131.Internet Study – „Digital Atlas of Austria“The goal of this study is to give an overview of digital infrastructure components and -grids, their dependencies, data traffic process, essential market conditions and ownership structures relevant…
132.CERT-Komm IIComputer Emergency Response Team (CERT) Communication-Model II In the course of the previous study CERT-Komm I, an analysis of the framework conditions of CERTs was conducted, and those factors were…
133.CPS-SecurityBehaviour Based Anomaly Detection in Cyber-Physical Systems Due to the advancements of automation in industrial production systems (which includes critical infrastructure such as energy production)…
134.CANNDATSo far the differentiation between illegally grown drug strains and fibre hemp cultivars of Cannabis (hemp) is based on a time-consuming chemical analysis which cannot be applied to all plant…
136.FORMSBurglaries, especially in private homes, are because of their large number very unsettling for significant parts of the population and require from the police a high investment of resources for their…
137.FlashBangIn Situ Risk Assessment of the Acoustic Impact of Stun Grenades Since the early 1960s the development and testing of non-lethal weapons is forced. In the 1990s there has been an increasing interest -…
138.Mobile eCardThe project aims to create a concept for the realization of an e-health app on a smartphone, based on an existing secure identity. The aim of this project is to create a mobile e-card app. On the…
139.CISA- Cyber Incident Situational AwarenessAs part of the Austrian national strategy for cyber security, several activities regarding the implementation of concrete measures to improve security and resilience of critical infrastructure…