SUCHE
Inhaltstyp
Kategorien
-
YEAR Annual Conference & AIT Award winner
Network, offered training and networking possibilities for young researchers with the focus on how to integrate Open Science in European Projects. The conference took place on 11-12 May in Espoo, Finland
-
"Social Physics" als Grundlage für "Social Media"
festgehalten, welche Stimmlage für ein Gespräch verwendet wurde und auch, ob man sich durch ein Face-to-face-Gespräch oder durch ein Telefonat mitteilte. Pentland gab diese Badges unterschiedlichen Ar
-
PRISMACLOUD - PRIvacy and Security MAintaining services in the CLOUD
methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The main idea and ambition of PRISMACLOUD is to enable end-to-end [...] security for cloud users and to provide tools to protect user privacy with the best technical means possible - by cryptography. To make this vision come true, PRISMACLOUD plans innovation in the fields [...] their own data, but hand them over to external untrusted parties, i.e. cloud service providers, for processing and storage. Currently there exist no satisfactory approaches to protect data during its lifetime
-
Applied Quantum Cryptography - Chinese edition!
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cr [...] n or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major [...] Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components. The book “Applied
-
Second European expert meeting for Patient Blood Management (PBM) in Lisbon
adverse outcome due to anaemia, blood loss and transfusion, change is warranted. To close the gap between theory and clinical practice in the appropriate management of patients and to reduce the use of scarce [...] Project, launched by the Consumers, Health, Agriculture and Food Executive Agency (Chafea) to provide service to the European Commission DG SANTE. The Meeting was organized by Peter Kastner and Helga Peinsold [...] le investments and administrative efforts have been made to improve the safety of donor blood. However, measures and structural adjustments to broadly pre-empt and minimize blood usage have fallen short
-
PRISMACLOUD participation at ICT 2015 Lisbon
themes of the event: Innovate, Connect, Transform. The information session - Key challenges in end-to-end privacy/security in untrusted environments, supported by H2020 project PRISMACLOUD, which is c [...] Also dealing with current challenges in both security and end-users´ privacy when outsourcing data to the cloud. For more information about the H2020 project PRISMACLOUD, please visit the Subsite &quo
-
eHealth 2016 - Call for Papers
from prediction to prevention”. Future ICT systems need to include methods of machine learning and predictive analytics in order to provide actionable information to health carers and to support preventive [...] platform for researchers, practitioners, decision makers and vendors to discuss innovative health informatics and eHealth solutions so as to improve the quality and efficiency of health care. A special topic
-
Best Paper Awards for AIT
s all protocol messages on the public channel, our proposal is to authenticate the qubit stream already to verify the peer’s identity. To this end, we employ a second public channel that is physically [...] experts were venerated for the outstanding papers. Additionally, some of the AIT experts were invited to publish an extended version of the paper for the next conventions. ICQNM 2015: Best Paper Award for [...] tion" Awarded experts: Stefan Rass, Sandra König, Stefan SchauerAbstract:We describe a method to authenticate the qubit stream being exchanged during the first phases of the BB84 quantum key distribution
-
HyRiM End User Workshop
the official dinner the attendees had the chance to exchange further ideas and discuss possible future collaborations among research projects in order to bring risk and security management on a higher level [...] November 2015 experts from academia and industry from different European countries had the opportunity to discuss about new approaches towards the security and risk assessment for utility providers in a very [...] utility networks and smart grids. Except of the presentations, the participants had the opportunity to discuss with a panel consisting of academia and industry experts about future challenges and potential
-
AIT publication in the International Journal "Neurophysiologie Clinique / Clinical Neurophysiology"
care patients needs to be evaluated time efficiently to maximize the treatment effect. A computational method will be presented that detects rhythmic and periodic patterns according to the critical care [...] care EEG terminology (CCET) of the American Clinical Neurophysiology Society (ACNS). The aim is to show that these detected patterns support EEG experts in writing neurophysiological reports. Materials and [...] patient the result of a review session using the EEG and the visualized pattern detections was compared to the original neurophysiology report. Read the full article here.
