-
IDEV40
- /en/research-topics/cyber-security/projects/idev40
the need-to-know-paradigm, as well as a semantically-enriched data adopting Deep Learning and AI system. • To facilitate the virtualization of the ECS value chain, providing humans and machines access [...] high-skilled teams in a remote way, and empower employees to interact with highly-automated complex systems. Partner: Infineon Technologies AG (Coordinator), AIT Austrian Institute of Technology GmbH, AVL
-
KONSTANZE
- /en/research-topics/cyber-security/projects/konstanze
and incidents of network and information systems at an early stage. In the scope of this, AIT was commissioned to design a concept for an early warning system based on Indicators Of Compromise (IOC). The [...] KONSTANZE KONSTANZE Design of an IOC-based early warning system KONzeption IOC BaSierTen FrühwArNSystEm Through the NIS Act, the Federal Ministry of the Interior has been tasked with developing proactive [...] overview: Design of a technically, operationally and organizationally mature IOC-based early warning system. A detailed project plan that seamlessly integrated procurement, budget control, and a phased rollout
-
LABYRINTH
- /en/research-topics/cyber-security/projects/labyrinth
risk of collisions. LABYRINTH has identified the need to research on centralized planification systems capable of communicating with the drones in a certain area, processing their desired origin and [...] points and compute paths to avoid collisions. This is embodied in the Unmanned Traffic Management Systems (UTM) that, in contrast to EU strategy, are one of the NASA’s main research priorities, whose objective [...] seaport and airport scenarios, including emergency assistance operations. Partner: EXPACE ON BOARD SYSTEMS, S.L., UNIVERSIDAD CARLOS III DE MADRID, DEUTSCHES ZENTRUM FUER LUFT - UND RAUMFAHRT EV, JEFATURA
-
KITT
- /en/research-topics/cyber-security/projects/kitt
tunnels and tunnel control centers. AI shall make use of data based on already existing tunnel sensor systems as well as on future C2I-communication. Furthermore, possibilities of influencing traffic based on
-
MIRANDA
- /en/research-topics/cyber-security/projects/miranda
multi-tenancy, and service-oriented architectures. The interconnectedness of physical and digital systems (e.g., in Smart City, Smart Grid, Industry 4.0, Automotive , and other business sectors) facilitates [...] the risk that potential threats materialize in the current or a hypothetical context in which the system operates. The MIRANDA framework combines latest advances in digital twinning, attack modeling, f
-
EVE
- /en/research-topics/cyber-security/projects/eve
public transport systems. Through this triaging of user groups at intersections or on highways differently prioritized usage scenarios need to be taken care of by the C-ITS-infrastructure system. Examples for [...] vehicles in automated road traffic : International standards for Cooperative and Intelligent Transport Systems (C-ITS) are currently being worked on and nearing completion. These standards form the basis of future
-
HyRiM
- /en/research-topics/cyber-security/projects/hyrim
including SCADA (Supervisory Control and Data Acquisition) networks and business and information systems. In the context of utility providers, these network types exhibit a significant interaction, and
-
GeRiAn
- /en/research-topics/cyber-security/projects/gerian
(disasters, critical infrastructures, etc.). However, it is essential to ensure a standardised assessment system for all areas and methods, i.e. to apply the same categories for the damage assessment and for the
-
e-Panini
- /en/research-topics/cyber-security/projects/e-panini
control and monitoring in real time, if related ICT systems such as distribution and logistics systems, warehouse management and distribution systems can be connected. In addition to these advantages, however [...] and forgery-proof distribution system is required in the event of critical supply shortages and a failure of the usual market mechanisms. After more than 50 years, this system of rationing in paper form ("food [...] by a new and digitally supported system. The central content of this project is to discuss the prerequisites for a possible subsequential implementation of this system and to investigate its feasibility
-
DECEPT
- /en/research-topics/cyber-security/projects/decept
for enterprise IT systems apply whitelisting approaches based on anomaly detection that observe events within a system and automatically establish a baseline of normal user and system behavior. Every deviation [...] possible. In fact, enterprise IT, embedded systems, smart manufacturing, energy grids, industrial IoT, fintech, and other domains, operate interconnected systems, which follow predefined processes and are [...] logs, and implements unsupervised self-learning of system behavior processes. A smart parser generator was designed, to build a model of normal system behavior. Furthermore, concepts for an anomaly detection
