AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH.
|
|
- Jerome Little
- 5 years ago
- Views:
Transcription
1 AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria P: F:
2 Objectives Integration of EGNOS/EDAS into vehicle on-board and personal mobility technologies Integration of a signal authentication functionality in order to provide the required level of integrity Integration of an innovative GNSS PVT (Position, Velocity, Time) software solution into positioning unit facilitating EGNOS/EDAS processing Improvement of the overall positioning performance (accuracy, availability, integrity) in demanding environments (alpine, urban, etc.) EGNOS coverage in the city of Graz on a vehicle trajectory (blue: EGNOS available; red: EGNOS unavailable) 2
3 TCA s PANDAS server PANDAS (Positioning and Navigation Data Assistance Service) is TCA s modular built server which provides EDAS and assistance data for demanding applications to significantly improve accuracy and integrity PANDAS provides data in many different applicable formats 3
4 PANDAS results PANDAS (using EDAS) as certified service increased positioning accuracy to an user accepted level as required for charging and thus, is one key enabler for the charging application Comparison of the trajectories obtained from different positioning solutions: RTK (yellow), standalone GPS (red), EGNOS (blue) and EDAS (green) 4
5 5 PANDAS results Comparison of the absolute errors obtained from different positioning solutions: standalone GPS (red), EGNOS (blue) and EDAS (green) Horizontal Errors Special Event - Run# Standalone 8 EGNOS EDAS Epochs (s ) Error (m)
6 PANDAS results Mean Absolute Horizontal Error 2,0 1,8 1,6 Mean Absolute Error (m) 1,4 1,2 1,0 0,8 0,6 Standalone EGNOS EDAS 0,4 0,2 0,0 1 Standalone 1,82 EGNOS 1,21 EDAS 0,99 All 5 Test Runs 6
7 Signal and position authentication GNSS Security Threats Jamming, Spoofing, Meaconing Volpe Report 2001: Vulnerability Assessment of the Transportation Infrastructure Relying on the GPS Countermeasures Signal processing algorithms Data processing algorithms 7
8 Authentication algorithms Signal processing IF signal cross-correlation between rover and base IF signal cross-correlation between L1 and L2 Very sophisticated but requires to process large amount of data Data processing algorithms Validation of ephemeris/almanac C/N0 monitoring Baseline verification EDAS/PANDAS used as reference platform 8
9 Baseline verification Single Point Solution unable to reveal spoofing attack Comparison of baselines Baseline out of coordinate differences Baseline computed relative positioning Relative positioning can be done based on code measurements (Double-Differences) based on IF signal correlation between rover and base Relative algorithm is capable of detecting spoofing attacks 9
10 Authentication results IF signal cross-correlation results Normal mode Baseline differences Spoofing attack 10
11 Conclusions EDAS/PANDAS Position accuracy enhancement through correction data based on EDAS and other algorithms Signal and position authentication Detection of spoofing attacks using signal processing and data processing algorithms EDAS/PANDAS in combination with signal authentication are the key enabler demanding applications since these technologies provide the required level of accuracy and reliability for the overall mission 11
12 AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria P: F:
Assessing the Civil GPS Spoofing Threat
Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell
More informationEGNOS: free accuracy for mapping and GIS applications
EGNOS: free accuracy for mapping and GIS applications Table of contents EGNOS basics: architecture and technical parameters EGNOS benefits for mapping and GIS EGNOS-enabled devices EGNOS applications and
More informationEDAS. as alternative source for a DGPS service for maritime users. Tamás Horváth. Alberding GmbH
30 Sept 2015 1/27 EDAS as alternative source for a DGPS service for maritime users Tamás Horváth Alberding GmbH EGNOS Service Provision Workshop 2015, 29-30 September 2015, Copenhagen, Denmark 30 Sept
More informationGPS Spoofing Susceptibility Testing
GPS Spoofing Susceptibility Testing GNSS Vulnerability Countering the Threat 13 th Feb 2013 Prof. Charles Curry B.Eng, C.Eng, FIET Managing Director, Chronos Technology Ltd NPL, Teddington, London With
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationStrategies for Maritime Cyber Security Leveraging the Other Modes
Strategies for Maritime Cyber Security Leveraging the Other Modes Michael Dinning Innovative Technologies for a Resilient Marine Transportation System June 24, 2014 The National Transportation Systems
More informationGlobal Satellite Services
Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity Content 1. Location revolution 2. World of Spoofing
More informationTransportation Security Risk Assessment
Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationState of play of the European GNSS
State of play of the European GNSS Tachograph forum Flavio SBARDELLATI, GSA Market Development 3 December 2018, Brussels GSA in a nutshell What? Gateway to Services Galileo & EGNOS Operations and Service
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : HP0-Y24 Title : Securing HP ProCurve Networks Vendors : HP Version : DEMO Get Latest
More informationSpoofing GNSS Timing Receivers
Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical
More informationGNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY
GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International
More informationGNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?
