-
About the AIT
- /en/about-the-ait
Statement The AIT Austrian Institute of Technology takes a leading position in the Austrian innovation system and a key role in Europe as the RTO focusing on the key infrastructure topics of the future. AIT [...] These technological research areas are supplemented by the competence in the area of Innovation Systems & Policy. As a national and international network node at the interface of science and industry AIT [...] quality of life highly depend on the availability of an efficient and powerful infrastructure. The systemic changes taking currently place demand new technological solutions and create new business opportunities
-
ThreatGet
- /en/about-the-ait/center/center-for-digital-safety-security/fairs-events/it-sa-2023/threatget
ThreatGet, it is possible to analyze the entire system architecture of security-critical applications such as connected vehicles. Automated analysis for potential system risks and attack paths can be easily performed [...] security management system in place. ThreatGet is available to consulting companies through a partner program for risk management consulting for highly secure IT and electronics systems. ThreatGet was developed [...] performed from the very beginning of system development. This cyber security by design tool is a must-have for industries with security-critical infrastructure that are required by regulatory guidelines
-
Business concept
- /en/about-the-ait/business-concept
from the economic sector. A thorough understanding of the system level is of paramount importance. It is not just about understanding the system, but actively shaping it. By understanding the sector-specific [...] infrastructure concepts. The strategy used by the AIT Austrian Institute of Technology is based on a system competence and new technology from which business models emerge. Output is a bundle of research services [...] sector-specific and physical-technical foundations, AIT models the real behavior of big systems. Knowledge of the markets and their active mechanisms and relationships are also taken into account. The AIT business
-
Nobel Grid
- /en/research-topics/cyber-security/projects/nobel-grid
rmance of the power network. DRFM (Demand Response Flexibility Market): It is a Decision Support System (DSS) that supports different business stakeholders (Aggregator/ Retailer/ESCOs) in portfolio management [...] interaction. Moreover, EMA App includes a GUI for administration purposes to enable the operator of the system to configure and manage the application and communicate with users. Progress beyond the state of [...] Reduction of Carbon Ltd, Finnovaregio, SURTEL ELECTRÓNICA SL, Institute of Communication and Computer Systems, The University of Manchester, KEMA NEDERLAND BV, Goodwolfe Energy Limited, UNINOVA - INSTITUTO DE
-
IDEV40
- /en/research-topics/cyber-security/projects/idev40
the need-to-know-paradigm, as well as a semantically-enriched data adopting Deep Learning and AI system. • To facilitate the virtualization of the ECS value chain, providing humans and machines access [...] high-skilled teams in a remote way, and empower employees to interact with highly-automated complex systems. Partner: Infineon Technologies AG (Coordinator), AIT Austrian Institute of Technology GmbH, AVL
-
LABYRINTH
- /en/research-topics/cyber-security/projects/labyrinth
risk of collisions. LABYRINTH has identified the need to research on centralized planification systems capable of communicating with the drones in a certain area, processing their desired origin and [...] points and compute paths to avoid collisions. This is embodied in the Unmanned Traffic Management Systems (UTM) that, in contrast to EU strategy, are one of the NASA’s main research priorities, whose objective [...] seaport and airport scenarios, including emergency assistance operations. Partner: EXPACE ON BOARD SYSTEMS, S.L., UNIVERSIDAD CARLOS III DE MADRID, DEUTSCHES ZENTRUM FUER LUFT - UND RAUMFAHRT EV, JEFATURA
-
RASSA-Architektur
- /en/research-topics/cyber-security/projects/rassa-architektur
future smart grid systems use consistently recognized and compatible security standards, and that at the same time the necessary interoperability between components at different system levels and between [...] manufacturers can ensure that the required level of security is met and that the systems are interoperable with other systems and components. The benefits offered by the reference architecture increase with [...] security aspects such as operational reliability (safety), attack security (security), and personal and system protection. Privacy aspects, which specifically take into account the aspects required by the co
-
SIREN
- /en/research-topics/cyber-security/projects/siren
A Framework for Measuring Human and System Performance of Safe and Secure Incident Response Strategies for Nuclear Facilities Many of the industrial control systems that support the operation of nuclear [...] with existing safety systems and processes. Whilst there have been many technology developments in this context, e.g., for anomaly detection and incident information sharing systems, there has been relatively [...] performance, in the context of organisational policies and reactive security technologies, and overall system resilience. To support the development of this framework, we will develop a unique testbed facility
-
Planspiel-KSÖ 2021
- /en/research-topics/cyber-security/projects/planspiel-ksoe-2021
Planspiel-KSÖ 2021 Planspiel-KSÖ 2021 Design of an IOC-based early warning system The scope of services includes the technical conceptualisation (based on a given framework scenario), the operational-technical
-
FACT
- /en/research-topics/cyber-security/projects/fact
(CTIRISP) Projektlaufzeit: 12/2023-11/2026 Förderprogramm: EDF-2022-DA-CYBER-CSIR Cybersecurity and systems for improved resilience × Kontakt Formular Pflichtfelder sind mit einem * markiert. Name * E-Mail