-
DAGMAR
- /en/research-topics/cyber-security/projects/dagmar
Beyond the identification of critical infrastructure operators, there is no sufficient definition of system- or supply-relevant companies that can be selectively supported by the public administration in their [...] these approaches to the Austrian situation. There is a need for coordinated and accepted concepts on system- or supply-relevant goods, services or raw materials and their compositions, especially dependencies [...] This is followed by a comprehensive data identification and analysis (critical goods and services, system- and supply-relevant companies, etc.) in order to identify possible relevant structured information
-
ECOSSIAN
- /en/research-topics/cyber-security/projects/ecossian
sectors, ECOSSIAN is supposed to be the first attempt to develop this holistic system in the sense portrayed above. A prototype system will be developed which facilitates preventive functions like threat monitoring [...] ECOSSIAN ECOSSIAN Design of an IOC-based early warning system The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of [...] management. In the technical architecture with an operations centre and the interfaces to legacy systems (e.g., SCADA), advanced technologies need to be integrated, including fast data aggregation and fusion
-
CySiVuS
- /en/research-topics/cyber-security/projects/cysivus
critical ITS (Intelligent Transport System) infrastructure system as openly as possible. With the help of a security overlay, neuralgic cyber attack points in the overall system can be identified to reveal potential [...] programme KIRAS. In the future, our transport system will consist of networked, intelligent and automated vehicles. They will be part of an intelligent system characterised by the seamless interaction of [...] security is the third element for a comprehensive, trustworthy transport system. The KIRAS project CySiVuS examines this overall system of a road transport infrastructure with regard to specific IT security
-
DRBD4Cloud
- /en/research-topics/cyber-security/projects/drbd4cloud
Cut-Off 7,EUROSTARS 2, ELECTRONICS, IT AND TELECOMS TECHNOLOGY > Information Processing, Information System > Data Protection, Storage Technology, Cryptography, Data Security Project duration: 10/2017-09/2019
-
EUCINF
- /en/research-topics/cyber-security/projects/eucinf
ge capabilities in the domain of Cyber and Information Warfare through a toolbox, i.e.a holistic system which embeds a coherent set of components, an interoperability Framework and its associated Testbed
-
FACT
- /en/research-topics/cyber-security/projects/fact
Platform (CTIRISP) Project duration: 12/2023-11/2026 Funding: EDF-2022-DA-CYBER-CSIR Cybersecurity and systems for improved resilience × Kontakt Formular Pflichtfelder sind mit einem * markiert. Name * E-Mail
-
ACCSA
- /en/research-topics/cyber-security/projects/accsa
crisis. The CKM concepts, processes and methods were supported by the realization of a CKM Toolbox, a system for software-based training and exercise execution that spans multiple CKM communication levels (e [...] necessary. Among other things, the focus was on staff work procedures based on simple video conferencing systems. In parallel, the aspects of court-proof documentation for decisions in/at videoconferences using [...] and cooperation partners: SBA Research gGmbH REPUCO Unternehmensberatung GmbH Infraprotect GmbH T-Systems Austria Universität Wien, Rechtswissenschaftliche Fakultät CERT.at / nic.at Bundeskanzleramt Bun
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
, IFES - Institut für Empirische Sozialforschung GmbH, Universität Wien, Multimedia Information Systems, Universität Klagenfurt, Forschungsgruppe Systemsicherheit, Bundesministerium für Inneres, Bunde
-
BUMBLEBEE
- /en/research-topics/cyber-security/projects/bumblebee
abilities in the area of scenario development as well as IT, OT and military technical component system design and implementation. This will allow the cyber instructors to independently design and implement
-
Im-Fluge
- /en/research-topics/capturing-experience/projects/im-fluge
the integration of UAM as a new mode of passenger transportation into the overall transportation system been investigated - but so far, only at an abstract transportation planning level. The next step [...] spatial characteristics of intermodal transfers , and (3) adaptation of digital mobility information systems for targeted and sustainable I-UAM use. The project's first step includes r equirements analysis
Searched for "systems".
Found 1848 results in 48 milliseconds.
Displaying results 361 to 380 of 1848.