Options
Tauber, Markus
Loading...
Official Name
Tauber, Markus
Akademische Titel
Ehemaliger FH Mitarbeiter
Scopus Author ID
37058207900
Status
exstaff
Research Outputs
Now showing 1 - 3 of 3
- PublicationEmbedded Artificial Intelligence: The ARTEMIS Vision(IEEE, 2020-11)
;Serpanos, Dimitrios ;Ferrari, Gianluigi ;Nikolakopoulos, George ;Perez, Jon; van Baelen, StefanAdvances in embedded and cyberphysical systems have disrupted numerous application domains. We examine the requirements and challenges of these technologies, which present significant opportunities for interdisciplinary research.193 1Scopus© Citations 5 - PublicationTowards trustworthy end-to-end communication in industry 4.0(IEEE, 2017)
; ; ; ; ;Matischek, Rainer ;Schmittner, Christoph ;Mantas, Georgios ;Thron, MarioDelsing, JerkerIndustry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system.173 1Scopus© Citations 14 - PublicationConnected cars — Threats, vulnerabilities and their impact(IEEE, 2018-05)
; ; ;Schmittner, Christoph; ; Delsing, JerkerThe growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.216 1Scopus© Citations 15