Space Reflecto 2013, Brest, 04 November 2013 GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Mohamed SAHMOUDI 1,2 1 ISAE, University of Toulouse, France 2
More informationRobust GPS-Based Timing for Phasor Measurement Units
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY
More informationEDAS Based Virtual Reference Stations for maritime users
EDAS Based Virtual Reference Stations for maritime users E. Lacarra, J. Morán, J. Vázquez, M.A. Sánchez, ESSP SAS, T. Horváth, Alberding GmbH BIOGRAPHIES Elisabet Lacarra received her master degree in
More informationINDONESIA S GEOSPATIAL DATA INFRASTRUCTURE
INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE Antonius B. Wijanarto Head of Center for Geodetic Control Network and Geodynamics GEOSPATIAL INFORMATION AGENCY srgi@big.go.id ONE GEO.REFERENCE (One Map Policy)
More informationDIGITAL ROAD PROFILE USING KINEMATIC GPS
ARTIFICIAL SATELLITES, Vol. 44, No. 3 2009 DOI: 10.2478/v10018-009-0023-6 DIGITAL ROAD PROFILE USING KINEMATIC GPS Ashraf Farah Assistant Professor, Aswan-Faculty of Engineering, South Valley University,
More informationMiguel Martins itrust consulting
Tailoring information security to business requirements itrust consulting s.à r.l. Headquarters: 18, Steekaul L-6831 Berbourg Tel: +352 26 17 62 12 Fax: +352 26 71 09 78 Mail: Info@itrust.lu Web: www.itrust.lu
More informationRT-2 L1TE NovAtel s Single Frequency RTK Solution
RT-2 L1TE NovAtel s Single Frequency RTK Solution Precise thinking 2009 NovAtel Inc. All rights reserved. Printed in Canada. D12699 www.novatel.com 1-800-NOVATEL (U.S. & Canada) or 403-295-4900 Europe
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationRobert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group
Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity
More informationLIABILITY-CRITICAL APPLICATIONS
Integrity and Interoperability for LIABILITY-CRITICAL APPLICATIONS Property of GMV All rights reserved LIABILITY CRITICAL APPLICATIONS (OF GNSS POSITIONING) Those in which large unnoticed navigation errors
More informationHigh Quality Positioning: a Key to Success for Autonomous Driving
High Quality Positioning: a Key to Success for Autonomous Driving SaPPART final workshop Alberto Fernandez Wyttenbach Brussels, 4 October 2017 This presentation can be interpreted only together with the
More informationCyber Attack Information System CAIS. DI Thomas Bleier, MSc, CISSP, CEH
Cyber Attack Information System CAIS Cyber Attack Information System DI Thomas Bleier, MSc, CISSP, CEH 09.11.2012 AIT Austrian Institute of Technology Bundeskanzleramt Österreich Bundesministerium für
More informationA Better Space Mission Systems threat assessment by leveraging the National Cyber Range
A Better Space Mission Systems threat assessment by leveraging the National Cyber Range Chuck Allen (CISSP) & Jonathon Doubleday CORD Presented to GSAW, Feb-March 2018 2018 The Aerospace Corporation Abstract
More informationFundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring
Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.
More informationFigure 1: Mobile mapping project location in New York City.
