-
TestCat
- /en/research-topics/cyber-security/projects/testcat
configurations. Unfortunately, vendors generally design intrusion detection systems towards protection of enterprise IT rather than system environments of critical infrastructures that commonly involve specialized [...] remains high. Consequently, Austrian authorities are currently preparing a national early-warning system for operators of essential services, however, solutions that enable measurement and assessment of [...] flexible test environments that allow objective and replicable evaluations of intrusion detection systems. Other than existing testbeds that are designed for single-use and quickly become outdated due to
-
SlotMachine
- /en/themen/cyber-security/projects/slotmachine
and access rights management are the prevailing mechanisms provided by modern database management systems to ensure data confidentiality, i.e. that no unauthorised access to private data occurs. Mechanism [...] technologies that are relevant for the design of trustworthy and privacy preserving slot swapping systems. They can be used to enable blind auctions without the need for a trusted party in a decentralised [...] trustworthiness, and since any potentially harmful behaviour by an auctioneer is excluded by design, the system is less attractive to attackers. Blockchain technology includes many interesting concepts that can
-
SECREDAS
- /en/research-topics/cyber-security/projects/secredas
Reliable Dependable Automated Systems SECREDAS aims to develop and validate multi-domain architecting methodologies, reference architectures &components for autonomous systems, combining high security and
-
SAURON
- /en/research-topics/cyber-security/projects/sauron
vulnerabilities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform: To develop (to TRL7) and test a mult
-
SD4MSD
- /en/research-topics/cyber-security/projects/sd4msd
ty, integrity, confidentiality throughout the life cycle of the ICT device is crucial. A modular system architecture was developed that offers multiple purposes of use with simultaneous platform flexibility [...] and reproducibility. In a second iteration, the knowledge gained was incorporated into a refined system concept. In addition to the functional validation by the user, penetration tests were also performed
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
SHIFT SHIFT Sichere Simulationstechnologien für cyber-physische Systeme Cyber-physical systems (CPS) refer to the fusion and connection of software-technical components with mechanical or electronic components [...] Stuxnet or WannaCry, for example, have shown. Examples of CPS include industrial control systems, but also satellite systems, air traffic management and medical technology. Technical simulation environments can [...] for CPS will be implemented in two application areas, industrial control systems (ICS) and global navigation satellite systems (GNSS) in CPSLabs, a laboratory environment for CPS. (2) The technical simulation
-
RASSA-Architektur
- /en/research-topics/cyber-security/projects/rassa-architektur
future smart grid systems use consistently recognized and compatible security standards, and that at the same time the necessary interoperability between components at different system levels and between [...] manufacturers can ensure that the required level of security is met and that the systems are interoperable with other systems and components. The benefits offered by the reference architecture increase with [...] security aspects such as operational reliability (safety), attack security (security), and personal and system protection. Privacy aspects, which specifically take into account the aspects required by the co
-
SOCCRATES
- /en/research-topics/cyber-security/projects/soccrates
SOCCRATES SOCCRATES SOC & CSIRT Response to Attacks & Threats based on ADG Evaluation Systems Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks
-
QUARTER
- /en/research-topics/cyber-security/projects/quarter
combined with QKD systems, can offer information theoretic security on data transmission and storage. - Developing a stand-alone QKD postprocessing (TRL6) module which is compatible with QKD systems from different [...] project, the specific objectives of QUARTER include: - Increasing maturity level of EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces [...] or above) technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling
-
SIREN
- /en/research-topics/cyber-security/projects/siren
A Framework for Measuring Human and System Performance of Safe and Secure Incident Response Strategies for Nuclear Facilities Many of the industrial control systems that support the operation of nuclear [...] with existing safety systems and processes. Whilst there have been many technology developments in this context, e.g., for anomaly detection and incident information sharing systems, there has been relatively [...] performance, in the context of organisational policies and reactive security technologies, and overall system resilience. To support the development of this framework, we will develop a unique testbed facility
-
PRECINCT
- /en/research-topics/cyber-security/projects/precinct
