-
E-ARK
- /en/research-topics/data-science-artificial-intelligence/projects/e-ark
practices that cater for a range of data from different types of source including record management systems and databases. The key objective to provide one common, robust approach that is replicable and scalable
-
FLORIDA
- /en/research-topics/data-science-artificial-intelligence/projects/florida
aten The FLORIDA project supported the development of a flexible, semi-automated video forensics system for public safety and law enforcement authorities, in particular the Austrian Federal Office for [...] terrorist attacks. Through the application of advanced technologies developed within the project, the system improved the efficiency and quality of work for investigators in this context because research,
-
Cryptography Consulting and Standardization
- /en/research-topics/cyber-security/solutions-services/crypto-consulting-alt
privacy enhancing technologies and online privacy, post-quantum cryptography as well as distributed systems. Particularly, we work on cryptographic building blocks such as attribute-based encryption (ABE) [...] solutions. Consulting our experts early in your design process can lead to great benefits for your system developers in the form of a sound security architecture and less weakness in your new products. [...] asymmetric cryptography, the rapid progress significantly increases the risk. Therefore, protocols and systems involving asymmetric cryptography should transition to so-called post-quantum secure (or quantum-safe)
-
COPKIT
- /en/research-topics/data-science-artificial-intelligence/projects/copkit
complexity and ambiguity). COPKIT proposed an intelligence-led Early Warning (EW) / Early Action (EA) system, directly related to the methodological approach used by EUROPOL in SOCTA. “Intelligence-led policing”
-
AI4PT
- /en/research-topics/data-science-artificial-intelligence/projects/ai4pt
obstacle to the development of AI applications. AI4PT therefore relies on cost-effective camera-based systems with integrated object recognition (SmartCams) in combination with existing subway vehicle sensors
-
DMA
- /en/research-topics/data-science-artificial-intelligence/projects/dma
ng processing- and analysis algorithms; semi-automated data quality improvement; and recommender system-based brokerage technology. In terms of regulatory aspects, beyond creating a clear picture of the
-
synERGY
- /en/research-topics/cyber-security/projects/synergy
security for cyber-physical value networks Exploiting smaRt Grid sYstems Common security solutions such as firewalls, intrusion detection systems (IDS) and antivirus programmes mainly apply blacklisting approaches [...] minor deviations in system behaviour that can lead to traces of unknown attacks. Unfortunately, most modern anomaly detection solutions are not readily applicable to cyber-physical systems (CPS) and control [...] application of anomaly detection is a promising means to further protect such systems. When applying advanced anomaly detection systems, the primary protection goals in the area of industrial safety, availability
-
WALL E
- /en/research-topics/cyber-security/projects/wall-e
current situation) and then analysing the technical technical possibilities of different drive systems were then analysed and compared (Section 3, top-down perspective based on the current possibilities [...] decision-making in the form of a study entitled "Possibilities for the use of alternative vehicle drive systems with a focus on electromobility in the police force". From the perspective of the entire bidding
-
Kunden & Partner
- /en/themen/cyber-security/kunden-partner
Organisation for applied scientific research, The Netherlands https://www.tno.nl/en/ T-Systems https://www.t-systems.com Universität Klagenfurt https://www.aau.at/ Universität Wien https://www.univie.ac
-
TeamAware II
- /en/research-topics/cyber-security/projects/teamaware-ii
situational awareness system for first responders from different sectors with heterogeneous and hardly interoperable sensor units including drone mounted, wearable, and external sensor systems, existing first [...] be dramatically boosted by the advances in technology and engineering fields such as smart sensor systems, wearables, data processing, data fusion, data analytics, communication infrastructure, and artificial
-
SPARKS
- /en/research-topics/cyber-security/projects/sparks
resilient control systems; (2) real-time network monitoring of SCADA-based control systems; and (3) novel hardware security technologies for smart metering applications. The control systems research will [...] SPARKS SPARKS Design of an IOC-based early warning system The first aim that SPARKS will target is to promote awareness of existing and emerging smart grid cyber-security risks to stakeholders, including [...] network monitoring and data analysis is key for building advanced SCADA-specific intrusion detection systems, which would protect European smart grid network assets and provide new commercial opportunities
-
TestCat
- /en/research-topics/cyber-security/projects/testcat
configurations. Unfortunately, vendors generally design intrusion detection systems towards protection of enterprise IT rather than system environments of critical infrastructures that commonly involve specialized [...] remains high. Consequently, Austrian authorities are currently preparing a national early-warning system for operators of essential services, however, solutions that enable measurement and assessment of [...] flexible test environments that allow objective and replicable evaluations of intrusion detection systems. Other than existing testbeds that are designed for single-use and quickly become outdated due to
-
SlotMachine
- /en/themen/cyber-security/projects/slotmachine
and access rights management are the prevailing mechanisms provided by modern database management systems to ensure data confidentiality, i.e. that no unauthorised access to private data occurs. Mechanism [...] technologies that are relevant for the design of trustworthy and privacy preserving slot swapping systems. They can be used to enable blind auctions without the need for a trusted party in a decentralised [...] trustworthiness, and since any potentially harmful behaviour by an auctioneer is excluded by design, the system is less attractive to attackers. Blockchain technology includes many interesting concepts that can
-
SECREDAS
- /en/research-topics/cyber-security/projects/secredas
Reliable Dependable Automated Systems SECREDAS aims to develop and validate multi-domain architecting methodologies, reference architectures &components for autonomous systems, combining high security and
-
SAURON
- /en/research-topics/cyber-security/projects/sauron
vulnerabilities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform: To develop (to TRL7) and test a mult
-
SD4MSD
- /en/research-topics/cyber-security/projects/sd4msd
ty, integrity, confidentiality throughout the life cycle of the ICT device is crucial. A modular system architecture was developed that offers multiple purposes of use with simultaneous platform flexibility [...] and reproducibility. In a second iteration, the knowledge gained was incorporated into a refined system concept. In addition to the functional validation by the user, penetration tests were also performed
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
SHIFT SHIFT Sichere Simulationstechnologien für cyber-physische Systeme Cyber-physical systems (CPS) refer to the fusion and connection of software-technical components with mechanical or electronic components [...] Stuxnet or WannaCry, for example, have shown. Examples of CPS include industrial control systems, but also satellite systems, air traffic management and medical technology. Technical simulation environments can [...] for CPS will be implemented in two application areas, industrial control systems (ICS) and global navigation satellite systems (GNSS) in CPSLabs, a laboratory environment for CPS. (2) The technical simulation
-
RASSA-Architektur
- /en/research-topics/cyber-security/projects/rassa-architektur
future smart grid systems use consistently recognized and compatible security standards, and that at the same time the necessary interoperability between components at different system levels and between [...] manufacturers can ensure that the required level of security is met and that the systems are interoperable with other systems and components. The benefits offered by the reference architecture increase with [...] security aspects such as operational reliability (safety), attack security (security), and personal and system protection. Privacy aspects, which specifically take into account the aspects required by the co
-
SOCCRATES
- /en/research-topics/cyber-security/projects/soccrates
SOCCRATES SOCCRATES SOC & CSIRT Response to Attacks & Threats based on ADG Evaluation Systems Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks
-
QUARTER
- /en/research-topics/cyber-security/projects/quarter
combined with QKD systems, can offer information theoretic security on data transmission and storage. - Developing a stand-alone QKD postprocessing (TRL6) module which is compatible with QKD systems from different [...] project, the specific objectives of QUARTER include: - Increasing maturity level of EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces [...] or above) technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling
Searched for "systems".
Found 1848 results in 58 milliseconds.
Displaying results 341 to 360 of 1848.