Using Mobile LiDAR to Deliver Survey Accurate Data This presentation will take the attendees though the process of controlling and delivering survey grade LiDAR data for use in CADD, Modeling, and GIS
More informationt Bench for Robotics and Autonomy Andrea Merlo
t Bench for Robotics and Autonomy Andrea Merlo Agenda Introduction TBRA Overview Objectives Architecture / Technical Description Status Test Results Roadmap he context of a Rover, dance, Navigation and
More informationUAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationNavFire Guidance System Integrated GPS and Mission Computer for Future Navigation Systems
NavFire Guidance System Integrated GPS and Mission Computer for Future Navigation Systems Walter Trach, Jr. Session IIIA 12 May 2010 NavFire Guidance System Outline Precision-Guided Artillery NavFire Guidance
More informationAutomated Attack Framework for Test & Evaluation (AAFT)
Automated Attack Framework for Test & Evaluation (AAFT) 34 th International Test and Evaluation Association Symposium October 4, 2017 Mr. Andrew Shaffer The Applied Research Laboratory The Pennsylvania
More informationCyber Defense Centers only for large companies?
Cyber Defense Centers only for large companies? Security Intelligence and Operations July, 2016 The Challenges we face 2 Managing risk in today s digital enterprise Increasingly sophisticated cyber attacks
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationProject Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications
Project Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications ESRI International Users Conference July 2012 Table Of Contents Connected Vehicle Program Goals Mapping
More informationWHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight
Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly
More informationSecurity Considerations in M2M Communications
Security Considerations in M2M Communications Applied Research Issues & Projects in the Austrian Institute of Technology (AIT) Dr. Markus Tauber Project Manager, ICT Security, Future Networks and Services,
More informationGALILEO STATUS AND INSTITUTIONAL ORGANISATION
1 GNSS TECHNOLOGY ADVANCES IN A MULTI- CONSTELLATION FRAMEWORK SESSION 3: GNSS SERVICES, INSTITUTIONAL ORGANISATION AND PROGRAMMES GALILEO STATUS AND INSTITUTIONAL ORGANISATION 26 September 2014, Rome
More informationUpdate on LBS Location based services and IoT Internet of Things
Update on LBS Location based services and IoT Internet of Things This presentation can be interpreted only together with the oral comments accompanying it GNSS is considered a commodity inside smartphones
More informationBriefing: Navigation Message Authentication for Civil GPS Anti-Spoofing
Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Kyle Wesson UT Radionavigation Laboratory http://radionavlab.ae.utexas.edu 10 March 2011 The Big Picture Are cryptographic anti-spoofing
More informationIwane Mobile Mapping System
Iwane Mobile Mapping System Geo-Imaging Mobile Mapping Solution Iwane Mobile Mapping System (IMMS) is high-efficient, easyto-use, end-to-end solution that provides tremendous flexibility in collecting,
More informationLure10: Exploiting Windows Automatic Wireless Association Algorithm
Lure10: Exploiting Windows Automatic Wireless Association Algorithm HITBSecConf2017, Amsterdam GEORGE CHATZISOFRONIOU (@_sophron) sophron@census-labs.com www.census-labs.com > Wi-Fi Automatic Association
More informationTales from the Base Station to the Substation. Delivering Phase ITSF 2013
Tales from the Base Station to the Substation Delivering Phase ITSF 2013 1 Phase delivery in Telecom Networks Telecom LTE networks rely on accurate phase synchronization Efficient and reliable use of spectrum
More informationOVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS
OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security
More informationCybersecurity of Space Missions
Cybersecurity of Space Missions Jean Muylaert and Luca Del Monte Presentation at the Workshop of the European Interparliamentary Space Conference 14 May 2018 Space missions Examples of hacking, spoofing,
More informationPanelists. Moderator: Dr. John H. Saunders, MITRE Corporation
SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More informationScience & Technology Directorate: R&D Overview
Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology
More informationSecurity In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.
Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property
More information1 General Information... 2
Public Release Notes Topic : u-blox M8 Flash Firmware 3.01 HPG 1.20 UBX-16024900 Author : Mårten Ström Date : 18 Oct 2016 We reserve all rights in this document and in the information contained therein.
More informationConnected Car Solutions Based on IoT
FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the
More informationCyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies
Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the
More information1 General Information... 2
Public Release Notes Topic : u-blox M8 Flash Firmware 3.01 HPG 1.40 UBX-17021504 Author : Mårten Ström Date : 22 June 2017 We reserve all rights in this document and in the information contained therein.
