-
Neurological Signal Processing
- /en/solutions/neurological-signal-processing
vision: make EEG diagnostics more efficient and treat patients even better. Integrated in the EEG-systems of all major manufacturers our solutions will significantly improve patient safety, EEG diagnostics
-
hub.connect
- /en/research-topics/transport-optimization-logistics/projects/hubconnect
Research Engineer / Integrated Energy Systems +43 50550-6649 +43 50550-6439 martin.reinthaler(at)ait.ac.at Project partners IESTA - Institute for Advanced Energy Systems & Transport Applications Automobil [...] organizational) aspects. It thereby explicitly considers interoperability and connectivity with legacy systems with lower automation levels. The analysis will be characterized by a close conjunction of technological
-
Tara Esterl takes up the position as Head of Competence Unit Integrated Energy Systems (IES)
distribution grid and the corresponding regulatory issues. Integrated Energy Systems research field For the sustainable energy system of the future, the interplay between technologicalal innovations and energy [...] importance. The research portfolio of Integrated Energy Systems comprises techno-economic analyses, the use of flexibility in the electricity system, the development of business models and their effects [...] "Research on integrated energy systems is very close to real market applications and will significantly advance the economically viable operation of a sustainable energy system. In my new role, I am looking
-
Forum Verkehr: Mobilitäts-Perspektiven
sowie „Mobilitäts-Perspektiven“. Nicole Schnait, Mobilitätsexpertin am AIT Center for Mobility Systems, leitet im Rahmen der „Mobilitäts-Perspektiven“ einen Workshop unter dem Titel „Information auf allen
-
AIT-SA-20191129-01
- /en/research-topics/cyber-security/pentesting/security-advisories/ait-sa-20191129-01
(AIT Austrian Institute of Technology) Summary OkayCMS is a simple and functional content managment system for an online store. Vulnerability Description An unauthenticated attacker can upload a webshell
-
AIT-SA-20190930-01
- /en/research-topics/cyber-security/pentesting/security-advisories/ait-sa-20190930-01
configuration. Vulnerability Description GitLab Omnibus sets the ownership of the log directory to the system-user "git", which might let local users obtain root access because of unsafe interaction with logrotate
-
Security Advisories
- /en/research-topics/cyber-security/pentesting/security-advisories
period of time to resolve the problem and to roll out the corresponding patches on their client systems before details of the vulnerability are published. The following is an excerpt of relevant zero-day
-
International workshop on spectral radiation measurement for photovoltaics
Senior Scientist, and Ankit Mittal, Junior Engineer (both at the Center for Energy, Photovoltaic Systems) from November 28. - 29.11 2019 organized the eighth international expert workshop on spectral radiation
-
IAEA & AIT conducted a workshop on computer security for industrial control systems
with participants completing several practical exercises with representative industrial control system and physical protection equipment that can be found in this kind of environment. Topics that are [...] component, with participants completing several exercises with representative industrial control system and physical protection equipment that could be found in nuclear facilities. Additionally, there
-
Hightech-Lösungen zur Unterstützung im Demenz-Alltag
for Digital Safety & Security sagt im APA-Science Dossier über FreeWalker: „Allerdings ist das System flexibler und hat dadurch Vorteile gegenüber bestehenden starren Angeboten, die auf „Geo-Fencing“
-
Cryptography Consulting and Standardization
- /en/research-topics/cyber-security/solutions-services/crypto-consulting-alt
privacy enhancing technologies and online privacy, post-quantum cryptography as well as distributed systems. Particularly, we work on cryptographic building blocks such as attribute-based encryption (ABE) [...] solutions. Consulting our experts early in your design process can lead to great benefits for your system developers in the form of a sound security architecture and less weakness in your new products. [...] asymmetric cryptography, the rapid progress significantly increases the risk. Therefore, protocols and systems involving asymmetric cryptography should transition to so-called post-quantum secure (or quantum-safe)
-
Team
- /en/research-topics/cyber-security/team
