Inhaltstyp
Kategorien
-
PANDORA
- /en/research-topics/cyber-security/projects/pandora
the most rising consequence of cybercrime, other targets, such as military networks and control systems, can be exploited in a powerful move to disrupt and destroy. In addition, many cyberattacks against [...] and incident response, focusing on endpoint protection, as well as information sharing. The PANDORA system will be able to promptly detect and classify known and unknown threats, enforce policies on-the-fly
-
synERGY
- /en/research-topics/cyber-security/projects/synergy
security for cyber-physical value networks Exploiting smaRt Grid sYstems Common security solutions such as firewalls, intrusion detection systems (IDS) and antivirus programmes mainly apply blacklisting approaches [...] minor deviations in system behaviour that can lead to traces of unknown attacks. Unfortunately, most modern anomaly detection solutions are not readily applicable to cyber-physical systems (CPS) and control [...] application of anomaly detection is a promising means to further protect such systems. When applying advanced anomaly detection systems, the primary protection goals in the area of industrial safety, availability
-
CISA
- /en/research-topics/cyber-security/projects/cisa
understanding of the situation (as a basis for deriving situation pictures), as well as the control of systems based on control measures after analysing a cyber situation, have not been given sufficient focus [...] special attention in the project. Partner: AIT Austrian Institute of Technology GmbH (Koordinator), T-System Austria, Thales Austria, Secure Business Austria, REPUCO Unternehmensberatung GmbH, Infraprotect
-
APT-CC
- /en/research-topics/cyber-security/projects/apt-cc
IoC-based early warning systems already in use internationally by authorities and, where applicable, critical infrastructures play an essential role. The goal of such systems is to automatically monitor [...] APT-CC APT-CC Design of an IOC-based early warning system Advanced Persistent Threats (APT) are complex, targeted and effective attacks on critical IT infrastructures (CIs), public authorities and large [...] The study therefore describes the possible structures and operator models of such early warning systems - based on examples from other European countries. Based on this, the study also addresses the question
-
ECOSSIAN
- /en/research-topics/cyber-security/projects/ecossian
sectors, ECOSSIAN is supposed to be the first attempt to develop this holistic system in the sense portrayed above. A prototype system will be developed which facilitates preventive functions like threat monitoring [...] ECOSSIAN ECOSSIAN Design of an IOC-based early warning system The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of [...] management. In the technical architecture with an operations centre and the interfaces to legacy systems (e.g., SCADA), advanced technologies need to be integrated, including fast data aggregation and fusion
-
SOCCRATES
- /en/research-topics/cyber-security/projects/soccrates
SOCCRATES SOCCRATES SOC & CSIRT Response to Attacks & Threats based on ADG Evaluation Systems Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks
-
SPARKS
- /en/research-topics/cyber-security/projects/sparks
resilient control systems; (2) real-time network monitoring of SCADA-based control systems; and (3) novel hardware security technologies for smart metering applications. The control systems research will [...] SPARKS SPARKS Design of an IOC-based early warning system The first aim that SPARKS will target is to promote awareness of existing and emerging smart grid cyber-security risks to stakeholders, including [...] network monitoring and data analysis is key for building advanced SCADA-specific intrusion detection systems, which would protect European smart grid network assets and provide new commercial opportunities
-
BUMBLEBEE
- /en/research-topics/cyber-security/projects/bumblebee
abilities in the area of scenario development as well as IT, OT and military technical component system design and implementation. This will allow the cyber instructors to independently design and implement
-
DAGMAR
- /en/research-topics/cyber-security/projects/dagmar
Beyond the identification of critical infrastructure operators, there is no sufficient definition of system- or supply-relevant companies that can be selectively supported by the public administration in their [...] these approaches to the Austrian situation. There is a need for coordinated and accepted concepts on system- or supply-relevant goods, services or raw materials and their compositions, especially dependencies [...] This is followed by a comprehensive data identification and analysis (critical goods and services, system- and supply-relevant companies, etc.) in order to identify possible relevant structured information
-
e-Panini
- /en/research-topics/cyber-security/projects/e-panini
control and monitoring in real time, if related ICT systems such as distribution and logistics systems, warehouse management and distribution systems can be connected. In addition to these advantages, however [...] and forgery-proof distribution system is required in the event of critical supply shortages and a failure of the usual market mechanisms. After more than 50 years, this system of rationing in paper form ("food [...] by a new and digitally supported system. The central content of this project is to discuss the prerequisites for a possible subsequential implementation of this system and to investigate its feasibility