More informationChristoph Schmittner, Zhendong Ma, Paul Smith
FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles 1st International workshop on the Integration of Safety and Security Engineering (ISSE 14) Christoph Schmittner, Zhendong
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationJames Van Rens CEO Riegl USA, Inc. Mining Industry and UAV s combined with LIDAR Commercial UAV Las Vegas October 2015 James Van Rens CEO Riegl USA
James Van Rens CEO Riegl USA, Inc. Mining Industry and UAV s combined with LIDAR Commercial UAV Las Vegas October 2015 James Van Rens CEO Riegl USA COST EFFECIENCY CONTINUUM LIDAR and IMU Partnership Technology
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationImproving SCADA System Security
Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September
More informationTerraSystem LidarPod
TerraSystem LidarPod a complete turnkey system New to the market, the TerraSystem UAV LidarPod is a complete turnkey system developed specifically for use on Unmanned Aerial Vehicles (UAVs). Survey industry
More informationAttack Resilient State Estimation for Vehicular Systems
December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationSIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov
SIP Automated Driving System SEIGO KUZUMAKI Program Director Nov.14.2017 Welcome back to SIP-adus WS! `Is it not delightful to have friends coming from distant quarters? (The Analects of Confucius) Intensive
More informationCertification of EGNSS Timing Receivers and Services
Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint
More informationDESENT: Smart decision support system for urban energy and transportation
DESENT: Smart decision support system for urban energy and transportation Intermediate results of the project DESENT Thomas Nacht Real Corp 2018, 04.04 06.04.2018, Vienna/Austria Agenda Introducing the
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationThe IS Audit Process Part-1 Four key objectives
The IS Audit Process Part-1 Four key objectives a. Defining auditing and auditors b. The audit planning process c. Risk analysis d. Internal controls Auditing & Auditors: an evaluation process of an org,
More informationNIST Security Certification and Accreditation Project
NIST Security Certification and Accreditation Project An Integrated Strategy Supporting FISMA Dr. Ron Ross Computer Security Division Information Technology Laboratory 1 Today s Climate Highly interactive
More informationScepter / Scepter II Getting Configured for Real Time Networks with an Internet Hot Spot
a. Turn Your Mi-Fi, Cell Phone or other Internet Hot Spot On b. Turn Your Scepter Data Collector On 1 c. In the center of the data collector tap Wi-Fi a. Tap Menu in the bottom Right Corner and then Wi-Fi
More informationAssessment of geodetic coordinates processed using different baselines
Assessment of geodetic coordinates processed using different baselines Elmo Leonardo Xavier Tanajura 1, Rodrigo Mikosz Gonçalvez 2,Admilson da Penha Pacheco 3, Cláudia Pereira Krueger 4 1 Center of Technological
More informationSpatialFuser. Offers support for GNSS and INS navigation systems. Supports multiple remote sensing equipment configurations.
SPATIALFUSER SpatialFuser SpatialFuser is designed to georeference data acquired by our LiDAR mapping systems into common mapping formats such as LAS/LAZ or GPX. The main purpose of SpatialFuser is to
More informationSmart and Resilient Energy Systems: Metrics and Evaluation
Smart and Resilient Energy Systems: Metrics and Evaluation Igor Linkov and Matthew Bates Risk and Decision Sciences Team, US Army 6172339869 Igor.Linkov@usace.army.mil 1 Smart Resilient 2 Smart vs Resilient
More informationEUROMED GNSS II/MEDUSA project
EUROMED GNSS II/MEDUSA project PBN Implementation Workshop / Go Team PBN Implementation Workshop / Go Team, Tunis, February 2014 1 Contents Euromed GNSS European GNSS (E GNSS), EGNOS and Galileo Euromed
More informationTime Synchronization Trends for Critical Infrastructure. Randy Brudzinski Vice President Microsemi
Time Synchronization Trends for Critical Infrastructure Randy Brudzinski Vice President Microsemi Power Matters. TM Microsemi Corporation Time Synchronization Trends for Critical Infrastructure Randy Brudzinski
More informationEmerging Connected Vehicle based
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationINTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061
INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING
More informationCYBER SECURITY OPERATION CENTER
CYBER OPERATION CENTER Reply s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific
More informationProfessional Services Overview
Professional Services Overview Internet of Things (IoT) Security Assessment and Advisory Services IOT APPLICATION MOBILE CLOUD NETWORK Company Overview HISTORY HISTORY Founded in 2010 Headquartered in
More informationAIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1)
AIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1) AIIC Associazione Italiana esperti Infrastrutture Critiche Non-governmental and non-profit scientific association legally registered
More informationThe Australian Government s Approach to Critical Infrastructure Resilience
The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General
More informationApplication Security Approach
Technical Approach Page 1 CONTENTS Section Page No. 1. Introduction 3 2. What is Application Security 7 3. Typical Approaches 9 4. Methodology 11 Page 2 1. INTRODUCTION Page 3 It is a Unsafe Cyber world..
