Inhaltstyp
Kategorien
-
PREPARED
- /en/research-topics/cyber-security/projects/prepared
Amt" app are made possible by the availability of a digital identity management systems (eID). The basis for such eID systems are cryptographic signatures, which on the one hand guarantee the authenticity [...] analyzing post-quantum-secure signature methods in the context of eID systems. In particular, a migration plan is being developed, as systems with long-lasting certificates and signatures require appropriate [...] and attribute-based credential systems can serve as a replacement. PREPARED is therefore investigating these cryptographic techniques for linking the data in eID systems so that the functionality of bPKs
-
PRAETORIAN
- /en/research-topics/cyber-security/projects/praetorian
toolset comprising: (i) a Physical Situation Awareness system, (ii) a Cyber Situation Awareness system; (iii) a Hybrid Situation Awareness system, which will include digital twins of the infrastructure [...] e under protection; and (iv) a Coordinated Response system. The PRAETORIAN toolset will support the security managers of Critical Infrastructures (CI) in their decision making to anticipate and withstand [...] Valencia, Deutsches Zentrum für Luft- und Raumfahrt (DLR), Institute of Communication and Computer Systems, Katholieke Universiteit Leuven, Thales, IDEMIA Identity & Security Germany AG, RiniGARD, Medizinische
-
Open QKD
- /en/themen/cyber-security/projects/open-qkd
Konzepte, Prozesse und Methoden wurden durch die Realisierung einer CKM Toolbox unterstützt, ein System zur Software-gestützten Schulungs- und Übungsdurchführung die sich über mehrere CKM Kommunikationsebenen [...] nutzten das OPENQKD-Projekt ebenfalls zur Verbesserung ihrer Produktpalette durch die Einführung neuer Systeme (Cerberis XG bzw. Twin-Field QKD). Der wachsende Bekanntheitsgrad von QKD, der zum Teil auf die
-
Nobel Grid
- /en/research-topics/cyber-security/projects/nobel-grid
rmance of the power network. DRFM (Demand Response Flexibility Market): It is a Decision Support System (DSS) that supports different business stakeholders (Aggregator/ Retailer/ESCOs) in portfolio management [...] interaction. Moreover, EMA App includes a GUI for administration purposes to enable the operator of the system to configure and manage the application and communicate with users. Progress beyond the state of [...] Reduction of Carbon Ltd, Finnovaregio, SURTEL ELECTRÓNICA SL, Institute of Communication and Computer Systems, The University of Manchester, KEMA NEDERLAND BV, Goodwolfe Energy Limited, UNINOVA - INSTITUTO DE
-
PANDORA
- /en/research-topics/cyber-security/projects/pandora
the most rising consequence of cybercrime, other targets, such as military networks and control systems, can be exploited in a powerful move to disrupt and destroy. In addition, many cyberattacks against [...] and incident response, focusing on endpoint protection, as well as information sharing. The PANDORA system will be able to promptly detect and classify known and unknown threats, enforce policies on-the-fly
-
MITIGATE
- /en/research-topics/cyber-security/projects/mitigate
overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in ports are classified as Critical Information Infrastructures [...] requirements and offers a dynamic risk management system for actors in the maritime process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure [...] solution, the MITIGATE system. The MITIGATE methodology conforms to the main port security standards, the ISPS Code (IT section), ISO 27001 and ISO 28001. The development of the MITIGATE system closely followed
-
MUPOL
- /en/research-topics/cyber-security/projects/mupol
development of more efficient and carbon-saving propulsion systems, or an increase of the modal split of rail in the entire transport system. However, also the potential impact of less high-profile issues [...] no participant needs to reveal any sensitive business information to any other participant in the system, including any third parties or brokers, thereby immediately overcoming the companies’ reluctance
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
ons and connections in which incidents within an infrastructure can have an impact on the entire system. In particular, critical infrastructures in the context of utilities (electricity, gas, water, etc
-
Planspiel-KSÖ 2021
- /en/research-topics/cyber-security/projects/planspiel-ksoe-2021
Planspiel-KSÖ 2021 Planspiel-KSÖ 2021 Design of an IOC-based early warning system The scope of services includes the technical conceptualisation (based on a given framework scenario), the operational-technical
-
IoT4CPS
- /en/research-topics/cyber-security/projects/iot4cps
control systems (component level), to applications (system level). Additionally, specific aspects of accessing the surrounding infrastructures will be considered, as well. Orthogonal to the system integration [...] testing, production and operation of these systems. Realising in a cost-effective way, the full potential of trustworthy and secure cyber-physical systems and applications in Automated Driving and Industry [...] were undertaken in IoT4CPS at the area of Strategic Security Assurance covering hardware, protocols, system architecture and human aspects. Deliverable D4.3.2 Analytical Toolbox (final release) describes the
-
KRAKEN
- /en/themen/cyber-security/projects/kraken
durch den Einsatz einer starken Ende-zu-Ende-Verschlüsselung, von Personal Information Management Systems (PIMS) und einer souveränen Identität erreicht, die es ermöglicht, die Kontrolle über persönliche
-
IDEV40
- /en/research-topics/cyber-security/projects/idev40
the need-to-know-paradigm, as well as a semantically-enriched data adopting Deep Learning and AI system. • To facilitate the virtualization of the ECS value chain, providing humans and machines access [...] high-skilled teams in a remote way, and empower employees to interact with highly-automated complex systems. Partner: Infineon Technologies AG (Coordinator), AIT Austrian Institute of Technology GmbH, AVL
-
KONSTANZE
- /en/research-topics/cyber-security/projects/konstanze
and incidents of network and information systems at an early stage. In the scope of this, AIT was commissioned to design a concept for an early warning system based on Indicators Of Compromise (IOC). The [...] KONSTANZE KONSTANZE Design of an IOC-based early warning system KONzeption IOC BaSierTen FrühwArNSystEm Through the NIS Act, the Federal Ministry of the Interior has been tasked with developing proactive [...] overview: Design of a technically, operationally and organizationally mature IOC-based early warning system. A detailed project plan that seamlessly integrated procurement, budget control, and a phased rollout
-
LABYRINTH
- /en/research-topics/cyber-security/projects/labyrinth
risk of collisions. LABYRINTH has identified the need to research on centralized planification systems capable of communicating with the drones in a certain area, processing their desired origin and [...] points and compute paths to avoid collisions. This is embodied in the Unmanned Traffic Management Systems (UTM) that, in contrast to EU strategy, are one of the NASA’s main research priorities, whose objective [...] seaport and airport scenarios, including emergency assistance operations. Partner: EXPACE ON BOARD SYSTEMS, S.L., UNIVERSIDAD CARLOS III DE MADRID, DEUTSCHES ZENTRUM FUER LUFT - UND RAUMFAHRT EV, JEFATURA
-
KITT
- /en/research-topics/cyber-security/projects/kitt
tunnels and tunnel control centers. AI shall make use of data based on already existing tunnel sensor systems as well as on future C2I-communication. Furthermore, possibilities of influencing traffic based on
-
MIRANDA
- /en/research-topics/cyber-security/projects/miranda
multi-tenancy, and service-oriented architectures. The interconnectedness of physical and digital systems (e.g., in Smart City, Smart Grid, Industry 4.0, Automotive , and other business sectors) facilitates [...] the risk that potential threats materialize in the current or a hypothetical context in which the system operates. The MIRANDA framework combines latest advances in digital twinning, attack modeling, f
-
EVE
- /en/research-topics/cyber-security/projects/eve
public transport systems. Through this triaging of user groups at intersections or on highways differently prioritized usage scenarios need to be taken care of by the C-ITS-infrastructure system. Examples for [...] vehicles in automated road traffic : International standards for Cooperative and Intelligent Transport Systems (C-ITS) are currently being worked on and nearing completion. These standards form the basis of future
-
HyRiM
- /en/research-topics/cyber-security/projects/hyrim
including SCADA (Supervisory Control and Data Acquisition) networks and business and information systems. In the context of utility providers, these network types exhibit a significant interaction, and
-
GeRiAn
- /en/research-topics/cyber-security/projects/gerian
(disasters, critical infrastructures, etc.). However, it is essential to ensure a standardised assessment system for all areas and methods, i.e. to apply the same categories for the damage assessment and for the
-
e-Panini
- /en/research-topics/cyber-security/projects/e-panini
control and monitoring in real time, if related ICT systems such as distribution and logistics systems, warehouse management and distribution systems can be connected. In addition to these advantages, however [...] and forgery-proof distribution system is required in the event of critical supply shortages and a failure of the usual market mechanisms. After more than 50 years, this system of rationing in paper form ("food [...] by a new and digitally supported system. The central content of this project is to discuss the prerequisites for a possible subsequential implementation of this system and to investigate its feasibility