Security, Fundacion TECNALIA Research & Innovation, Engineering - Ingegneria Informatica SPA, Konnecta Systems Ltd, VLTN GCV, KENTRO MELETON ASFALEIAS, JAVNO PODJETJE LJUBLJANSKI POTNISKI PROMET D.O.O., Telekom
-
QSNP
- /en/research-topics/cyber-security/projects/qsnp
world-leading academic groups, research and technology organizations (RTOs), quantum component and system spin-offs, cybersecurity providers, integrators, and telecommunication operators, were members of [...] activities corresponding to the three main layers of the technology value chain, “Components and Systems”, “Networks” and “Cryptography and Security”. This framework will allow achieving the ultimate objective [...] INFORMATIQUE, FRAUNHOFER GESELLSCHAFT ZUR FORDERUNG DER ANG, INSTITUTE OF COMMUNICATION AND COMPUTER SYSTEM, INTERUNIVERSITAIR MICRO-ELECTRONICA CENTRUM, CRYPTONEXT, NEXTWORKS, THINKQUANTUM SRL, QUSIDE TE
-
PREPARED
- /en/research-topics/cyber-security/projects/prepared
Amt" app are made possible by the availability of a digital identity management systems (eID). The basis for such eID systems are cryptographic signatures, which on the one hand guarantee the authenticity [...] analyzing post-quantum-secure signature methods in the context of eID systems. In particular, a migration plan is being developed, as systems with long-lasting certificates and signatures require appropriate [...] and attribute-based credential systems can serve as a replacement. PREPARED is therefore investigating these cryptographic techniques for linking the data in eID systems so that the functionality of bPKs
-
Nobel Grid
- /en/research-topics/cyber-security/projects/nobel-grid
rmance of the power network. DRFM (Demand Response Flexibility Market): It is a Decision Support System (DSS) that supports different business stakeholders (Aggregator/ Retailer/ESCOs) in portfolio management [...] interaction. Moreover, EMA App includes a GUI for administration purposes to enable the operator of the system to configure and manage the application and communicate with users. Progress beyond the state of [...] Reduction of Carbon Ltd, Finnovaregio, SURTEL ELECTRÓNICA SL, Institute of Communication and Computer Systems, The University of Manchester, KEMA NEDERLAND BV, Goodwolfe Energy Limited, UNINOVA - INSTITUTO DE
-
PANDORA
- /en/research-topics/cyber-security/projects/pandora
the most rising consequence of cybercrime, other targets, such as military networks and control systems, can be exploited in a powerful move to disrupt and destroy. In addition, many cyberattacks against [...] and incident response, focusing on endpoint protection, as well as information sharing. The PANDORA system will be able to promptly detect and classify known and unknown threats, enforce policies on-the-fly
-
MITIGATE
- /en/research-topics/cyber-security/projects/mitigate
overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in ports are classified as Critical Information Infrastructures [...] requirements and offers a dynamic risk management system for actors in the maritime process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure [...] solution, the MITIGATE system. The MITIGATE methodology conforms to the main port security standards, the ISPS Code (IT section), ISO 27001 and ISO 28001. The development of the MITIGATE system closely followed
-
MUPOL
- /en/research-topics/cyber-security/projects/mupol
development of more efficient and carbon-saving propulsion systems, or an increase of the modal split of rail in the entire transport system. However, also the potential impact of less high-profile issues [...] no participant needs to reveal any sensitive business information to any other participant in the system, including any third parties or brokers, thereby immediately overcoming the companies’ reluctance
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
ons and connections in which incidents within an infrastructure can have an impact on the entire system. In particular, critical infrastructures in the context of utilities (electricity, gas, water, etc
-
Planspiel-KSÖ 2021
- /en/research-topics/cyber-security/projects/planspiel-ksoe-2021
Planspiel-KSÖ 2021 Planspiel-KSÖ 2021 Design of an IOC-based early warning system The scope of services includes the technical conceptualisation (based on a given framework scenario), the operational-technical
-
IoT4CPS
- /en/research-topics/cyber-security/projects/iot4cps
control systems (component level), to applications (system level). Additionally, specific aspects of accessing the surrounding infrastructures will be considered, as well. Orthogonal to the system integration [...] testing, production and operation of these systems. Realising in a cost-effective way, the full potential of trustworthy and secure cyber-physical systems and applications in Automated Driving and Industry [...] were undertaken in IoT4CPS at the area of Strategic Security Assurance covering hardware, protocols, system architecture and human aspects. Deliverable D4.3.2 Analytical Toolbox (final release) describes the
Searched for "systems".
Found 1848 results in 76 milliseconds.
Displaying results 341 to 360 of 1848.