KIRAS Security Research

Call results by calendar year

Call results by funding instruments

Projects of the joint German-Austrian call

Projects

Courageous Community

Product development for civil society capacity building in context of violence- prone conduct of youth

Read more

CPS-Security

Behaviour Based Anomaly Detection in Cyber-Physical Systems

Read more

Crime Predictive Analytics (CriPA)

Crime Predictive Analytics is concerned with the predictive analysis of crime and includes quantitative methods to identify patterns and dependences…

Read more

CRISCROSS

The state of the art in the management of risks is heavily dependent on experts and can only depict static situations. CRISCROSS develops, partly…

Read more

CRYPTOMONITOR - Methods for forensic analysis of smart contracts and off-chain transactions

The goal of the KRYPTOMONITOR project is to develop generic cryptoasset analysis methods that support the analysis of smart contracts and off-chain…

Read more

CSISmartScan3D

3D crime site scanning and documentation based on cost-efficient 3D sensors, tablets and smartphones.

Read more

Current violence protection measures

The research project will evaluate current protection measures used by the police to prevent and reduce domestic violence especially against women…

Read more

CURSOR - Cyber security exercise concept and framework

The aim of the CURSOR project is the conception of a national cyber exercise program for the analysis of (program) cyber exercises. This exercise…

Read more

Cyber Crime

The Social Media Users in Austria and their experiences with criminal-relevant activities

Read more

Cyber Heroes

Mobilizing young people for counter speech in dealing with cyberbullying, hate and trolling on the Internet

Read more

Cyber Security for Transport Infrastructure- and Road Operators (CySiVuS)

In this project, we analyze cyber security aspects of a comprehensive road transport infrastructure system which will be more used intensively by…

Read more

CyberMonoLog - Cyber Security MONITORING and LOGGING Best Practice Guidance

CyberMonoLog develops best practices for cyber security monitoring and logging based on known attack techniques (MITER ATT&CK). The research question…

Read more

CybSiVerkehr

The KIRAS Study “Cyber Sicherheit für zukünftige Verkehrssysteme” focuses on cybersecurity of autonomous drive and cooperative-Intelligent transport…

Read more

DaMon

Cyber-attacks are serious threats for organizations and entire nations. The project results enable political decision makers to implement specific…

Read more

defalsif-AI

Detection of false information by Artificial Intelligence

Read more

Delorean - Electromobility in real-life practical use by the police force

The police currently have the largest vehicle fleet in Austria and their governmental tasks require an absolutely reliable mobility solution, the…

Read more

Deployment and training of personal tracking dogs (PSH)

Investigate principles for deployment of personal tracking dogs, evaluating the existing training program and obtaining information from other…

Read more

DESTRail - Prevention of Disasters from Earthquakes, Ship Impact and Terrorist Attack on Infrastructure of Rail Network

Traffic infrastructure is the backbone of our economy. The impacts of natural hazards, technological failures and human lapses threaten…

Read more