SUCHE
-
Projekte
- /themen/digital-health/projekte-1
proEVLifeCycle The life cycle of extracellular vesicles in prostate cancer : from biogenesis and homing, to functional relevance; https://proevlifecycle.eu/ ITN PIMIENTO PrecIsion Medicine in IntravENTricular [...] Pflichtfelder sind mit einem * markiert. Name * E-Mail * Betreff * Nachricht * Send Dr. Martin Jung Head of Competence Unit Molecular Diagnostics +43 50550 4301 M.Jung(at)ait.ac.at
-
System Integration & Point of Care Devices
- /themen/digital-health/systems-integration-point-of-care-devices-2
Prinz J, Schmidlin PR, Thurnheer T, Wegehaupt FJ, Mitsakakis K, Peham JR. Microbial Analysis of Saliva to Identify Oral Diseases Using a Point -of- Care Compatible qPCR Assay . (2020). Journal of Clinical [...] J, Wittek T, Peham J. Longitudinal Metabolic Biomarker Profile of Hyperketonemic Cows from Dry‐Off to Peak Lactation and Identification of Prognostic Classifiers. (2021). Animals, 11 (2021), 1353, 1-15
-
UrbanLight
- /themen/integrated-mobility-systems/projects/urbanlight
gefördert. Publikationen K. Markvica, G. Richter, G. Lenz: "Improving LED luminaries for street lighting to meet road user ’s needs : The case of Vienna "; Accepted for Proceedings of 7th Transport Research
-
SUNRISE
- /themen/cyber-security/projects/sunrise
provides a unique opportunity to jointly ‘build back better’ with the focus on sustainability and green recovery . SUNRISE will facilitate active collaboration of CIs across Europe to share best practices and [...] points exposed by the current pandemic. (4) Promote our approach across Europe to ensure a united front and resilience of CIs to pandemics. We will carefully consider legal, ethical, societal, economic, and [...] COVID-19 pandemic has highlighted the importance of the continuity of vital services, has shown the need to work together for the common good. It has proven that a pandemic is not only a health crisis and that
-
DISCRETION
- /themen/cyber-security/projects/discretion
Programme, Development of next generation and upgrade of current armoured platforms , including those able to operate in extreme climates and geographical environments Projektlaufzeit: 12/2021-05/2025 × Kontakt
-
QUARTER
- /themen/cyber-security/projects/quarter
QUARTER QUARTER Enabling Quantum Communication Technologies to secure European critical data The main objective of QUARTER is to increase the maturity level of quantum communication (QC) technologies, [...] EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces for seamless network integration. - Increasing maturity level to TRL8 and start [...] technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling tools for
-
MUPOL
- /themen/cyber-security/projects/mupol
has increased from 31% to 45% between 2010 and 2019 [3], suggesting a substantial potential for optimisation and carbon-savings. A key approach to improving the situation is to establish a sharing economy [...] with regard to resource utilisation, increasing digitalisation also offers the opportunity to carry out cross-company optimisations and resource allocation. Such optimisations would allow to increase the [...] t needs to reveal any sensitive business information to any other participant in the system, including any third parties or brokers, thereby immediately overcoming the companies’ reluctance to participate
-
QSNP
- /themen/cyber-security/projects/qsnp
order to achieve the specific objectives within each pillar and ensure that know-how transfer and synergy between them are coherent and effective, QSNP has established ST activities corresponding to the [...] (ICT) sectors. QSNP will contribute to the European sovereignty in quantum technology for cybersecurity . Additionally, it will generate significant economic benefits to the whole society, including training [...] gathers the knowhow and expertise from all technology development phases, ranging from innovative designs to development of prototypes for field trials. QSNP is structured around three main Science and Technology
-
HARMONIC
- /themen/cyber-security/projects/harmonic
Management Areas (TMA) and the Airspace Users (AU), to supply networkwide solutions that respect constraints and priorities as far as possible; -to further integrate the Dynamic Airspace Configuration [...] areas -Dynamic Airspace Configuration, covering the third It is a goal for this project to provide mature evolutions to the forementioned concepts, with some elements becoming candidates for early deployment [...] ts would make the implementation of the operational concept more efficient. The core focus being: -to provide automatic support for spot analysis and particularly resolution, using what-if simulations
-
QSCAN
- /themen/cyber-security/projects/qscan
QSCAN QSCAN Quantum space surveillance tracking To solve the privacy issues related to usage of third - party data and taking advantage of access to telescopes that allow getting observational data , a [...] will replace the need for sharing agreements and allow to securely computing a probability of collision between space objects without disclosing to other party its own inputs. The implementation of the
-
MITIGATE
- /themen/cyber-security/projects/mitigate
process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure , enables optimal security measures to be developed, uses social media to uncover new [...] cyber security resources and supply chain processes. The overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in [...] of the MTITGATE methodology suits the purposes to assess the cyber risks for all business partners involved in a maritime supply chain service (SCS) and to build the basis for the creation of the MITIGATE
