-
Climate simulation by AIT for “Zukunft Linz”
Oops, an error occurred! Code: 202409261655015f5f7a9d
-
New ways to improve quality in steel production by real-time capable mathematical models
The capability and accuracy of the model have been demonstrated by comprehensive comparisons of simulation results with measurement data from both experimental material tests and from the ongoing operation
-
transpAIrent.energy
- /en/research-topics/integrated-energy-systems/projects/transpairentenergy
algorithms, platform development and implementation, and method validation (“proof of concept”) through simulation and live testing. These content-related WPs are moreover supplemented by a project management WP
-
Vorarlberg IT specialists train in defence against cyber attacks on supply chains
and the Lake Constance region trained on the AIT Cyber Range, a state-of-the-art exercise and simulation platform, on how to respond to a series of serious cyber attacks carried out simultaneously by [...] companies in Vorarlberg to be optimally prepared for an emergency." TRAINING IN ONE OF THE MOST MODERN SIMULATION ENVIRONMENTS FOR IT SECURITY The programme and content of the exercise were designed by Digital [...] platform. In the "AIT Cyber Range", IT and control technology as well as communication processes are simulated realistically in order to effectively train the defence against cyber attacks for companies, or
-
Combating and mitigating disinformation in the 2024 election year in Austria
Safety & Security at the AIT Austrian Institute of Technology conducted a special tabletop (TTX) simulation game on behalf of the Federal Chancellery in order to effectively prepare the Austrian administration
-
Phenotyping of plants
- /en/research-topics/bioresources/phenotyping-of-plants
parameters in a high-throughput process using non-invasive, imaging methods while simultaneously simulating a wide range of climatic conditions. Specifications: Our two phenotyping containers offer a total
-
Project INNOnet - FAQ
- /en/research-topics/integrated-energy-systems/projects/project-innonet/project-innonet-faq
there will never be higher grid costs than in the old tariffing scheme): Based on daily network simulations for the following day, there are hours where the following three cases can occur: Uncritical hours
-
WINS Training Course on Cyber Security for Nuclear Facilities
the UK Civil Nuclear Sector. Training in a state-of-the-art IT simulation environment The AIT Cyber Range is used to realistically simulate IT infrastructures and communication processes, so that participants
-
ici:microscopy wins Best Demo Award
example of security printing. These samples are placed on a translation stage in our demonstrator to simulate the movement of the object during inspection. The system scans the objects with a point-to-point
-
KSÖ, AIT and DAS HAUS DER DIGITALISIERUNG organised cyber security training for the Austrian economy
in one of the most modern digital simulation environments The threat scenario was realised by AIT experts in the "AIT Cyber Range". This is a flexible digital simulation environment for cyber security exercises [...] 13 and 14 November, the Competence Centre for a Secure Austria (KSÖ) organised the sixth cyber simulation game together with the AIT Austrian Institute of Technology and the House of Digitalisation. The [...] a fictitious cyber attack on the state, economy and society. The added value of such realistic simulation games and training sessions has already been confirmed by stakeholders in recent years as very
-
HIGH-TECH MADE IN AUSTRIA: CUTTING-EDGE DIGITALISATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST IT SECURITY TRADE FAIR
betreibt das AIT und in dessen Räumlichkeiten in Wien ein einzigartiges digitales und hybrides Simulations- und Trainingszentrum - die AIT Cyber Range. Ein fortschrittliche Audio-Video-Setup im Schulungsraum
-
HARMONIC
- /en/research-topics/cyber-security/projects/harmonic
being: -to provide automatic support for spot analysis and particularly resolution, using what-if simulations that can find optimal solutions with most appropriate combinations of airspace configurations,
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
dynamic data on the dependencies and their potential effects are used to carry out stochastic simulations and statistical analyses in order to obtain the most accurate and realistic estimate possible of
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
ODYSSEUS ODYSSEUS Simulation and analysis of critical network infrastructures in cities Cities and their agglomerations are home to a large number of critical infrastructures (CI) that provide essential [...] available). Based on this model, potential threats (both natural disasters and man-made incidents) are simulated. In contrast to existing solutions from literature and practice, ODYSSEUS focuses on the dynamic [...] entire network of critical supply infrastructures, taking into account the urban population. The simulations describe which potential compensation and displacement mechanisms can be expected within the m
-
HIGH-TECH MADE IN AUSTRIA: CUTTING-EDGE DIGITALIZATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST IT SECURITY TRADE FAIR
member states. For this purpose, AIT and its premises in Vienna operate a unique digital and hybrid simulation and training center - the AIT Cyber Range. An advanced audio-video setup in the training room allows
-
AIT Cyber Range
- /en/about-the-ait/center/center-for-digital-safety-security/fairs-events/it-sa-2023/ait-cyber-range
security in the IAEA member states. For this purpose, the AIT operates a unique digital and hybrid simulation and training center - the AIT Cyber Range - in its offices in Vienna. An advanced audio-video setup
-
Planspiel-KSÖ 2021
- /en/research-topics/cyber-security/projects/planspiel-ksoe-2021
cybersecurity simulation game with representatives from business and public authorities on the AIT Cyber Range CaSTLE with remote integration of teams from Germany and Switzerland. The simulation game will [...] agreement. KSÖ, REPUCO and AIT will jointly identify and subsequently fix the suitable premises for the simulation. Due to the prevailing pandemic situation and its currently unforeseeable development, a large
-
CURSOR
- /en/research-topics/cyber-security/projects/cursor
international level, as well as some private initiatives. The aim of these exercises is often to simulate difficult, complex and realistic situations (e.g. cyber attack, security incident, blackmail or
-
INDUCE
- /en/research-topics/cyber-security/projects/induce
which often promote awareness of the topic, or technical cyber exercises, which use technical simulations to promote practical skills. Currently only a small number of user groups participate in these
-
SHIFT
- /en/research-topics/cyber-security/projects/shift
management and medical technology. Technical simulation environments can provide a protected space to better understand and prepare for cyber-attacks in CPS. In a simulation environment, the consequences of cy [...] hinder the development of technical simulation environments and thus prevent the generation of shared knowledge in the construction and implementation of technical simulation environments for CPS. The SHIFT [...] to design and develop safe technical simulation environments for CPS. It aims to address four main aspects: (1) The design and development of technical simulation environments for CPS will be implemented
Searched for "simulation".
Found 417 results in 11 milliseconds.
Displaying results 1 to 20 of 417.