-
Post-quantum cryptography: Vorarlberg prepares for the future
The rapid development of quantum technologies presents not only opportunities but also considerable challenges for information security. Against this backdrop, Digital Factory Vorarlberg, together wi
-
CSKA
- /en/research-topics/cyber-security/projects/cska
CSKA CSKA CyberSec - Kompetenz Austria The CyberSec Competence Austria (CSKA) project aims to strengthen cybersecurity capabilities in Austria. In light of increasing cyber threats, new EU regulations
-
SmartCT
- /en/research-topics/transport-optimisation-energy-logistics/projects/smartct
SmartCT Smart Container Trucking The project Smart Container Trucking (SmartCT) aims for improving the process of planning and operation for container trucking by automatically detecting truck-status
-
CTI
- /en/research-topics/cyber-security/projects/cti
CTI CTI Cyber Threat Intelligence Qualifizierungsnetzwerk In light of rapid digital transformation and a massive increase in cyberattacks, it is essential for companies to take proactive measures agai
-
Cultural Data Science
- /en/research-topics/data-science-artificial-intelligence/data-science/cultural-data-science
Cultural Data Science Cultural Data Science Advancing digital methods for the management and analysis of cultural heritage. Data is becoming an increasingly important resource in Cultural Heritage. AI
-
Cultural Data Science
- /en/research-topics/datascienceartificialintelligence/culturaldatascience
Cultural Data Science Cultural Data Science Advancing digital methods for the management and analysis of cultural heritage Data is becoming an increasingly important resource in Cultural Heritage. AIT
-
Insight into virtual currencies
- /en/research-topics/datascienceartificialintelligence/unser-angebot/graphsense
Insight into virtual currencies Insight into virtual currencies GraphSense Logo Virtual currencies such as bitcoin are having a growing impact. Austrian researchers are working on algorithmic solution
-
CURSOR
- /en/research-topics/cyber-security/projects/cursor
CURSOR CURSOR Cyber security exercise concept and framework Cyber-exercises have become central measures in the preparation of crisis and emergency management of organizations. Meanwhile, there is a v
-
RESEARCH PROTECTS CUSTOMERS FROM ONLINE FRAUD
The risk of running into fake online stores on the internet is omnipresent. Fraudsters can use deceptively genuine-looking websites to steal both personal data and consumers' money without them reali
-
Ethics by design in cutting-edge tech development
Identifying and addressing ethical challenges is a critical step to ensuring that the whole of society can benefit from innovation. The EU-funded TechEthos project led by AIT offers guidance for the
-
CySiVuS
- /en/research-topics/dependable-systems-engineering/projects/cysivus
CySiVuS Cyber security for transport infrastructure and road operators (CySiVuS) From the point of view of road traffic infrastructure, cyber attacks pose an eminent threat to autonomously driving and
-
CySiVuS
- /en/research-topics/cyber-security/projects/cysivus
CySiVuS CySiVuS Cyber security for transport infrastructure and road operators CySiVuS (cyber security for transport and road operators) is an FFG-funded research project ( https://projekte.ffg.at/pro
-
Cyber Security
- /en/research-topics/cyber-security
Cyber Security Cyber Security At the AIT Center for Digital Safety & Security, we recognize the challenges of maintaining high security standards in today's cyber threat landscape. Therefore, we speci
-
Cyber Security
- /en/solutions/cyber-security
Cyber Security Cyber Security Here at the AIT Center for Digital Safety & Security, we are aware that in this diverse world of countless emerging new cyber threats, 100% cyber security is an impossibi
-
CyberSecPro
- /en/research-topics/dependable-systems-engineering/projects/cybersecpro
CyberSecPro The goals of the EU project CyberSecPro are to improve existing courses and training programmes on cyber security, to strengthen the focus on practical aspects of industrial security in di
-
Modelling of Cyber-Threats
- /en/research-topics/dependable-systems-engineering/safety-security/modelling-of-cyber-threats
Modelling of Cyber-Threats Modelling of Cyber-Threats Threat and vulnerability catalogues are necessary inputs for the engineering of security critical systems. In addition, maintained threat catalogu
-
CyberMonoLog
- /en/research-topics/cyber-security/projects/cybermonolog
CyberMonoLog CyberMonoLog While for decades the focus of the cyber security domain was on prevention and perimeter security, the orientation has changed in recent years toward active response. It is g
-
CyberTASTE
- /en/research-topics/cyber-security/projects/cybertaste
CyberTASTE CyberTASTE Cyber Range Technology stAck and Simulations for Training and Evaluation Many activities relevant to cyber security cannot be performed on production systems, as they would jeopa
-
Decrypting Cyber Security
JOANNEUM RESEARCH and the SILICON ALPS Cluster, in cooperation with the Lakeside Science & Technology Park Klagenfurt, are organizing the 4th part of the Decrypting Cyber Security event series at
-
DIH West Forum: Cyber and Information Security
Protection against cyberattacks is a key challenge for companies in today's digital age. It is important to correctly assess current threat situations and to take necessary security measures as well
- «
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- »