More informationLow cost GNSS receivers: navigation and monitoring activities
PHD in Environmental and Infrastructure Engineering XXIX cycle Low cost GNSS receivers: navigation and monitoring activities Ph.D.'s activity final report Marco Negretti marco.negretti@polimi.it Supervisor:
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationGNOSTECH MARITIME CYBERSECURITY SOLUTIONS
GNOSTECH MARITIME CYBERSECURITY SOLUTIONS Disaster Response vs Cyber Incident Response Technologies Facilitates Exceptional Benefits While Creating Cyber Vulnerabilities Shore-based Systems That Directly
More informationDigitale Zukunft Datenbrillen und Smartwatches im (alpinen) Tourismus. Gerald Binder
Digitale Zukunft Datenbrillen und Smartwatches im (alpinen) Tourismus Gerald Binder INTRODUCTION enabling mobile innovation Introduction evolaris Who We Are COMET K1 center of excellence for research and
More informationEDA documentation. EUROPEAN DEFENCE AGENCY COMMUNICATION No. EDA
Martin KONERTZ Director Capability, Armament & Technology e-mail: CAT@eda.europa.eu Tel: +32 (0)2 504 2850 Brussels, 31 May 18 EUROPEAN DEFENCE AGENCY COMMUNICATION No. EDA201805184 Ref: Land & Logistics/MK
More informationRadware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017
Radware DefensePro DDoS Mitigation Release Notes Software Version 8.13.01 Last Updated: December, 2017 2017 Cisco Radware. All rights reserved. This document is Cisco Public. Page 1 of 9 TABLE OF CONTENTS
More informationCyber Security Detection Technology for your Security Operations Centre. IT Security made in Europe
Cyber Security Detection Technology for your Security Operations Centre IT Security made in Europe Customized IT security. Our services. 2 3 Solutions Our technology. Your experts. Managed Services Next
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More information20 Barrett Court Fredericton, NB, Canada E3B 6Y1 navsoft.com
20 Barrett Court Fredericton, NB, Canada E3B 6Y1 www.gemini navsoft.com 2 Contents Contents... 3 1. Description... 4 2. RoverVu Layout... 6 2.1. Rover Client Software Window... 6 2.2 GPS Status Window...
More information7th ICG Meeting, Beijing
Location Assurance Service Provider 06/11/2012 itrust consulting s.à r.l. Tel: +352 26 176 212 6 Z.I. Bombicht Fax: +352 26 710 978 L-6947 Niederanven Web: www.itrust.lu 7th ICG Meeting, Beijing Introduction
More informationSecurity Configuration Assessment (SCA)
Security Configuration Assessment (SCA) Getting Started Guide Security Configuration Assessment (SCA) is a lightweight cloud service which can quickly perform the configuration assessment of the IT assets,
More informationSIP Automated Driving System ー Mobility bringing everyone a smile ー
AASHTO International Day SIP Automated Driving System ー Mobility bringing everyone a smile ー Masato MINAKATA (TOYOTA MOTOR CORPORATION) SIP-adus International Cooperative WG 29 October 2017 Intensive R&D
More informationGPS Vulnerability Report
GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements
More informationLand & Property Information. CORSnet-NSW Web Portal User Guide
Land & Property Information CORSnet-NSW Web Portal User Guide 1 What is a CORS? Most people are now familiar with the use of Global Navigation Satellite Systems (GNSS) like the ones used for in-car and
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More information