressing re-synchronization concerns, and avoiding protocol-dependent deadlock. The associated energy and performance overhead may offset the inherent benefits of the emerging technology itself. This paper explores a hybrid CMOS-ECL bridge architecture between 3D-stacked technology-heterogeneous networks-on-chip (NoCs). The different ways of overcoming the serialization challenge (i.e., through an improvement of the signaling rate and/or through space-/wavelength division multiplexing options) give rise to a configuration space that the paper explores, in search for the most energy-efficient configuration for high-performance.
Unified logging system for monitoring multiple cloud storage providers in cloud storage broker
(2018)
With the increasing demand for personal and enterprise data storage service, Cloud Storage Broker (CSB) provides cloud storage service using multiple Cloud Service Providers (CSPs) with guaranteed Quality of Service (QoS), such as data availability and security. However monitoring cloud storage usage in multiple CSPs has become a challenge for CSB due to lack of standardized logging format for cloud services that causes each CSP to implement its own format. In this paper we propose a unified logging system that can be used by CSB to monitor cloud storage usage across multiple CSPs. We gather cloud storage log files from three different CSPs and normalise these into our proposed log format that can be used for further analysis process. We show that our work enables a coherent view suitable for data navigation, monitoring, and analytics.
MOOCs in Secondary Education
(2019)
Computer science education in German schools is often less than optimal. It is only mandatory in a few of the federal states and there is a lack of qualified teachers. As a MOOC (Massive Open Online Course) provider with a German background, we developed the idea to implement a MOOC addressing pupils in secondary schools to fill this gap. The course targeted high school pupils and enabled them to learn the Python programming language. In 2014, we successfully conducted the first iteration of this MOOC with more than 7000 participants. However, the share of pupils in the course was not quite satisfactory. So we conducted several workshops with teachers to find out why they had not used the course to the extent that we had imagined. The paper at hand explores and discusses the steps we have taken in the following years as a result of these workshops.