Learn More
OBJECTIVE Magnetoencephalography (MEG) signals had previously been hypothesized to have negligible sensitivity to skull defects. The objective is to experimentally investigate the influence of conducting skull defects on MEG and EEG signals. METHODS A miniaturized electric dipole was implanted in vivo into rabbit brains. Simultaneous recording using(More)
OBJECTIVE The source of somatosensory evoked high-frequency activity at about 600 Hz is still not completely clear. Hence, we aimed to study the influence of double stimulation on the human somatosensory system by analyzing both the low-frequency activity and the high-frequency oscillations (HFOs) at about 600 Hz. METHODS We used median nerve stimulation(More)
Magnetoencephalography (MEG) signals are influenced by skull defects. However, there is a lack of evidence of this influence during source reconstruction. Our objectives are to characterize errors in source reconstruction from MEG signals due to ignoring skull defects and to assess the ability of an exact finite element head model to eliminate such errors.(More)
  • Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, Volker Roth
  • 2015
—Industrial control systems (ICS) are integral components of production and control processes. Our modern infrastructure heavily relies on them. Unfortunately, from a security perspective, thousands of PLCs are deployed in an Internet-facing fashion. Security features are largely absent in PLCs. If they are present then they are often ignored or disabled(More)
Magnetocardiography (MCG) non-invasively provides functional information about the heart. New room-temperature magnetic field sensors, specifically magnetoresistive and optically pumped magnetometers, have reached sensitivities in the ultra-low range of cardiac fields while allowing for free placement around the human torso. Our aim is to optimize positions(More)
Internet service discovery is an emerging topic to study the deployment of protocols. Towards this end, our community periodically scans the entire advertised IPv4 address space. In this paper, we question this principle. Being good Internet citizens means that we should limit scan traffic to what is necessary. We conducted a study of scan data, which shows(More)
Honeypots are a common tool to set intrusion alarms and to study attacks against computer systems. In order to be convincing, honeypots attempt to resemble actual systems that are in active use. Recently, researchers have begun to develop honeypots for programmable logic controllers (PLCs). The tools of which we are aware have limited functionality compared(More)
Six experiments tested two competing models of subjective freedom during decision-making. The process model is mainly based on philosophical conceptions of free will and assumes that features of the process of choosing affect subjective feelings of freedom. In contrast, the outcome model predicts that subjective freedom is due to positive outcomes that can(More)
A major challenge in planning and performing resective surgery in drug-resistant epilepsy is the accurate identification of the epileptogenic zone. Currently, intracranial EEG is considered to be the most reliable preresective functional localisation method. Our objective is to non-invasively localise the epileptogenic zone using simultaneous high-density(More)
  • 1