-
CYBERSENSE II
- /en/research-topics/cyber-security/projects/cybersense-ii
CYBERSENSE II CYBERSENSE II Holistic military cyber situation assessment In recent years, there has been a significant increase in the number of comprehensive cyberattacks using both known methods suc
-
PASSENGER
- /en/research-topics/cyber-security/projects/passenger
PASSENGER PASSENGER Privacy Ensuring and secure exchange of biometric Records The use of effective risk assessment methods to identify foreign terrorist fighters (FTFs) in global travel is an importan
-
CSKA
- /en/research-topics/cyber-security/projects/cska
CSKA CSKA CyberSec - Kompetenz Austria The CyberSec Competence Austria (CSKA) project aims to strengthen cybersecurity capabilities in Austria. In light of increasing cyber threats, new EU regulations
-
Open QKD
- /en/research-topics/cyber-security/projects/open-qkd
Open QKD Open QKD Open European Quantum Key Distribution Testbed OPENQKD brings together a multidisciplinary team of the leading European telecommunication equipment manufacturers, end-users and criti
-
Phoenigs
- /en/research-topics/cyber-security/projects/phoenigs
Phoenigs Phoenigs Preventive options for action for a realignment of Austria's economic security strategy The current global disruptions to the economic and political fabric in Europe and the world th
-
SOPHIE
- /en/research-topics/cyber-security/projects/sophie
SOPHIE SOPHIE Resilience of supply chains against cascading effects from the digital space The resilience of ICT infrastructures is fundamental to the functioning of supply chains. The more reliable t
-
AUDIT
- /en/research-topics/cyber-security/projects/audit
AUDIT AUDIT Automated driving; Road tunnels; Tunnel safety; C-ITS; C2X; V2X; Positioning, communication The ongoing development of digitalization in transport infrastructure is an essential prerequisi
-
ASOC
- /en/research-topics/cyber-security/projects/asoc
ASOC ASOC Application Security Orchestration and Correlation for Academia Austrian universities must face up to the security challenges posed by real external threats on the one hand and regulatory re
-
CTI
- /en/research-topics/cyber-security/projects/cti
CTI CTI Cyber Threat Intelligence Qualifizierungsnetzwerk In light of rapid digital transformation and a massive increase in cyberattacks, it is essential for companies to take proactive measures agai
-
LLM4CTI
- /en/research-topics/cyber-security/projects/llm4cti
LLM4CTI LLM4CTI Large Language Models for Cyber Threat Intelligence In the current cyber threat intelligence (CTI) environment, it is difficult and time-consuming for security analysts to verify the q
-
Refract
- /en/research-topics/cyber-security/projects/refract
Refract Refract Reinforcement Learning Enhanced Digital Twins for Radiation Monitoring System Computer Security REFRACT focuses on the security of a wide range of Radiation Detection Systems (RDS) com
-
ECYSAP EYE
- /en/research-topics/cyber-security/projects/ecysap-eye
ECYSAP EYE ECYSAP EYE ECYSAP Enhanced Cyberspace Operations The project aims at building a European Cyber situational awareness platform to provide the European Union with Cyber Situational Awareness
-
KRAKEN
- /en/research-topics/cyber-security/projects/kraken
KRAKEN KRAKEN BroKeRage and mArKet platform for pErsoNal data One of the main pillars of the digitalization and the European Digital Single Market is the development of the European Data Economy. The
-
PRAETORIAN
- /en/research-topics/cyber-security/projects/praetorian
PRAETORIAN PRAETORIAN Community for Integrating and Opening Cyber Range Infrastructures that Build an Interoperable Cross-Domain and Cross-Sector Cyber Range Federation PRAETORIAN strategic goal is to
-
PROFET
- /en/research-topics/cyber-security/projects/profet
PROFET PROFET Cryptographic Foundations for Future-proof Internet Security Today, much of our personal freedom and the power to guarantee and maintain a free society depends on cryptographic primitive
-
MIRANDA
- /en/research-topics/cyber-security/projects/miranda
MIRANDA MIRANDA An adaptive digital twin for agile services over the computing continuum MIRANDA addresses cybersecurity issues that come from the growing level of interconnectedness of digital servic
-
CONTAIN
- /en/research-topics/cyber-security/projects/contain
CONTAIN CONTAIN Efficient response to IT security incidents in transnational supply chains The resilience of ICT infrastructures is crucial to the functioning of supply chains. The more reliable these
-
CYBERUNITY
- /en/research-topics/cyber-security/projects/cyberunity
CYBERUNITY CYBERUNITY Community for Integrating and Opening Cyber Range Infrastructures that Build an Interoperable Cross-Domain and Cross-Sector Cyber Range Federation CYBERUNITY targets the second o
-
LATACC
- /en/research-topics/cyber-security/projects/latacc
LATACC LATACC LAnd TActical Collaborative Combat LATACC will develop a solution that enhances, optimizes, automates, and accelerates the tactical command and combat capacities for operational superior
-
ARCHISTAR
- /en/research-topics/cyber-security/projects/archistar
ARCHISTAR ARCHISTAR ARCHISTAR is a FFG-funded research project which aims to develop trustworthy and secure archiving systems for storing sensitive information at partially-trusted external service pr
- «
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- »