-
e-Panini
- /en/research-topics/cyber-security/projects/e-panini
control and monitoring in real time, if related ICT systems such as distribution and logistics systems, warehouse management and distribution systems can be connected. In addition to these advantages, however [...] and forgery-proof distribution system is required in the event of critical supply shortages and a failure of the usual market mechanisms. After more than 50 years, this system of rationing in paper form ("food [...] by a new and digitally supported system. The central content of this project is to discuss the prerequisites for a possible subsequential implementation of this system and to investigate its feasibility
-
DAGMAR
- /en/research-topics/cyber-security/projects/dagmar
Beyond the identification of critical infrastructure operators, there is no sufficient definition of system- or supply-relevant companies that can be selectively supported by the public administration in their [...] these approaches to the Austrian situation. There is a need for coordinated and accepted concepts on system- or supply-relevant goods, services or raw materials and their compositions, especially dependencies [...] This is followed by a comprehensive data identification and analysis (critical goods and services, system- and supply-relevant companies, etc.) in order to identify possible relevant structured information
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
SHIFT SHIFT Sichere Simulationstechnologien für cyber-physische Systeme Cyber-physical systems (CPS) refer to the fusion and connection of software-technical components with mechanical or electronic components [...] Stuxnet or WannaCry, for example, have shown. Examples of CPS include industrial control systems, but also satellite systems, air traffic management and medical technology. Technical simulation environments can [...] for CPS will be implemented in two application areas, industrial control systems (ICS) and global navigation satellite systems (GNSS) in CPSLabs, a laboratory environment for CPS. (2) The technical simulation
-
KITT
- /en/research-topics/cyber-security/projects/kitt
tunnels and tunnel control centers. AI shall make use of data based on already existing tunnel sensor systems as well as on future C2I-communication. Furthermore, possibilities of influencing traffic based on
-
BUMBLEBEE
- /en/research-topics/cyber-security/projects/bumblebee
abilities in the area of scenario development as well as IT, OT and military technical component system design and implementation. This will allow the cyber instructors to independently design and implement
-
synERGY
- /en/research-topics/cyber-security/projects/synergy
security for cyber-physical value networks Exploiting smaRt Grid sYstems Common security solutions such as firewalls, intrusion detection systems (IDS) and antivirus programmes mainly apply blacklisting approaches [...] minor deviations in system behaviour that can lead to traces of unknown attacks. Unfortunately, most modern anomaly detection solutions are not readily applicable to cyber-physical systems (CPS) and control [...] application of anomaly detection is a promising means to further protect such systems. When applying advanced anomaly detection systems, the primary protection goals in the area of industrial safety, availability
-
APT-CC
- /en/research-topics/cyber-security/projects/apt-cc
IoC-based early warning systems already in use internationally by authorities and, where applicable, critical infrastructures play an essential role. The goal of such systems is to automatically monitor [...] APT-CC APT-CC Design of an IOC-based early warning system Advanced Persistent Threats (APT) are complex, targeted and effective attacks on critical IT infrastructures (CIs), public authorities and large [...] The study therefore describes the possible structures and operator models of such early warning systems - based on examples from other European countries. Based on this, the study also addresses the question
-
CISA
- /en/research-topics/cyber-security/projects/cisa
understanding of the situation (as a basis for deriving situation pictures), as well as the control of systems based on control measures after analysing a cyber situation, have not been given sufficient focus [...] special attention in the project. Partner: AIT Austrian Institute of Technology GmbH (Koordinator), T-System Austria, Thales Austria, Secure Business Austria, REPUCO Unternehmensberatung GmbH, Infraprotect
-
ECOSSIAN
- /en/research-topics/cyber-security/projects/ecossian
sectors, ECOSSIAN is supposed to be the first attempt to develop this holistic system in the sense portrayed above. A prototype system will be developed which facilitates preventive functions like threat monitoring [...] ECOSSIAN ECOSSIAN Design of an IOC-based early warning system The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of [...] management. In the technical architecture with an operations centre and the interfaces to legacy systems (e.g., SCADA), advanced technologies need to be integrated, including fast data aggregation and fusion
-
SPARKS
- /en/research-topics/cyber-security/projects/sparks
resilient control systems; (2) real-time network monitoring of SCADA-based control systems; and (3) novel hardware security technologies for smart metering applications. The control systems research will [...] SPARKS SPARKS Design of an IOC-based early warning system The first aim that SPARKS will target is to promote awareness of existing and emerging smart grid cyber-security risks to stakeholders, including [...] network monitoring and data analysis is key for building advanced SCADA-specific intrusion detection systems, which would protect European smart grid network assets and provide new commercial opportunities
Searched for systems.
Found 1643 results in 13 milliseconds.
Displaying results 81 to 100 of 1643.