-
Biological Barriers
- /en/research-topics/molecular-diagnostics/biological-barriers-1
g. inflammation, cerebral ischemia Development of novel (human) disease models Development and evaluation of novel therapeutic strategies Drug transport studies Nanoparticle, liposomal or protein (incl
-
UrbanLight
- /en/research-topics/integrated-mobility-systems/projects/urbanlight
systems on people's behavior in street spaces. The project Three different lighting scenarios were evaluated in the test area of Blumauergasse in Vienna's second district. First the existing, conventional
-
HyRiM
- /en/research-topics/cyber-security/projects/hyrim
utility infrastructures in this description. The main objective of this project is to identify and evaluate ‘Hybrid Risk Metrics’ for assessing and categorizing security risks in interconnected utility i
-
MITIGATE
- /en/research-topics/cyber-security/projects/mitigate
developed a novel risk management approach that promotes stakeholder collaboration in identifying, evaluating and mitigating risks associated with cyber security resources and supply chain processes. The overall [...] These extensive user tests suited the purpose to test the functionalities, the usability and to evaluate together with the users the results of the risk assessment. Generally potential users acknowledge
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
in a dependency model. These dependencies are used to identify and evaluate potential cascading effects, using innovative evaluation methods based on stochastic models (percolation theory and Markov chains)
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
hazard). From this knowledge, targeted preventive safety measures can be derived, presented and evaluated in order to minimize the effects in the event of an incident when implemented. Partner: AIT Austrian
-
Technology from Seibersdorf in space
- /en/blog/technology-from-seibersdorf-in-space
be transmitted to the ground station at Graz University of Technology every 90 minutes. They are evaluated by a European network of researchers. The construction of PRETTY – an investment of 2.5 million
-
Business concept
- /en/about-the-ait/business-concept
decisions. We provide input in form of coordinating foresight processes, performing studies and evaluations as well as developing concepts and programmes. The combination of our technological, foresight
-
Nobel Grid
- /en/research-topics/cyber-security/projects/nobel-grid
the societies of the pilot sites in terms of total cost savings is 242 million € over a 20-year evaluation period, where 103 million € are attributed to improved efficiency of DSOs involved and the rest
-
IDEV40
- /en/research-topics/cyber-security/projects/idev40
Tangible results from 18 industrial Use Cases linked to the relevant digitalization facets and evaluating them on a technical and a socio-economic level in operational environments will make the potential
-
SIREN
- /en/research-topics/cyber-security/projects/siren
both technical and human factors in the context of cybersecurity incidents. Furthermore, we will evaluate the framework using an information sharing platform, called CÆSAIR, providing insights into how
-
Planspiel-EVN 2018
- /en/research-topics/cyber-security/projects/planspiel-evn-2018
2018 Increasing the company's cyber situational awareness Testing the company's contingency plans Evaluating current communication measures Promote intra-organizational interaction and sharing Testing reporting [...] GDPR. Increasing the company's cyber situational awareness Testing of the company's emergency plans Evaluate current communication measures Encourage intra-organizational interaction and sharing Testing of
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
training courses or integration in in-house training tracks. (4) Involving users in the design and evaluation of the CPSLabs through cyber exercises or training to achieve the highest possible acceptance.
-
KITT
- /en/research-topics/cyber-security/projects/kitt
road tunnels. On the other hand networked mobility implicates upcoming risks and efforts in the evaluation and use of new information. Hence there will be a further increase in the operator’s workload in
-
COLTRANE
- /en/research-topics/cyber-security/projects/coltrane
framework for developing cybersecurity awareness education; (3) to develop a toolkit for teachers for evaluation of learning activities by students; and (4) to support managers and policy makers by co-designing
-
INDUCE
- /en/research-topics/cyber-security/projects/induce
network for the transfer of know-how and exchange for cyber-exercises, and the implementation and evaluation of cyber-exercises with equal opportunities for different user groups with the help of Future Labs
-
CISA
- /en/research-topics/cyber-security/projects/cisa
addition to the development of methods, demonstration scenarios will also be set up to test and evaluate the methodology for establishing cyber situational awareness and its usability in a real-world [...] These demonstration scenarios will be designed by security experts from research and industry and evaluated by national institutions. Furthermore, the involvement of experts from the field of law is planned
-
ECOSSIAN
- /en/research-topics/cyber-security/projects/ecossian
be analyzed, assessed and regarded in the concept. The system will be tested, demonstrated and evaluated in realistic use cases. They will be developed with the community of stakeholders and cover the
-
SOCCRATES
- /en/research-topics/cyber-security/projects/soccrates
SOCCRATES SOCCRATES SOC & CSIRT Response to Attacks & Threats based on ADG Evaluation Systems Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks
-
MALORI
- /en/research-topics/cyber-security/projects/malori
sources for a more comprehensive evaluation and consideration of context to improve classification and detection performance. The developed methods will be also evaluated with regard to their robustness [...] be implemented in a security IoT lab environment based on real components, protocols and data to evaluate the developed attack and detection methods in a realistic environment. The project results are targeted
Searched for "evaluation".
Found 473 results in 11 milliseconds.
Displaying results 1 to 20 of 473.