-
KITT
- /en/research-topics/cyber-security/projects/kitt
tunnels and tunnel control centers. AI shall make use of data based on already existing tunnel sensor systems as well as on future C2I-communication. Furthermore, possibilities of influencing traffic based on
-
PRAETORIAN
- /en/research-topics/cyber-security/projects/praetorian
toolset comprising: (i) a Physical Situation Awareness system, (ii) a Cyber Situation Awareness system; (iii) a Hybrid Situation Awareness system, which will include digital twins of the infrastructure [...] e under protection; and (iv) a Coordinated Response system. The PRAETORIAN toolset will support the security managers of Critical Infrastructures (CI) in their decision making to anticipate and withstand [...] Valencia, Deutsches Zentrum für Luft- und Raumfahrt (DLR), Institute of Communication and Computer Systems, Katholieke Universiteit Leuven, Thales, IDEMIA Identity & Security Germany AG, RiniGARD, Medizinische
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
SHIFT SHIFT Sichere Simulationstechnologien für cyber-physische Systeme Cyber-physical systems (CPS) refer to the fusion and connection of software-technical components with mechanical or electronic components [...] Stuxnet or WannaCry, for example, have shown. Examples of CPS include industrial control systems, but also satellite systems, air traffic management and medical technology. Technical simulation environments can [...] for CPS will be implemented in two application areas, industrial control systems (ICS) and global navigation satellite systems (GNSS) in CPSLabs, a laboratory environment for CPS. (2) The technical simulation
-
IDEV40
- /en/research-topics/cyber-security/projects/idev40
the need-to-know-paradigm, as well as a semantically-enriched data adopting Deep Learning and AI system. • To facilitate the virtualization of the ECS value chain, providing humans and machines access [...] high-skilled teams in a remote way, and empower employees to interact with highly-automated complex systems. Partner: Infineon Technologies AG (Coordinator), AIT Austrian Institute of Technology GmbH, AVL
-
SIREN
- /en/research-topics/cyber-security/projects/siren
A Framework for Measuring Human and System Performance of Safe and Secure Incident Response Strategies for Nuclear Facilities Many of the industrial control systems that support the operation of nuclear [...] with existing safety systems and processes. Whilst there have been many technology developments in this context, e.g., for anomaly detection and incident information sharing systems, there has been relatively [...] performance, in the context of organisational policies and reactive security technologies, and overall system resilience. To support the development of this framework, we will develop a unique testbed facility
-
Planspiel-KSÖ 2021
- /en/research-topics/cyber-security/projects/planspiel-ksoe-2021
Planspiel-KSÖ 2021 Planspiel-KSÖ 2021 Design of an IOC-based early warning system The scope of services includes the technical conceptualisation (based on a given framework scenario), the operational-technical
-
LABYRINTH
- /en/research-topics/cyber-security/projects/labyrinth
risk of collisions. LABYRINTH has identified the need to research on centralized planification systems capable of communicating with the drones in a certain area, processing their desired origin and [...] points and compute paths to avoid collisions. This is embodied in the Unmanned Traffic Management Systems (UTM) that, in contrast to EU strategy, are one of the NASA’s main research priorities, whose objective [...] seaport and airport scenarios, including emergency assistance operations. Partner: EXPACE ON BOARD SYSTEMS, S.L., UNIVERSIDAD CARLOS III DE MADRID, DEUTSCHES ZENTRUM FUER LUFT - UND RAUMFAHRT EV, JEFATURA
-
Nobel Grid
- /en/research-topics/cyber-security/projects/nobel-grid
rmance of the power network. DRFM (Demand Response Flexibility Market): It is a Decision Support System (DSS) that supports different business stakeholders (Aggregator/ Retailer/ESCOs) in portfolio management [...] interaction. Moreover, EMA App includes a GUI for administration purposes to enable the operator of the system to configure and manage the application and communicate with users. Progress beyond the state of [...] Reduction of Carbon Ltd, Finnovaregio, SURTEL ELECTRÓNICA SL, Institute of Communication and Computer Systems, The University of Manchester, KEMA NEDERLAND BV, Goodwolfe Energy Limited, UNINOVA - INSTITUTO DE
-
RASSA-Architektur
- /en/research-topics/cyber-security/projects/rassa-architektur
future smart grid systems use consistently recognized and compatible security standards, and that at the same time the necessary interoperability between components at different system levels and between [...] manufacturers can ensure that the required level of security is met and that the systems are interoperable with other systems and components. The benefits offered by the reference architecture increase with [...] security aspects such as operational reliability (safety), attack security (security), and personal and system protection. Privacy aspects, which specifically take into account the aspects required by the co
-
FACT
- /en/research-topics/cyber-security/projects/fact
(CTIRISP) Projektlaufzeit: 12/2023-11/2026 Förderprogramm: EDF-2022-DA-CYBER-CSIR Cybersecurity and systems for improved resilience × Kontakt Formular Pflichtfelder sind mit einem * markiert. Name * E-Mail