-
Girls! TECH UP
to the topic of virtual power plants. The participants were able to find out how the electricity system works, what flexible generators and consumers are needed for and then try it out for themselves in
-
HyRiM
- /en/research-topics/cyber-security/projects/hyrim
including SCADA (Supervisory Control and Data Acquisition) networks and business and information systems. In the context of utility providers, these network types exhibit a significant interaction, and
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
ons and connections in which incidents within an infrastructure can have an impact on the entire system. In particular, critical infrastructures in the context of utilities (electricity, gas, water, etc
-
PRECINCT
- /en/research-topics/cyber-security/projects/precinct
Security, Fundacion TECNALIA Research & Innovation, Engineering - Ingegneria Informatica SPA, Konnecta Systems Ltd, VLTN GCV, KENTRO MELETON ASFALEIAS, JAVNO PODJETJE LJUBLJANSKI POTNISKI PROMET D.O.O., Telekom
-
WALL E
- /en/research-topics/cyber-security/projects/wall-e
current situation) and then analysing the technical technical possibilities of different drive systems were then analysed and compared (Section 3, top-down perspective based on the current possibilities [...] decision-making in the form of a study entitled "Possibilities for the use of alternative vehicle drive systems with a focus on electromobility in the police force". From the perspective of the entire bidding
-
CySiVuS
- /en/research-topics/cyber-security/projects/cysivus
critical ITS (Intelligent Transport System) infrastructure system as openly as possible. With the help of a security overlay, neuralgic cyber attack points in the overall system can be identified to reveal potential [...] programme KIRAS. In the future, our transport system will consist of networked, intelligent and automated vehicles. They will be part of an intelligent system characterised by the seamless interaction of [...] security is the third element for a comprehensive, trustworthy transport system. The KIRAS project CySiVuS examines this overall system of a road transport infrastructure with regard to specific IT security
-
SAURON
- /en/research-topics/cyber-security/projects/sauron
vulnerabilities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform: To develop (to TRL7) and test a mult
-
EVE
- /en/research-topics/cyber-security/projects/eve
public transport systems. Through this triaging of user groups at intersections or on highways differently prioritized usage scenarios need to be taken care of by the C-ITS-infrastructure system. Examples for [...] vehicles in automated road traffic : International standards for Cooperative and Intelligent Transport Systems (C-ITS) are currently being worked on and nearing completion. These standards form the basis of future
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
, IFES - Institut für Empirische Sozialforschung GmbH, Universität Wien, Multimedia Information Systems, Universität Klagenfurt, Forschungsgruppe Systemsicherheit, Bundesministerium für Inneres, Bunde
-
MITIGATE
- /en/research-topics/cyber-security/projects/mitigate
overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in ports are classified as Critical Information Infrastructures [...] requirements and offers a dynamic risk management system for actors in the maritime process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure [...] solution, the MITIGATE system. The MITIGATE methodology conforms to the main port security standards, the ISPS Code (IT section), ISO 27001 and ISO 28001. The development of the MITIGATE system closely followed
-
H2Real
- /en/research-topics/flexibility-business-models/projects/h2real
to a visible reduction of the regional hydrogen price. The role of AIT is: In-depth modelling and systemic analysis of the Hydrogen Valley to identify optimal production, distribution and application plans [...] Name * E-Mail * Betreff * Nachricht * Send DI Stefan Reuter Research Engineer / Integrated Energy Systems +43 664 88964995 stefan.reuter(at)ait.ac.at Key Facts Project duration: 05/23 - 05/26 Project partner:
-
GeRiAn
- /en/research-topics/cyber-security/projects/gerian
(disasters, critical infrastructures, etc.). However, it is essential to ensure a standardised assessment system for all areas and methods, i.e. to apply the same categories for the damage assessment and for the
-
PREPARED
- /en/research-topics/cyber-security/projects/prepared
Amt" app are made possible by the availability of a digital identity management systems (eID). The basis for such eID systems are cryptographic signatures, which on the one hand guarantee the authenticity [...] analyzing post-quantum-secure signature methods in the context of eID systems. In particular, a migration plan is being developed, as systems with long-lasting certificates and signatures require appropriate [...] and attribute-based credential systems can serve as a replacement. PREPARED is therefore investigating these cryptographic techniques for linking the data in eID systems so that the functionality of bPKs
-
EDOCC
- /en/research-topics/cyber-security/projects/edocc
Airbus, Thales, Leonardo, Rheinmetall, Indra and Saab will closely cooperate on EDOCC federated system together with selected partners complementing their portfolio (such as ATOS, MBDA and platform m
-
MUPOL
- /en/research-topics/cyber-security/projects/mupol
development of more efficient and carbon-saving propulsion systems, or an increase of the modal split of rail in the entire transport system. However, also the potential impact of less high-profile issues [...] no participant needs to reveal any sensitive business information to any other participant in the system, including any third parties or brokers, thereby immediately overcoming the companies’ reluctance
-
QSNP
- /en/research-topics/cyber-security/projects/qsnp
world-leading academic groups, research and technology organizations (RTOs), quantum component and system spin-offs, cybersecurity providers, integrators, and telecommunication operators, were members of [...] activities corresponding to the three main layers of the technology value chain, “Components and Systems”, “Networks” and “Cryptography and Security”. This framework will allow achieving the ultimate objective [...] INFORMATIQUE, FRAUNHOFER GESELLSCHAFT ZUR FORDERUNG DER ANG, INSTITUTE OF COMMUNICATION AND COMPUTER SYSTEM, INTERUNIVERSITAIR MICRO-ELECTRONICA CENTRUM, CRYPTONEXT, NEXTWORKS, THINKQUANTUM SRL, QUSIDE TE
-
QUARTER
- /en/research-topics/cyber-security/projects/quarter
combined with QKD systems, can offer information theoretic security on data transmission and storage. - Developing a stand-alone QKD postprocessing (TRL6) module which is compatible with QKD systems from different [...] project, the specific objectives of QUARTER include: - Increasing maturity level of EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces [...] or above) technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling
-
AirBility
- /en/research-topics/climate-resilient-urban-pathways/projects/airbility
largely separated from the overall transport system. It has not been investigated for Austria what autonomous air taxis can contribute to the overall transport system as a new mode of transport. However, these [...] overall transport system. The project will show what spatial, economic and social impact the integration of autonomous air taxis as a new mode of transport has on the overall transport system - illustrated [...] AirBility Integration of autonomous air taxis into the overall transport system The use of autonomous air taxis can be found in various strategy papers and is being considered in various countries or is
-
HIGH-TECH MADE IN AUSTRIA: CUTTING-EDGE DIGITALISATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST IT SECURITY TRADE FAIR
es möglich, die gesamte System-Architektur sicherheitskritischer Anwendungen wie z.B. von vernetzten Fahrzeugen zu analysieren. Eine automatisierte Analyse auf potenzielle System-Risiken und Angriffspfade [...] ty-Management System vorzuweisen. ThreatGet steht Consulting Unternehmen im Rahmen eines Partnerprogramms für die Risiko-Management-Beratung für höchst sichere IT- und Elektronik-Systeme zur Verfügung [...] darauf aufbauenden Lösung Sec³ Secure Cloud Connecting System, dass zu keiner Zeit ein unkontrollierter Zugriff auf Daten möglich ist. Das System wurde von X-Net Technologies weiterentwickelt und bietet
-
Detecting epileptic brain activity in children with AI algorithms.
in the amount of 500,000 euros to develop a decision support system for the diagnosis and treatment of epilepsy in young patients. This system is based on AI-based algorithms and will automatically detect [...] diagnosis and treatment of childhood epilepsy. „In the project, we will develop a decision support system that is specifically tailored to children and adolescents with epilepsy. By using Deep Neural Networks [...] "This not only helps patients and their families, but also reduces the burden on the healthcare system, which has to deal with the consequences of delayed epilepsy diagnoses." The future of childhood
Searched for "systems".
Found 1839 results in 13 milliseconds.
Displaying results 1341 to 1360 of 1839.