SUCHE
-
Scientific Vision Days
- /ueber-das-ait/center/center-for-digital-safety-security/fairs-events/vision/scientific-vision-days
Focus on Non-Uniformities Nikolaus Kerö, Erich Maurer, Tobias Müller PTP - A Simple yet Powerful Way to Synchronize Ethernet- Based Cameras Bernhard Blaschitz, D. Soukup, H. Penz, W. Krattenthaler, R. Huber-Mörk
-
Nutzung von Satellitendaten zur Verbesserung der Luftgüte
(FFG) das Projekt APP4AQ („Innovative APPlications for the augmented use of satellite observations to support Air Quality management“), welches Satellitendaten der neuen Generation für Luftqualitätsmanagement
-
Internationale Forschung gegen die kriminelle Nutzung des Darkweb und virtueller Währungen
lichen Quellen nutzen können, so unter anderem Register für virtuelle Währungen, Onlineforen, Peer-to-Peer Netze auf Untergrund-Märkten sowie beschlagnahmte Geräte.Dr. King betont, dass bei der Entwicklung
-
EINLADUNG: Live-Interview mit dem Israelischen Nobelpreisträger Dan Shechtman
12. November 2020 / 14.00 – 15.00 Uhr Thema: Technological Entrepreneurship and Perseverance as Key to Way Out of This Crisis Registrierung und Details: https://zoom.us/meeting/register/tJIqd-CrqTkoHND
-
CycleTripMap
- /themen/integrated-mobility-systems/projects/cycletripmap
Radlobby Österreich. One key indicator provided by CycleTripMap is the popularity of a road compared to alternative routes in its vicinity. This information can be used for traffic planning as well as routing [...] 180,000 km from April 2013 until July 2015). Further the data from this campaign were parameterized to extract roads which are popular for long-distance routes. × Kontakt Formular Pflichtfelder sind mit
-
New Cybersecurity Tool
detection) is a detection technique which keeps track of system events, their dependencies and occurrences, to learn the “normal” system behavior over time and reports all actions that differ from a dynamically
-
Symposium on Innovative Smart Grid Cybersecurity Solutions
Friederich Kupzog and Dr Paul Smith and (coordinator of the Sparks Project), offers the opportunity to gain a deeper insight and understanding into the fields of smart grid security. A major highlight of
-
Cybersecurity Lecture Series
attack vectors and growing interest from governments worldwide. This talk provides an introduction to the Supervisory Control And Data Acquisition (SCADA) systems that underpin CNI and provides an insight
-
Cybersecurity Lecture Series
combination of ICT and industrial control systems – that require protection from attacks, in order to ensure their effective and efficient operation. Ports are threatened by a plethora of both physical [...] that pave the way for further research activities in this societally important area, which may lead to a trustworthy, sustainable digital maritime market. Date: 12th December, 4.30 pmVenue: Technische [...] t Wien, HS 8 Heinz Parkus Hörsaal, Karlsplatz 13, 1040 Vienna Please register by sending an E-mail to cybersecurity-lectures@ait.ac.at or use the registration form here.For further information please download
-
Cybersecurity Lecture Series
Information security threats to organisations have changed completely over the last decade, due to the complexity and dynamic nature of infrastructures and attacks. Successful attacks cost society billions [...] economy. Examples include StuxNet, using infected USB sticks to sabotage nuclear plants, and the DigiNotar attack, using fake digital certificates to spy on website traffic. New attacks cleverly exploit multiple [...] vulnerabilities, involving physical security and human behaviour.Defenders need to make rapid decisions regarding which attacks to block, as both infrastructure and attacker knowledge change rapidly. Current
-
WOMEN'S CYBER FORUM
of our world" AIT contribute in developing safe and secure methods and tools with respect to cyber security to master this societal challenges. More details, the agenda, and registration can be found at: [...] the humanities, business, law, and political science. The Energypact Foundation, in its mission to build awareness and promote cyber security, is conducting a one day seminar focused on information
-
DRIVER+: Next level crisis management
were able to trial how applicable andeffective the solutions were when responding to a disaster where coordinationacross different countries is imperative. They could also simulate how to adapttheir response [...] response to an emergency based on the changing dynamics of a flood. Thisinvolved assessing how the solutions allowed the practitioners to better respond tothe accident, compared to their response without [...] solutions to be demonstrated.Socrates OC (developed by GMV) sets up a Common Operational Picture at aEuropean level for emergency services. 3Di (developed by Nelen & Schuurmans)allows practitioners to simulate
-
CREDENTIAL kick-off meeting
meeting took place in Vienna, Austria where all partners got together in order to discuss about the implementation of the action and to define next steps and goals. CREDENTIAL is a EU Horizon 2020 funded research [...] level of security than other current solutions. The main idea and ambition of CREDENTIAL is to enable end-to-end security and improved privacy in cloud identity management services for managing secure [...] these services relies on the combination of strong hardware-based multi-factor authentication with end-to-end encryption representing a significant advantage over current password-based authentication schemes
-
Creating Economic Space for Social Innovation
in FP7 and runs until January 2018. Register for the cressi newsletter and get the latest news. Link to the project website. Contact: Dr. Susanne Giesecke (AIT Innovation Systems)
-
COYOTE
- /themen/enabling-digital-technologies/projekte/coyote
skalierbare Performance und praktische Anwendung. Start : 01.01.2019 Ende : 31.12.2023 Webpage: www.coyoti.to × Kontakt Formular Pflichtfelder sind mit einem * markiert. Name * E-Mail * Betreff * Nachricht * Send
-
WINS Training Course on Cyber Security for Nuclear Facilities
simulation environment The AIT Cyber Range is used to realistically simulate IT infrastructures and communication processes, so that participants can learn how to detect and defend against a variety of different [...] Austrian Institute of Technology conducted the fourth in a series of 5-day training courses designed to build awareness and organization capacity for defending against cyber-attacks at nuclear facilities [...] even in highly critical infrastructures, something that would not be possible in the real world due to security or cost reasons. As a result, structures and processes can be analysed and sources of error
-
Cotevos
- /themen/power-electronics-system-components/projekte/cotevos
definiert, genutzt werden können. Da COTEVOS auch auf zukünftige Ladetechnologien zusteuert, z.B. Vehicle to Grid (V2G), werden kontrolliertes Laden und zusätzliche Informationen über den EV(-Simulator) wie
-
Aus der Corona-Krise fürs Klima lernen
Poster „Collective Engagement Lessons: What the COVID-19 Response Can Teach Us About Engaging the Public to Take Climate Action“ vor und beschrieb darin vier Lehren, die sich aus dem Pandemiemanagement ziehen
-
Project ReFlex: COP Workshop in Wüstenrot
EU-funded Project ReFlex, took place from the 13th to 15th March 2017 in Wüstenrot, a village close to Stuttgart in Germany. This event brought together up to 30 participants: Swedish, German, Austrian and [...] Experience). The main objectives of this event were to learn from the field-testing experiments carried out by the ReFlex partners, to identify and to discuss crosscutting issues (marketplace, stakeholders [...] demo regions and, furthermore, to agree upon research questions to be followed up. The first afternoon session, scheduled on Monday 13th March 2017, was dedicated to the demo site Wüstenrot. The short
-
Time to Digital Converter
- /themen/physical-layer-security/unser-angebot/time-to-digital-converter-1
Time to Digital Converter Time to Digital Converter Wir entwickeln Messgeräte für die hochgenaue zeitliche Auflösung von Ereignissen. Sie sind für den Labor-Einsatz geeignet und erlauben alternativ die