-
COPKIT
- /en/research-topics/data-science-artificial-intelligence/projects/copkit
complexity and ambiguity). COPKIT proposed an intelligence-led Early Warning (EW) / Early Action (EA) system, directly related to the methodological approach used by EUROPOL in SOCTA. “Intelligence-led policing”
-
AI4PT
- /en/research-topics/data-science-artificial-intelligence/projects/ai4pt
obstacle to the development of AI applications. AI4PT therefore relies on cost-effective camera-based systems with integrated object recognition (SmartCams) in combination with existing subway vehicle sensors
-
DMA
- /en/research-topics/data-science-artificial-intelligence/projects/dma
ng processing- and analysis algorithms; semi-automated data quality improvement; and recommender system-based brokerage technology. In terms of regulatory aspects, beyond creating a clear picture of the
-
synERGY
- /en/research-topics/cyber-security/projects/synergy
security for cyber-physical value networks Exploiting smaRt Grid sYstems Common security solutions such as firewalls, intrusion detection systems (IDS) and antivirus programmes mainly apply blacklisting approaches [...] minor deviations in system behaviour that can lead to traces of unknown attacks. Unfortunately, most modern anomaly detection solutions are not readily applicable to cyber-physical systems (CPS) and control [...] application of anomaly detection is a promising means to further protect such systems. When applying advanced anomaly detection systems, the primary protection goals in the area of industrial safety, availability
-
WALL E
- /en/research-topics/cyber-security/projects/wall-e
current situation) and then analysing the technical technical possibilities of different drive systems were then analysed and compared (Section 3, top-down perspective based on the current possibilities [...] decision-making in the form of a study entitled "Possibilities for the use of alternative vehicle drive systems with a focus on electromobility in the police force". From the perspective of the entire bidding
-
Kunden & Partner
- /en/themen/cyber-security/kunden-partner
Organisation for applied scientific research, The Netherlands https://www.tno.nl/en/ T-Systems https://www.t-systems.com Universität Klagenfurt https://www.aau.at/ Universität Wien https://www.univie.ac
-
TeamAware II
- /en/research-topics/cyber-security/projects/teamaware-ii
situational awareness system for first responders from different sectors with heterogeneous and hardly interoperable sensor units including drone mounted, wearable, and external sensor systems, existing first [...] be dramatically boosted by the advances in technology and engineering fields such as smart sensor systems, wearables, data processing, data fusion, data analytics, communication infrastructure, and artificial
-
SPARKS
- /en/research-topics/cyber-security/projects/sparks
resilient control systems; (2) real-time network monitoring of SCADA-based control systems; and (3) novel hardware security technologies for smart metering applications. The control systems research will [...] SPARKS SPARKS Design of an IOC-based early warning system The first aim that SPARKS will target is to promote awareness of existing and emerging smart grid cyber-security risks to stakeholders, including [...] network monitoring and data analysis is key for building advanced SCADA-specific intrusion detection systems, which would protect European smart grid network assets and provide new commercial opportunities
-
TestCat
- /en/research-topics/cyber-security/projects/testcat
configurations. Unfortunately, vendors generally design intrusion detection systems towards protection of enterprise IT rather than system environments of critical infrastructures that commonly involve specialized [...] remains high. Consequently, Austrian authorities are currently preparing a national early-warning system for operators of essential services, however, solutions that enable measurement and assessment of [...] flexible test environments that allow objective and replicable evaluations of intrusion detection systems. Other than existing testbeds that are designed for single-use and quickly become outdated due to
-
SlotMachine
- /en/themen/cyber-security/projects/slotmachine
and access rights management are the prevailing mechanisms provided by modern database management systems to ensure data confidentiality, i.e. that no unauthorised access to private data occurs. Mechanism [...] technologies that are relevant for the design of trustworthy and privacy preserving slot swapping systems. They can be used to enable blind auctions without the need for a trusted party in a decentralised [...] trustworthiness, and since any potentially harmful behaviour by an auctioneer is excluded by design, the system is less attractive to attackers. Blockchain technology includes many interesting concepts that can
