#UnitedAgainstHate – Morally Courageous Joint Activities of Young People Against Hate Speech and Cyberbullying
This study analyzes how online strategies of mobilization and interconnection can be used in an attempt to support young people to act in a morally courageous way against digital violence on the internet (e.g. hate speech,...
The recent increased use of contactless technology (NFC) for payments at the point-of-sale presents the police and the payment industry with new threat scenarios for criminal use. The looming diversity of these payment systems...
Multi-Level „ForestFireFighting - Management System“ for an optimized operational guidance of ground and air forces in forest fire events
The project 3S-VKI developed a method to describe and assess relevant threads for infrastructures
Flexible multifunctional information- and communication solutions for an optimized operational command for relief units
Successes and failures of large scale decontamination at Chernobyl will be documented and made accessible in a “Handbook of experiences” with the help of the then technical director of decontamination, DI Iouli and DI Irina...
The variety of news items, cyber security bulletins and crime reports (on, e.g., Ransomware, phishing, DDoS, CEO Fraud) in 2016 showed how complex cyber incidents can be. These attacks exploited both known and unknown attack...
Achilles heels in water infrastructure -Integrated concept for identification of weak points
Study for digital forensics
AGETOR is a KIRAS-project to improve safety at major events. Movements of persons are analysed using big data sources (mobile communications and social media).
Goal of the project is the spatial validation and securing of events in public space
Airborne data acquisition and surveillance system for security-relevant scenarios
Countermeasures for unmanned aerial vehicles for authorities and emergency and rescue organizations
An APT Competence Center supports the observation and investigation of espionage and sabotage in security-relevant organizations and critical infrastructures. The study APT-CC examines the essential aspects of the establishment...
Austrian Crisis Management Laboratory
International Best Practices as well as national survey of the current status and target demand of stakeholders for the derivation of harmonized recommendations (R & D services)
The goal of this project was to develop a demonstration system of a multimodal system for the efficient monitoring of “large areas” like the areas of airports but also refineries, power plants, etc
The present project was thus aimed at developing a demonstration system for multimodal monitoring to ensure the efficient and effective surveillance of airside areas
Through the combined use of Unmanned Aerial Vehicles (UAVs), sensors in the visible, infrared and multispectral ranges as well as laser scanners, an effective and efficient acquisition of information in inacessible terrains is...
Multimodal airborne sensor platform and innovative analyses and geo-management solutions to support disaster management
The project aimed to maintain and increase the high level of security of Vienna International Airport (VIE), while also enhancing its efficiency
AUTFinger ATM is a project on biometric authentication for ATMs. Cash withdrawal at Autrian ATMs is currently facilitated by a two-factor authentication scheme based on smartcards and a 4-digit PIN-code.
The critical refugee situation at present is considered as one of the largest humanitarian crises in the post-World War II era (UNHCR 2014). It challenges European politics as well as the European public in new ways and requires...
Participatory, Multimedia, Resilience-focused Tool Concept for Prevention of Ideologies of Degradation
Analysis, Identification and Quantification of Causes of Regional Differences in Crime
Intentional interference of GNSS may compromise a significant part of critical infrastructure in Austria. Therefore, in this project, an overview of the affected infrastructure shall be generated including potential threats.
The study deals with the use of information in public authority telecommunication and any risks related to BYOD and Cloud Computing
Preferential treatment of selected organizations to maintain fundamental supply chains of essential goods and services in the event of a crisis
BI:JU Biography Work in Open Youth Work as a Resilience-Strenghtening Measure for Radicalisation Prevention
In this project, approaches of biography work for the prevention of radicalisation in open youth work will be developed and evaluated.
The project BioCapture aims at optimizing the existing identification process carried out by the police during interventions of mobile patrols. The research focusses on a prototypical dynamic security solution, which supports...
Fluorescence based mobile biological warfare detection systems
The goal of this project proposal is to research innovative solutions for the identification, prevention and reduction of organized financial crime, such as money laundering, with particular regard for virtual currencies (or more...
The project Blackout Prevention and Intervention (BlackÖ.2) analyses how the currently excellent level of supply security can be maintained in the future
A public authorities’ network intends to ensure both secure communication between authorities and exchange of information and data in case of exceptional security incidents. Currently, this is not sufficiently guaranteed because...