Key Management System (KMS) Stephan Krenn Privacy, cryptographic protocols https://www.linkedin.com/in/stephan-krenn-83a92aa2/ Stephan Laschet Software development, Key Management System (KMS) Thomas Lorünser [...] Transport Systems, Border Control https://www.linkedin.com/in/arndt-bonitz-770637175/ Martin Latzenhofer Risk Management, Security Management, Process Integration & Audit, Automotive Systems https://www [...] testbed design and development Viktor Beck Master Student David-Mark Allison Industrial control systems, digital twins https://www.linkedin.com/in/david-allison-infosec/ Wolfgang Hotwagner Algorithm testbed
-
Cyber Security Consulting & Risk Management
- /en/research-topics/cyber-security/cyber-security-consulting-risk-management
incident. Besides risk analysis, the approach can also be used as part of a situational awareness system. With our approach, operators are not only able to model the interdependencies among physical and
-
Penetration Testing & Red Teaming
- /en/research-topics/cyber-security/penetration-testing-red-teaming
Information Systems Control (CRISC) Certified Information Privacy Manager (CIPM) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Information Systems Security [...] vulnerabilities found increases with time invested and the level of information available about the systems to be tested. The result of the penetration test is a report which lists the vulnerabilities, mi [...] many years of project experience, with a black-box approach (i.e. without detailed knowledge of the system to be tested; e.g. via fuzzing and reverse engineering), and a white-box setting (i.e. complete
-
Capacity Building & Training
- /en/research-topics/cyber-security/capacity-building-training
targets on customer specific IT-systems and architectures focuses on today’s threats & today’s ICT systems anticipates tomorrow´s threats and next generation ICT systems provides insights into how novel [...] critical digital IT systems. It provides a secure and realistic environment for analyzing and testing incidents in different, scalable scenarios without the use of the genuine production systems of stakeholders [...] security incident response supports the safe and secure design and operation of industrial control systems (ICS) Cyber Security Training The AIT Cyber Range supports effective IT security training by learning
-
Anomaly Detection & Cyber Threat Intelligence
- /en/research-topics/cyber-security/anomaly-detection-cyber-threat-intelligence
concepts, algorithms and systems that apply machine learning techniques to characterize system behavior and detect deviations from an established baseline. These solutions for adaptive system log stream processing [...] techniques in modern systems. Build efficient algorithms to extract, classify and cluster frequently occurring patterns in log files. Create concepts to automatically build system behavior profiles with [...] An effective link to threat intelligence solutions further allows to tune the anomaly detection system and focus on the threatened areas, while vice verse extracting indicators from raw logs is a means
-
Gastprofessur für Matthias Weber in Paris
Matthias Weber, Head of Center for Innovation Systems and Policy, wurde zum 1. November 2019 für zunächst drei Jahre als Visiting Professor an das Laboratoire Interdisciplinaire Science, Innovation et [...] tig ist eine weitere Vertiefung der Zusammenarbeit zwischen LISIS und dem Center for Innovation Systems and Policy geplant, u.a. durch die Entwicklung europäischer Projekte zu Fragen transformativer I
-
AIT gewinnt Best Paper Award auf internationaler Konferenz für Ambient Intelligence
individual needs, values and emotions. Based on empirical, real-user data we present features and system expectations that address this multifaceted overall picture. This paper advises the design process [...] users and situations. Second, we derive specific design goals to highlight directions of smart home system design: design for control, low effort, integration, evolvability, identity, sociability, and benefits
-
AIT strongly represented at the conference of the Artery Society
annually place in autumn, this year it was held in Budapest.This year the Competence Unit Biomedical Systems was particularly well represented with six scientific contributions. In addition, two awards were [...] in the last years. This year Dr. Bernhard Hametner, Scientist in the Competence Unit Biomedical Systems, was selected from numerous applications for a lecture entitled "Quantification of pulse wave re [...] of the award ceremony, Dr. Christopher Mayer, also a scientist in the Competence Unit Biomedical Systems, won the Artery Society Exchange Grant for Early Career Researchers. This financial support enables
-
Zukunftsorientiertes Arbeiten und Leben
Gscheite Gschichten – Ausgabe 5 – Oktober 2019 AIT-Kontakt: Doris Wilhelmer, Center for Innovation Systems & Policy
Searched for "systems".
Found 1684 results in 20 milliseconds.
Displaying results 941 to 960 of 1684.