SUCHE
Inhaltstyp
Kategorien
-
AIT organizes international Border Control Conference
conference. This workshop proposes to bring together a wide range of researchers, industry, and practitioners of biometric and/or monitoring/surveillance technologies in ABC to share innovative ideas and solutions
-
AIT Scientist Marc Busch hält Vortrag bei CMG-AE Tagung
industrieller Tsunami? Business-Continuity-Management am PrüfstandManfred Wöhrl, R.I.C.S. EDV-GmbHHow to hack your critical infrastructureThomas Bleier, B-SEC better secure KGSpielerische Methoden zur Abwehr
-
CeDEM 2016
e-participation and open government specialists working in academia, politics, government and business to critically analyse the innovations, issues, ideas and challenges in the networked societies of the
-
IFIP Networking 2016
The main objectives of Networking 2016 are to discuss recent advances in the broad and quickly-evolving fields of computer and communication networks, and to highlight key issues, identify trends, and
-
Cybersecurity Lecture Series 2015
technologies, are no longer able to defend your organizationagainst the polymorphic and complex attacks we face today. Instead, organizations must take a new approach to intrusion threats: rapididentification [...] analysis capabilities, intelligence sharing and incident management capabilities can be brought together to realize this new approach. Date: 17th March, 4.30 pmVenue: Technische Universität Wien, EI 3 Sahulka
-
Internet of Things Forum Vienna
critical role of Technology Experience of Wearable Devices The Internet of Things (IoT) has the power to significantly change many aspects of our everyday life. But how can we ensure that embedding intelligent [...] alcohol and nicotine addiction it is crucial that a novel infrastructure, such as the IoT, empower us to act more responsibly. Behavior Change Support Systems (also called Persuasive Technologies) are powerful [...] chances for interventions. However, people are individual and they differ in their susceptibility to persuasive behavior change techniques and strategies. Furthermore, privacy concerns in the IoT arise
-
Cybersecurity Lecture Series
attack vectors and growing interest from governments worldwide. This talk provides an introduction to the Supervisory Control And Data Acquisition (SCADA) systems that underpin CNI and provides an insight
-
Zero Emission Cities Exhibition @Vienna City Hall
Vienna city hall for the 5th time. In bringing stakeholders together, the one-day exhibitions aim is to promote innovative Smart City concepts and spark an expert discussion on trend-setting topics. The
-
Visual Computing Trends Symposium 2015
will learn about key open challenges and scientific and industrial trends. Participants are encouraged to participate in extended discussions on core technological issues.Invited Speakers: Michela Spagnuolo
-
Workshop on “SOCIAL ACCEPTANCE OF ENERGY TECHNOLOGIES”
energy - preferably from renewable sources, but also with conventional sources like shale gas, seems to suffer from a narrow focus on technology. However, one might argue that the slow adoption rates of [...] the core issues of the current debate, discusses the potential of different methodological approaches to provide policy-relevant results, and aims at cross-fertilization of methods. Contributions are from [...] analysis using agent-based models, and are strongly directed towards conclusions for policy with regard to supporting, triggering and guiding transition processes. Date: Fri 5 Dec 2015, 10-13h Venue:
-
4th ISGAN International smart grid action network Workshop
„Smart Grids Transitions“ organisiert zwei Sessions beim 4. ISGAN Workshop in Shanghai. 31st March to 1st April 2014.Shanghai, Chinahttp://www.iea-isgan.org/
-
»EMOBILITY - WHO SOLVES THE BATTERY PROBLEM?«
, Mobility Department: Theme Coordinator Battery Research Dr. Nikolaus HochgattererHead of Department, MAGNA STEYR Battery Systems GmbH & Co OG:Advanced Development & Cell Techn [...] 21:00Panel Discussionab ca. 21:00Networking incl. snack (changes reserved)LanguageEnglish Follow link to invitation
-
Cybersecurity Lecture Series 2014
Universität Wien, INFH Informatikhörsaal, Treitlstr. 3, 1040 Vienna Please register by sending an eMail to cybersecurity-lectures(at)ait.ac.at or use the registration form here.For further information please
-
Cybersecurity Lecture Series
combination of ICT and industrial control systems – that require protection from attacks, in order to ensure their effective and efficient operation. Ports are threatened by a plethora of both physical [...] that pave the way for further research activities in this societally important area, which may lead to a trustworthy, sustainable digital maritime market. Date: 12th December, 4.30 pmVenue: Technische [...] t Wien, HS 8 Heinz Parkus Hörsaal, Karlsplatz 13, 1040 Vienna Please register by sending an E-mail to cybersecurity-lectures@ait.ac.at or use the registration form here.For further information please download
-
1st Visual Object Tracking Challenge (VOT2013)
limited due to a lack of standardised evaluation protocols and due to a lack of online reference repositories showing results on community accepted reference videos. VOT2013 invites researchers to participate [...] workshop, organized by AIT, is to provide an evaluation kit for fair comparison of existing and new trackers. This kit includes labelled videos as well as evaluation software, to automate the execution of the
-
Cybersecurity Lecture Series
Information security threats to organisations have changed completely over the last decade, due to the complexity and dynamic nature of infrastructures and attacks. Successful attacks cost society billions [...] economy. Examples include StuxNet, using infected USB sticks to sabotage nuclear plants, and the DigiNotar attack, using fake digital certificates to spy on website traffic. New attacks cleverly exploit multiple [...] vulnerabilities, involving physical security and human behaviour.Defenders need to make rapid decisions regarding which attacks to block, as both infrastructure and attacker knowledge change rapidly. Current
-
Structure, function and evolution of the root microbiome
SERIES features lectures and discussions with leading scientists referring to our research fields. We are looking forward to welcoming you at our next seminar: <b>Structure, function and evolution of the [...] SERIES features lectures and discussions with leading scientists referring to our research fields. We are looking forward to welcoming you at our next seminar: <b>Structure, function and evolution of the
-
International Conference on Computer Safety, Reliability and Security - SafeComp 2012
safety, security and reliability of critical computer applications. SAFECOMP provides ample opportunity to exchange insights and experience on emerging methods, approaches and practical solutions. The leading
-
10th International Conference on Formal Modeling and Analysis of Timed Systems - FORMATS 2012
Furthermore FORMATS brings together researchers from different disciplines that share interests in modelling and analysis of timed systems. Typical topics include: Foundations and Semantics: Theoreti
-
14th Information Security Solutions Europe Conference - ISSE 2012
speakers and a truly independent perspective on the e-security market across Europe. ISSE 2012 is designed to educate and inform ICT security professionals and policy makers on the latest developments in technologies