The Austrian research project C2DSAS (Command and Control Decision Support and Advisory Systems) focused on the development of software-based methods for the operational command and control decision support
Main objectives of this project are identifying expected future cyber risks and emerging threats, evaluating novel anomaly detection techniques, creating highly modular infrastructure models used in agent-based attack simulations...
So far the differentiation between illegally grown drug strains and fibre hemp cultivars of Cannabis (hemp) is based on a time-consuming chemical analysis which cannot be applied to all plant materials.
A software prototype for the connection of the IT of the field forces to existing in-house IT-Security systems
Increased protection for public spaces through early, automatic detection and identification of CBRN hazardous substances using sensor networks including information distribution and processing.
Cross Sectoral Risk Management for Object Protection of Critical Infrastructures
Computer Emergency Response Team (CERT) Communication-Model
Computer Emergency Response Team (CERT) Communication-Model II
CIIS aims to develop methods and technologies for the exchange of information on cyber incidents across organizational boundaries to better defend against cyber attacks and to streamline analysis of current threats
As part of the Austrian national strategy for cyber security, several activities regarding the implementation of concrete measures to improve security and resilience of critical infrastructure against cyber-attacks are ongoing.
The study „Cloud Sicherheit“ prepares Austrian organizations (and their customers) for Cloud Computing
Event-, damage and loss as well as risk data are rarely intercomparable as they have been produced in most cases for different purposes and with diverging methodologies. CESARE aims at a functional demonstration of a national...
Crisis Management using Multimodal Interaction for Stakeholders and Citizens
Counter Stories – Prevention of Radicalisation and Extremist Propaganda through Alternative Narratives
The project Counter Stories develops new tools for supporting early prevention activities against radicalisation. The tools target young people between 13 and 17 years and can be applied by the Austrian law enforcement agency.
Product development for civil society capacity building in context of violence- prone conduct of youth
Behaviour Based Anomaly Detection in Cyber-Physical Systems
Crime Predictive Analytics is concerned with the predictive analysis of crime and includes quantitative methods to identify patterns and dependences in data bases. Thus, future events may be predicted and potential strategic...
The state of the art in the management of risks is heavily dependent on experts and can only depict static situations. CRISCROSS develops, partly further and partly anew, a software tool which aggregates intelligence about...
3D crime site scanning and documentation based on cost-efficient 3D sensors, tablets and smartphones.
The aim of the CURSOR project is the conception of a national cyber exercise program for the analysis of (program) cyber exercises. This exercise program is supported by the specification of a cyber exercise platform and...
The Social Media Users in Austria and their experiences with criminal-relevant activities
Mobilizing young people for counter speech in dealing with cyberbullying, hate and trolling on the Internet
In this project, we analyze cyber security aspects of a comprehensive road transport infrastructure system which will be more used intensively by interconnected cars in future, from the perspective of the road operators. The...
The KIRAS Study “Cyber Sicherheit für zukünftige Verkehrssysteme” focuses on cybersecurity of autonomous drive and cooperative-Intelligent transport system in Austria, in order to provide the stakeholders a structured and...
Cyber-attacks are serious threats for organizations and entire nations. The project results enable political decision makers to implement specific and Austrian data protection legislation compliant measures to protect the...
DESTRail - Prevention of Disasters from Earthquakes, Ship Impact and Terrorist Attack on Infrastructure of Rail Network
Traffic infrastructure is the backbone of our economy. The impacts of natural hazards, technological failures and human lapses threaten infrastructure and can thus result in considerable economic damages. Several events in the...
Detection of human signatures for the protection of critical infrastructure
In the project "Detection of human signatures to detect smuggling" (DHS-AS) a portable prototype for the detection of trace gases released through skin, breath or other excretion will be advanced and optimized.
Since the amount of available information on the internet is continually increasing, manual surveillance is not a viable option anymore, which leaves potential threats undetected
The analysis of multimedia content, the reduction of the massive volumes of data into processable units and a holistic and transparent visualization of the results of the analysis (especially with respect to geographical...
Simulation of the threat and damage potential of explosive devices at the urban level
Digital identities are an extension of our physical identities in the cyber space. The rapid technological development and the ever ubiquitous usage of digital identities in online activities raise many questions, to which the...
