42.KI-SecureArtificial Intelligence for a multisensory solution to protect critical infrastructure autonomously Background and Motivation Protection of critical infrastructures is becoming increasingly important…
43.WRITE - IT assisted search and comparison of handwritingsIT based solution which allows for the search of similar handwritings to expedite the identification of unknown writers by handwriting experts. Law enforcement agencies possess an extensive…
44.NIKE-SubMoveConSustainable interdisciplinary use in complex operations underground - Subsurface Movement Control Background and MotivationTerrorism is an ever-increasing and multifaceted problem and ensuring the…
45.K.REX: Knowledge Recognition for Evidence eXtractionA self-learning system analyzes documents combining both optical/image and textual characteristics in order to simulate the human interpretative abilities Investigators in (criminal) prosecution have…
47.CURSOR - Cyber security exercise concept and frameworkThe aim of the CURSOR project is the conception of a national cyber exercise program for the analysis of (program) cyber exercises. This exercise program is supported by the specification of a cyber…
48.RELIANCE – REsilient pubLIc wArniNg ChannElsResilient technical channels for the future Austrian Public Warning System The warning and alerting of the general population represents one of the most important tasks of public authorities in the…
50.TrackTragbares duales GC-IMS mit Multielement-Sensorsystem zur schnellen und zuverlässigen Detektion von versteckten Personen und Waren Throughout Europe human trafficking is on the increase, resulting…