Result description
This result is ideal for critical infrastructures which require security systems to provide real-time monitoring and increased situation awareness (transportation, energy, telecommunications, etc.), as well as enterprises and authorities. With this methodology the anticipated technologies can be investigated with regards to their usability, usefulness and trust. The validation methodology can be applied to further infrastructures by taking and eventually adapting the approach utilised in PRAETORIAN.
The validation methodology allows to plan, conduct and report on validation exercises for cyber-physical security systems to protect critical infrastructures or entities. This holds for single as well for interconnected infrastructures.
Addressing target audiences and expressing needs
- Investor introductions
- Expanding to more markets /finding new customers
- Collaboration
Entities providing cyber-physical security tools and systems for CI/CE or comparable application areas, which are interested in validating security tools and systems,
- Other Actors who can help us fulfil our market potential
- Research and Technology Organisations
- Private Investors
R&D, Technology and Innovation aspects
The methodology is ready to be adapted to any comparable application of tools and systems for protection of single and interconnected critical infrastructures/entities.
Result submitted to Horizon Results Platform by DEUTSCHES ZENTRUM FUR LUFT – UND RAUMFAHRT EV