The aim of this study is to identify and analyze internet-based digital services vital to the Austrian government and society, to provide an assessment of their criticality and to illustrate the interdependencies of these...
The project ‘dnatox’ consisted of three subprojects: (1) LC-MS of toxic compounds, (2) LC-MS of DNA, and (3) software development
Detection of varying improvised explosive devices by using smart analytic sensors
Internet- and Mediarelated Interventions by Open Youth Work (e-youth work) as a Protective Measure against Radicalizing Internet Propaganda
Evaluation and monitoring of the launch of Body Worn Cameras. Response analysis, societal perception and recommendations for accompanying measures regarding the launch for police use in Austria.
Interventions in the context of the Violence Protection Act with a particular focus on children and youth
ELFUM – Electronic Monitoring as a resource of modern sentence management – Possibilities of expansion, chances and limits
Electronic monitoring is a hope for chances for developments with respect to sentence- and risk management in Austrian prisons. Tangible steps require evidence based Knowledge
emergency mission control center
Control system for mass events with multi-sensor analysis for real-time crowd monitoring and short term prediction
Main objective of this project is a fundamental risk analysis regarding the different energy grids (natural gas, electricity, district heating) in Austrian urban areas
Regional energy-cell- and crisis preparedness concept for the scenario “blackout” – energy cell Feldbach
Improving the resilience of digital distribution networks for electrical energy by anomaly detection
The aim of this project is to develop an E-Participation platform alongside the different security levels of eID-identification data like user name and password, mobile signature, citizen card (“Bürgerkarte”) and electronic...
ERiC is aiming at the optimization of crisis management and work efficiency by developing a new interactive situation map, which is embedded into a new design of an emergency control center
ERIMAPS aims to develop an innovative approach for decision support of first responders at CBRNe incidents on basis of real time risk maps.
In Austria a large network of underground infrastructures such as road or rail tunnels, subway tunnels, cavern and tunnels for underground energy supply, underground mining, infrastructures for water supply, infrastructures for...
EvaReg examines the need and acceptance as well as the legal and technical framework conditions for an evacuation assistance register for residents with special needs. A prototypical information system will be evaluated in a...
EVE analyses possibilities to provide automated right of way for emergency vehicles in cooperative intelligent transport systems (C-ITS), based on communicating with traffic signal systems or other vehicles. Security issues play...
Evaluation system for the optimization of evacuation scenarios and intervention strat-egies of emergency services
Monitoring of crisis situations and event protection based on airborne systems and video behavior analysis
Increasing world-wide travel capacities at airports pose new challenges in the area of border and security control. Motivated by these challenges the project developed a system for automated border control which substantially...
FEIS is a software tool which was developed in order to contribute to a minimisation of hazardous events and failures within water supply systems and thus to achieve increased water safety
In Situ Risk Assessment of the Acoustic Impact of Stun Grenades
Reliable intruder detection within a safety zone is essential for the protection of critical infrastructures and provides ways to optimize the crisis management process
Flexible, semi-automated video forensics system for the analysis of mass video data after terrorist attacks
The goal of this research is to provide a conceptual as well as a software solution to support strategic, collaborative and cross-departmental decision-making processes.
Burglaries, especially in private homes, are because of their large number very unsettling for significant parts of the population and require from the police a high investment of resources for their clearing.
The project “ForStrat-Cockpit” aims at developing a web-based software-tool which will allow processing different topics simultaneously and independently (in order to create a common situational picture), by the use of specific...
To clarify issues related to the efficiency and dimensional accuracy in the use of emergency services for the protection of citizens, a Feasibility Study is carried out for non-lethal weapons systems.
Enhancement of the effectiveness of response measures at the release of toxic gases
Flooding of municipal solid waste landfills in Austria — An environmental hazard?
Community work as a factor of security in public space: understanding of effects and success factors
The project aims to generate scientifically sound findings on security-relevant effects of various approaches of community work in public space by means of meaningful impact evaluation.
GENESIS - Guideline für Behörden und KMU-Anbieter strategischer Services zur risiko-orientierten Implementierung der NIS-Richtlinie
The aim of this initiative is to develop a risk management framework for the SMEs affected by the NIS Directive. The goal of this framework is to meet both, the requirements of the NIS directive, and the results of the current...
Geodata and security of Critical Infrastructures in Austria