-
CREDENTIAL kick-off meeting
meeting took place in Vienna, Austria where all partners got together in order to discuss about the implementation of the action and to define next steps and goals. CREDENTIAL is a EU Horizon 2020 funded research [...] level of security than other current solutions. The main idea and ambition of CREDENTIAL is to enable end-to-end security and improved privacy in cloud identity management services for managing secure [...] these services relies on the combination of strong hardware-based multi-factor authentication with end-to-end encryption representing a significant advantage over current password-based authentication schemes
-
AIT at Ars Electronica 2015
sector. These technologies were presented based on video installations. Furthermore Anton Dunzendorfer, Head of Business Unit Assistive Healtcare Information Technology, participated in a workshop on the topic [...] interactive video installation called "CultureCam". CultureCam is a prototype that enables users to navigate in a playful way, through gestures and based on the search for similarities through online
-
From attack trees to attack navigators
in information risk at the Delft University of Techology (TU Delft), in the Netherlands. In addition to this position, he is the project manager of the EU-funded TRESPASS project at University of Twente [...] challenges of carrying out cybersecurity risk assessment for today’s complex systems, which are subjected to increasingly sophisticated attacker behaviour. In the lecture, the attack navigator concept was introduced [...] brochure. The slides from Prof Pieters’ presentation are available on request; please send an email to cybersecurity-lectures(at)ait.ac.at for a copy.The Cybersecurity Lecture Series is a joint initiative
-
Young European Associated Researchers (YEAR)
this last one is still to be decided, so don’t hesitate to send your inputs until 15 November to Caroline Lemeire, YEAR Chair at caroline.lemeire@vito.be.Looking further ahead to next year: In May 2014 [...] the next YEAR Workshop "from project idea to successful project proposal" will take place in Vienna. Once again, a YEAR Award will be given to the most promising participant. In September, in [...] successful YEAR workshop in Trondheim and a well-deserved Summer holiday, the YEAR Board is back on track to prepare the coming events. In November, there will be a seminar with the European Commission on Resource
-
New Cybersecurity Tool
detection) is a detection technique which keeps track of system events, their dependencies and occurrences, to learn the “normal” system behavior over time and reports all actions that differ from a dynamically
-
Best Paper Award at "SPIE Electronic Imaging Conference“ in San Francisco
result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis [...] this year´s IS&T/SPIE International Conference on Electronic Imaging, which took place from 2nd to 6th of February in San Francisco.Paper abstractIn this article, we discuss the optimality of basis [...] tions as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a
-
Cybersecurity Lecture Series 2014
largely due to the fact that regulatory constraints have been overlooked in these works, and summarised the main paradigms and preconditions from European regulation, referring in particular to the conditions [...] talk by sharing advice that any well-founded approach to smart grid information security and privacy should consider these constraints in order to be actually applicable. The first Cybersecurity Lecture [...] largely due to the fact that regulatory constraints have been overlooked in these works, and summarised the main paradigms and preconditions from European regulation, referring in particular to the conditions
-
AIT technologies at Singapore Airshow
From 11th to 16th of February 2014 latest airborne systems, equipment and technologies from more than 1,000 companies from 47 countries were presented in the Changi Exhibition Centre in Singapore. The [...] the Austrian Economic Chamber. The AIT 3D vision expert Christoph Sulzbachner and Helmut Leopold, Head of AIT Safety & Security Department presented among the other Austrian companies Schiebel, Airborne
-
AIT ICT Security Panel in Washington DC
knowledge of cyber-security, resilience and future energy systems. They reflected on existing efforts to secure smart grids and discussed about areas where they sense future research and standardization of [...] secure and, most importantly, safe manner.The panel was a great success and resulted in an invitation to organize another panel at next year's conference.The ISGT conferenceThe Innovative Smart Grid Technologies [...] (ISGT) Conference, sponsored by the IEEE Power and Energy Society (PES), is a forum for participants to discuss state-of-the-art innovations in smart grid technologies and features plenary sessions, mul
-
1st Short-term Visual Object Tracking Challenge in Sydney successfully accomplished
tracking methods. To address this issue, AIT co-organized the Visual Object Tracking (VOT) workshop in conjunction with ICCV2013. Researchers from academia as well as industry were invited to participate in [...] recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted