SUCHE
Inhaltstyp
Kategorien
-
International Conference on Computer Safety, Reliability and Security
security regarding dependable application of computer systems. SAFECOMP provides ample opportunity to exchange insights and experience on emerging methods and practical application across the borders of [...] security regarding dependable application of computer systems. SAFECOMP provides ample opportunity to exchange insights and experience on emerging methods and practical application across the borders of
-
Cybersecurity Lecture Series February 2016
is so far still quite limited, either due to high computational complexity, high communication overhead, or similar. By exploring a fourth recent approach to secure function evaluation, we will demonstrate
-
Last Call for Submissions: 1st Workshop on Monitoring and Testing of Cyber-Physical Systems
The submission deadline was extended to February 21, 2016! MT CPS workshop is intended to be a forum for exchanging the latest scientific trends between researchers and practitioners interested in the
-
Cybersecurity Lecture Series June 2015
by security architects to translate from attributes to rights. Dynamic elements can be built into these policies so the outcomes of access control decisions automatically adapt to changing local and global [...] a perspective on attribute-based access control (ABAC). The ongoing authorization leap from rights to attributes offers numerous compelling benefits. Decisions about user, subject, object and context
-
AIT invites to the Wireless Communications Lecture
channel measurements to current modeling techniques, the presentation will include an overview of channel modeling activity within COST 2100 and IC1004 actions. Recent results in peer-to-peer, multi-link and [...] Antennas Research Group (Information Systems Laboratory), Stanford University, CA, USA. From January 2002 to September 2005, he was associated with the Microwave Laboratory UCL as a post-doctoral fellow of the
-
AIT invites to the HyRiM End User Workshop
In this workshop, new methodologies and concepts towards the security and risk assessment for utility providers will be presented. These approaches have been developed in the course of current resear
-
AIT auf biomedizinischer Forschungstagung SIOPEN 2014
Im Rahmen des Annual General Meetings der SIOPEN - Association to foster Neuroblastoma Research, präsentieren die AIT eHealth ExpertInnen ihr Know How auf dem Gebiet "Gesundheitsinform
-
iStoppFalls Symposium in Cologne
development to increase the quality of life of elder citizens and to reduce fall-related costs for societies. The project is about to successful completion, so the purpose of the symposium is to present a [...] a series of results from the project and to enable all interested parties and organizations the opportunity to exchange experiences and network. Several speakers including the AIT experts for Ambient Assisted [...] Drobics, Andreas Ejupi and Karl Kreiner have been invited to present their work which follows the thematic themes of iStoppFalls, enabling delegates to gain a variety of knowledge and understanding of the work
-
International Software Days / Celtic-Plus Event
International B2B Software Days and Celtic-Plus Event provide a platform to learn more about the latest trends in DIGITAL BUSINESS and to find international cooperation partners for research, technology and
-
1st Workshop on Monitoring and Testing of Cyber-Physical Systems
unpredictable behaviors, thus making their correctness and robustness analysis a challenging task. In order to address their full complexity, there is an emergent need for formal, yet efficient and scalable methods [...] monitoring and testing, achieve both rigor and efficiency by enabling the evaluation of systems according to the properties of their individual behaviours. The MT CPS workshop aims at bringing together researchers [...] qualitative and quantitative properties from CPS behaviors. Topics of interest include (but are not limited to): Specification languages for monitoring and testingRuntime verification and monitoringBlack-box and
-
Security Document World Conference 2016
Rarely has there been such an intense focus on the industry to deliver solutions to problems ranging from complex fingerprint-based ePassport systems to internationally interoperable national identity cards [...] focusing on intrinsic document security and on the new cutting-edge secure infrastructure now required to produce and use these advanced documents in live situations. The world of advanced security document
-
eHealth2016 - Austria's national eHealth event
future ICT systems need to include methods of machine learning and predictive analytics in order to provide actionable information to health carers and to support preventive health care concepts. The congress [...] From the 24th to 25th of May 2016 the tenth eHealth Conference in Vienna takes place. The theme of this convention is"Predictive modeling in healthcare – from prediction to prevention", future [...] Austria. The session provides a comprehensive program according to the motto "Predictive modeling in healthcare – from prediction to prevention". Date: 24 - 25 May 2016 Venue: Schloss Schönbrunn
-
International Conference on Quantum Cryptography - QCrypt 2015
goals of the conference are to represent the previous year’s best results and to support the building of a research community in quantum cryptography. Date: 18. September to 02. October 2015 Venue: Hitotsubashi [...] Quantum cryptography aims to achieve security from fundamental physical principles, such as the quantum mechanical phenomena of entanglement and Heisenberg’s uncertainty principle. In the last few years
-
AIT organizes international Border Control Conference
conference. This workshop proposes to bring together a wide range of researchers, industry, and practitioners of biometric and/or monitoring/surveillance technologies in ABC to share innovative ideas and solutions
-
Cybersecurity Lecture Series 2015
technologies, are no longer able to defend your organizationagainst the polymorphic and complex attacks we face today. Instead, organizations must take a new approach to intrusion threats: rapididentification [...] analysis capabilities, intelligence sharing and incident management capabilities can be brought together to realize this new approach. Date: 17th March, 4.30 pmVenue: Technische Universität Wien, EI 3 Sahulka
-
Cybersecurity Lecture Series
attack vectors and growing interest from governments worldwide. This talk provides an introduction to the Supervisory Control And Data Acquisition (SCADA) systems that underpin CNI and provides an insight
-
Visual Computing Trends Symposium 2015
will learn about key open challenges and scientific and industrial trends. Participants are encouraged to participate in extended discussions on core technological issues.Invited Speakers: Michela Spagnuolo
-
Cybersecurity Lecture Series 2014
Universität Wien, INFH Informatikhörsaal, Treitlstr. 3, 1040 Vienna Please register by sending an eMail to cybersecurity-lectures(at)ait.ac.at or use the registration form here.For further information please
-
Cybersecurity Lecture Series
combination of ICT and industrial control systems – that require protection from attacks, in order to ensure their effective and efficient operation. Ports are threatened by a plethora of both physical [...] that pave the way for further research activities in this societally important area, which may lead to a trustworthy, sustainable digital maritime market. Date: 12th December, 4.30 pmVenue: Technische [...] t Wien, HS 8 Heinz Parkus Hörsaal, Karlsplatz 13, 1040 Vienna Please register by sending an E-mail to cybersecurity-lectures@ait.ac.at or use the registration form here.For further information please download
-
1st Visual Object Tracking Challenge (VOT2013)
limited due to a lack of standardised evaluation protocols and due to a lack of online reference repositories showing results on community accepted reference videos. VOT2013 invites researchers to participate [...] workshop, organized by AIT, is to provide an evaluation kit for fair comparison of existing and new trackers. This kit includes labelled videos as well as evaluation software, to automate the execution of the