-
MALORI
- /en/research-topics/cyber-security/projects/malori
MALORI MALORI MALware cOmmunication in cRitical Infrastructures The project MALORI investigates new techniques for hidden malware communication in critical infrastructures such as encryption and netwo
-
ACCSA
- /en/research-topics/cyber-security/projects/accsa
ACCSA ACCSA Austrian Cyber Crises Support Activities The multitude of reports, newspaper articles and features on cybersecurity and cybercrime (e.g., ransomware, phishing, DDoS, CEO fraud) shows how m
-
CyberMonoLog
- /en/research-topics/cyber-security/projects/cybermonolog
CyberMonoLog CyberMonoLog While for decades the focus of the cyber security domain was on prevention and perimeter security, the orientation has changed in recent years toward active response. It is g
-
DECEPT
- /en/research-topics/cyber-security/projects/decept
DECEPT DECEPT DEtection and Handling of CybEr-Physical Attacks Most of today’s existing security solutions are tailored to protect against a narrow set of security threats and can be applied only to a
-
KONSTANZE
- /en/research-topics/cyber-security/projects/konstanze
KONSTANZE KONSTANZE Design of an IOC-based early warning system KONzeption IOC BaSierTen FrühwArNSystEm Through the NIS Act, the Federal Ministry of the Interior has been tasked with developing proact
-
SD4MSD
- /en/research-topics/cyber-security/projects/sd4msd
SD4MSD SD4MSD Single Device for Multiple Security Domains – Technische Machbarkeitsstudie und Validierung Military field operations place high demands on information and communication technology (ICT)
-
CyberTASTE
- /en/research-topics/cyber-security/projects/cybertaste
CyberTASTE CyberTASTE Cyber Range Technology stAck and Simulations for Training and Evaluation Many activities relevant to cyber security cannot be performed on production systems, as they would jeopa
-
Newsroom
- /en/research-topics/cyber-security/projects/newsroom
Newsroom Newsroom Adapting Cyber Situational Awareness for Evolving Computing Environments The main ambition of the NEWSROOM project is to overcome the current limitations of cyber situational awarene
-
EUCINF
- /en/research-topics/cyber-security/projects/eucinf
EUCINF EUCINF EUropean Cyber INFormation warfare toolbox The project EUCINF will study, design, prototype, test and demonstrate cutting-edge capabilities in the domain of Cyber and Information Warfare
-
SlotMachine
- /en/themen/cyber-security/projects/slotmachine
SlotMachine SlotMachine SlotMachine will employ blockchain technology and secure multi-party computation to extend the existing user-driven prioritisation process (UDDP) solution to protect the partic
-
Center for Digital Safety & Security
- /en/about-the-ait/center/center-for-digital-safety-security
Center for Digital Safety & Security Over 200 experts at the Center for Digital Safety & Security are developing state-of-the-art information and communication technologies to ensure that our systems
-
Cyber Security
- /en/research-topics/cyber-security
Cyber Security Cyber Security At the AIT Center for Digital Safety & Security, we recognize the challenges of maintaining high security standards in today's cyber threat landscape. Therefore, we speci
-
Anomaly Detection & Cyber Threat Intelligence
- /en/research-topics/cyber-security/anomaly-detection-cyber-threat-intelligence
Anomaly Detection & Cyber Threat Intelligence Anomaly Detection & Cyber Threat Intelligence Every day organizations are exposed to cyber attacks. Information security teams do their best, but it is ve
-
ROUTE
- /en/research-topics/cyber-security-alt/translate-to-english-projekte/extending-drbd-for-large-scale-cloud-deployments-1
ROUTE ROUTE Cryptography for the Post-Quantum Era Cryptographic schemes can provide technical measures to guarantee long-term data protection, since they ensure the data’s confidentiality, integrity a
-
AECID
- /en/research-topics/cyber-security/our-offer/aecid
AECID AECID AECID stands for Automatic Event Correlation for Incident Detection and is an intelligent cyber security tool that uses special mathematical calculations to distinguish abnormalities from
-
CAESAIR
- /en/research-topics/cyber-security/our-offer/caesair
CAESAIR CAESAIR CÆSAIR is a cyber threat intelligence solution designed to provide analytical support for security experts carrying out IT incident handling tasks on a local, national or international
-
News
- /en/news-events/news
News Kategorie wählen News Themenbereich wählen All research areas Innovation Systems & Policy Health Solutions Integrated Energy Systems Lightweight Metal Solutions Dynamic Transportation Systems Tra
-
Titania
- /en/research-topics/forming-technologies/projects/titania
Titania Technology leap in titanium sheet metal forming As part of the ProMetHeus subproject “Titania”, the LKR Leichtmetallkompetenzzentrum Ranshofen of the AIT Austrian Institute of Technology recen
-
COMPASS
- /en/research-topics/forming-technologies/projects/compass
COMPASS Innovative recycling of sheet metal and thermoplastic composites The COMPASS project, initiated by 13 European partners within the framework of the HORIZON EUROPE programme, aims to revolution
-
OxyCAT
- /en/research-topics/energy-conversion-and-hydrogen/projects/oxycat
OxyCAT Oxygen Electrocatalysts of Ni/Fe-based MOF and Alloys via Combinatorial Material Approach The Anion Exchange Membrane water electrolysis (AEMEL) has recently been regarded as a promising water
- «
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- »