-
Benchmarking and trend analysis
Tribology, the science that deals with the phenomena of friction, wear and lubrication in moving systems, is of crucial importance for numerous technical applications. As an internationally recognised centre [...] This also includes a regular international comparison based on key output figures. AIT Innovation Systems and Policy has therefore been conducting benchmarking and content trend analyses in the field of
-
INTRO
- /en/research-topics/transport-optimisation-energy-logistics/projects/intro
on the path to climate neutrality. Technological as well as systemic innovations are essential for a sustainable design of our mobility system and should support sustainable behavioural changes. Based on [...] required. Currently, only a limited number of tools are available, such as routing and information systems and, in some cases, accessibility calculators, which can be used by stakeholders. Furthermore, the [...] public transport or also the changeover to new mobility services (NMD), such as sharing and on-demand systems, carpooling and micro-mobility offers. Depending on the spatial and settlement structure and the
-
AIT Mobility Observation Box wins most important European prize for road safety
including Anna Huditz, Peter Saleh and Paul Rosenkranz: The Mobility Observation Box, an AI-based system for recording and objectively assessing traffic infrastructure and conflict situations, has won the
-
Girls! TECH UP
to the topic of virtual power plants. The participants were able to find out how the electricity system works, what flexible generators and consumers are needed for and then try it out for themselves in
-
HyRiM
- /en/research-topics/cyber-security/projects/hyrim
including SCADA (Supervisory Control and Data Acquisition) networks and business and information systems. In the context of utility providers, these network types exhibit a significant interaction, and
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
ons and connections in which incidents within an infrastructure can have an impact on the entire system. In particular, critical infrastructures in the context of utilities (electricity, gas, water, etc
-
PRECINCT
- /en/research-topics/cyber-security/projects/precinct
Security, Fundacion TECNALIA Research & Innovation, Engineering - Ingegneria Informatica SPA, Konnecta Systems Ltd, VLTN GCV, KENTRO MELETON ASFALEIAS, JAVNO PODJETJE LJUBLJANSKI POTNISKI PROMET D.O.O., Telekom
-
WALL E
- /en/research-topics/cyber-security/projects/wall-e
current situation) and then analysing the technical technical possibilities of different drive systems were then analysed and compared (Section 3, top-down perspective based on the current possibilities [...] decision-making in the form of a study entitled "Possibilities for the use of alternative vehicle drive systems with a focus on electromobility in the police force". From the perspective of the entire bidding
-
CySiVuS
- /en/research-topics/cyber-security/projects/cysivus
critical ITS (Intelligent Transport System) infrastructure system as openly as possible. With the help of a security overlay, neuralgic cyber attack points in the overall system can be identified to reveal potential [...] programme KIRAS. In the future, our transport system will consist of networked, intelligent and automated vehicles. They will be part of an intelligent system characterised by the seamless interaction of [...] security is the third element for a comprehensive, trustworthy transport system. The KIRAS project CySiVuS examines this overall system of a road transport infrastructure with regard to specific IT security
-
SAURON
- /en/research-topics/cyber-security/projects/sauron
vulnerabilities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform: To develop (to TRL7) and test a mult
-
EVE
- /en/research-topics/cyber-security/projects/eve
public transport systems. Through this triaging of user groups at intersections or on highways differently prioritized usage scenarios need to be taken care of by the C-ITS-infrastructure system. Examples for [...] vehicles in automated road traffic : International standards for Cooperative and Intelligent Transport Systems (C-ITS) are currently being worked on and nearing completion. These standards form the basis of future
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
, IFES - Institut für Empirische Sozialforschung GmbH, Universität Wien, Multimedia Information Systems, Universität Klagenfurt, Forschungsgruppe Systemsicherheit, Bundesministerium für Inneres, Bunde
-
MITIGATE
- /en/research-topics/cyber-security/projects/mitigate
overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in ports are classified as Critical Information Infrastructures [...] requirements and offers a dynamic risk management system for actors in the maritime process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure [...] solution, the MITIGATE system. The MITIGATE methodology conforms to the main port security standards, the ISPS Code (IT section), ISO 27001 and ISO 28001. The development of the MITIGATE system closely followed
-
H2Real
- /en/research-topics/integrated-energy-systems/projects/h2real
to a visible reduction of the regional hydrogen price. The role of AIT is: In-depth modelling and systemic analysis of the Hydrogen Valley to identify optimal production, distribution and application plans [...] Name * E-Mail * Betreff * Nachricht * Send Stefan Reuter Research Engineer / Integrated Energy Systems +43 664 88964995 stefan.reuter(at)ait.ac.at Key Facts Project duration: 05/23 - 05/26 Project partner:
-
GeRiAn
- /en/research-topics/cyber-security/projects/gerian
(disasters, critical infrastructures, etc.). However, it is essential to ensure a standardised assessment system for all areas and methods, i.e. to apply the same categories for the damage assessment and for the
-
PREPARED
- /en/research-topics/cyber-security/projects/prepared
Amt" app are made possible by the availability of a digital identity management systems (eID). The basis for such eID systems are cryptographic signatures, which on the one hand guarantee the authenticity [...] analyzing post-quantum-secure signature methods in the context of eID systems. In particular, a migration plan is being developed, as systems with long-lasting certificates and signatures require appropriate [...] and attribute-based credential systems can serve as a replacement. PREPARED is therefore investigating these cryptographic techniques for linking the data in eID systems so that the functionality of bPKs
-
EDOCC
- /en/research-topics/cyber-security/projects/edocc
Airbus, Thales, Leonardo, Rheinmetall, Indra and Saab will closely cooperate on EDOCC federated system together with selected partners complementing their portfolio (such as ATOS, MBDA and platform m
-
MUPOL
- /en/research-topics/cyber-security/projects/mupol
development of more efficient and carbon-saving propulsion systems, or an increase of the modal split of rail in the entire transport system. However, also the potential impact of less high-profile issues [...] no participant needs to reveal any sensitive business information to any other participant in the system, including any third parties or brokers, thereby immediately overcoming the companies’ reluctance
-
QSNP
- /en/research-topics/cyber-security/projects/qsnp
world-leading academic groups, research and technology organizations (RTOs), quantum component and system spin-offs, cybersecurity providers, integrators, and telecommunication operators, were members of [...] activities corresponding to the three main layers of the technology value chain, “Components and Systems”, “Networks” and “Cryptography and Security”. This framework will allow achieving the ultimate objective [...] INFORMATIQUE, FRAUNHOFER GESELLSCHAFT ZUR FORDERUNG DER ANG, INSTITUTE OF COMMUNICATION AND COMPUTER SYSTEM, INTERUNIVERSITAIR MICRO-ELECTRONICA CENTRUM, CRYPTONEXT, NEXTWORKS, THINKQUANTUM SRL, QUSIDE TE
-
QUARTER
- /en/research-topics/cyber-security/projects/quarter
combined with QKD systems, can offer information theoretic security on data transmission and storage. - Developing a stand-alone QKD postprocessing (TRL6) module which is compatible with QKD systems from different [...] project, the specific objectives of QUARTER include: - Increasing maturity level of EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces [...] or above) technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling
Searched for "systems".
Found 1394 results in 15 milliseconds.
Displaying results 1321 to 1340 of 1394.