-
SECREDAS
- /en/research-topics/cyber-security/projects/secredas
Reliable Dependable Automated Systems SECREDAS aims to develop and validate multi-domain architecting methodologies, reference architectures &components for autonomous systems, combining high security and
-
SAURON
- /en/research-topics/cyber-security/projects/sauron
vulnerabilities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform: To develop (to TRL7) and test a mult
-
SD4MSD
- /en/research-topics/cyber-security/projects/sd4msd
ty, integrity, confidentiality throughout the life cycle of the ICT device is crucial. A modular system architecture was developed that offers multiple purposes of use with simultaneous platform flexibility [...] and reproducibility. In a second iteration, the knowledge gained was incorporated into a refined system concept. In addition to the functional validation by the user, penetration tests were also performed
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
SHIFT SHIFT Sichere Simulationstechnologien für cyber-physische Systeme Cyber-physical systems (CPS) refer to the fusion and connection of software-technical components with mechanical or electronic components [...] Stuxnet or WannaCry, for example, have shown. Examples of CPS include industrial control systems, but also satellite systems, air traffic management and medical technology. Technical simulation environments can [...] for CPS will be implemented in two application areas, industrial control systems (ICS) and global navigation satellite systems (GNSS) in CPSLabs, a laboratory environment for CPS. (2) The technical simulation
-
RASSA-Architektur
- /en/research-topics/cyber-security/projects/rassa-architektur
future smart grid systems use consistently recognized and compatible security standards, and that at the same time the necessary interoperability between components at different system levels and between [...] manufacturers can ensure that the required level of security is met and that the systems are interoperable with other systems and components. The benefits offered by the reference architecture increase with [...] security aspects such as operational reliability (safety), attack security (security), and personal and system protection. Privacy aspects, which specifically take into account the aspects required by the co
-
SOCCRATES
- /en/research-topics/cyber-security/projects/soccrates
SOCCRATES SOCCRATES SOC & CSIRT Response to Attacks & Threats based on ADG Evaluation Systems Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks
-
QUARTER
- /en/research-topics/cyber-security/projects/quarter
combined with QKD systems, can offer information theoretic security on data transmission and storage. - Developing a stand-alone QKD postprocessing (TRL6) module which is compatible with QKD systems from different [...] project, the specific objectives of QUARTER include: - Increasing maturity level of EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces [...] or above) technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling
-
SIREN
- /en/research-topics/cyber-security/projects/siren
A Framework for Measuring Human and System Performance of Safe and Secure Incident Response Strategies for Nuclear Facilities Many of the industrial control systems that support the operation of nuclear [...] with existing safety systems and processes. Whilst there have been many technology developments in this context, e.g., for anomaly detection and incident information sharing systems, there has been relatively [...] performance, in the context of organisational policies and reactive security technologies, and overall system resilience. To support the development of this framework, we will develop a unique testbed facility
-
PRECINCT
- /en/research-topics/cyber-security/projects/precinct
Security, Fundacion TECNALIA Research & Innovation, Engineering - Ingegneria Informatica SPA, Konnecta Systems Ltd, VLTN GCV, KENTRO MELETON ASFALEIAS, JAVNO PODJETJE LJUBLJANSKI POTNISKI PROMET D.O.O., Telekom
-
QSNP
- /en/research-topics/cyber-security/projects/qsnp
world-leading academic groups, research and technology organizations (RTOs), quantum component and system spin-offs, cybersecurity providers, integrators, and telecommunication operators, were members of [...] activities corresponding to the three main layers of the technology value chain, “Components and Systems”, “Networks” and “Cryptography and Security”. This framework will allow achieving the ultimate objective [...] INFORMATIQUE, FRAUNHOFER GESELLSCHAFT ZUR FORDERUNG DER ANG, INSTITUTE OF COMMUNICATION AND COMPUTER SYSTEM, INTERUNIVERSITAIR MICRO-ELECTRONICA CENTRUM, CRYPTONEXT, NEXTWORKS, THINKQUANTUM SRL, QUSIDE TE
Searched for "systems".
Found 1182 results in 52 milliseconds.
Displaying results 341 to 360 of 1182.