-
SAURON
- /themen/cyber-security/projects/sauron
ities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform : To develop (to TRL7) and test a multidimensional [...] SAURON is to provide a multidimensional yet installation-specific Situational Awareness (SA) platform to help port operators anticipate and withstand potential cyber, physical or combined threats to their [...] application in order to prevent, detect, respond and mitigate any physical, cyber or combined threat. O3. To fuse the physical environment, including external events and the cyberspace in order to achieve a hybrid
-
HyRiM
- /themen/cyber-security/projects/hyrim
network types might be insufficient – referred to as interconnected utility infrastructures in this description. The main objective of this project is to identify and evaluate ‘Hybrid Risk Metrics’ for [...] infrastructures as operated by utility providers. Despite the existence of numerous risk assessment tools to support the utility providers in estimating the nature and impact of possible incidents, risk management [...] assessing and categorizing security risks in interconnected utility infrastructure networks in order to provide foundations for novel protection and prevention mechanisms . The project will provide utility
-
PRECINCT
- /themen/cyber-security/projects/precinct
communities to create AI-enabled PRECINCT Ecosystems and enhanced resilience support services. 3. A vulnerability assessment tool that uses Serious Games to identify potential vulnerabilities to cascading [...] effects and to quantify resilience enhancement measures. 4. PRECINCT’s Digital Twins to represent the CIs network topology and metadata profiles, applying closed - loop Machine Learning techniques to detect [...] is becoming more pertinent and highly challenging. PRECINCT aims to connect private and public CI stakeholders in a geographical area to a common cyber-physical security management approach which will yield
-
PRAETORIAN
- /themen/cyber-security/projects/cyberunity
strategic goal is to increase the security and resilience of European CIs, facilitating the coordinated protection of interrelated CI against combined physical and cyber threats. To that end, the project [...] of Critical Infrastructures (CI) in their decision making to anticipate and withstand potential cyber, physical or combined security threats to their own infrastructures and other interrelated CIs that [...] in a specific CI can jeopardise the normal operation of other neighbouring/interrelated CIs, and how to make all of them more resilient, by predicting cascading effects and proposing a unified response among
-
Nobel Grid
- /themen/cyber-security/projects/nobel-grid
services to the DSO, the SLAM provides new energy services to all the actors of smart grid value chain, monitoring and control of advanced smart grid parameters and detecting anomalous values in order to give [...] expected to have significant effect on individual market actors and consumers. DSOs will become more cost effective and obtain a higher Internal Rate of Return (IRR) of up to 8%, compared to the Business [...] from Demand Response campaigns, which can reach up to bill savings of up to 8.5%. The latter type of consumers will also have a significant incentive to become prosumers, as electrification of transportation
-
IDEV40
- /themen/cyber-security/projects/idev40
4.0 Companies aiming to benefit of digitization will have to solve the digitalization challenge by radically thinking on how they can increase their level of digital maturity to integrate their production [...] need-to-know-paradigm, as well as a semantically-enriched data adopting Deep Learning and AI system. • To facilitate the virtualization of the ECS value chain, providing humans and machines access to data [...] of digital culture, leadership, skill-sets of the human workforce to implement the digital change. iDev40 covers the whole value chain to provide sustainable, digital and industrial solutions for integrated
-
KITT
- /themen/cyber-security/projects/kitt
Gleichzeitig werden durch die Entwicklungen im Bereich Mobilität 4.0, im speziellen durch die Car-to- Infrastructure Kommunikation (C2I) auch in Tunneln zusätzliche Daten wie bspw. Informationen zur
-
LABYRINTH
- /themen/cyber-security/projects/labyrinth
, security issues make impossible to fly drones in most situations, due to drone guidance and control-related technologies have not reached enough readiness level to guarantee safe operations in most of [...] technology to avoid drones presence in restricted places, it is not prepared to face the future proliferation of drones in areas such as cities, where drone swarm applications will lead to an increasing [...] in contrast to EU strategy, are one of the NASA’s main research priorities, whose objective is to create flight control centres for auto-piloted drones. Aligned with this, LABYRINTH aims to use this new
-
SIREN
- /themen/cyber-security/projects/siren
are required that enable situational awareness and effective remedial strategies to be executed. These technologies need to operated in a manner that integrates with existing safety systems and processes [...] that can be used to analyse the relationship between human performance , in the context of organisational policies and reactive security technologies, and overall system resilience. To support the development [...] components that use open and standard communication protocols. Consequently, they are suspectible to cyber-attacks, including Advanced Persistent Threats (APTs). In this setting, classical defensive security