Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current Restore this Version View Page History

« Previous Version 2 Next »


(related to/part of theme "Information Governance & Integrity")

4. Proving the integrity

  • Tools/toolsets and processes for public authorities (police, customs, border control, KTK, military, etc.) for investigation of cyber attacks


  • Recording DOS attacks in WSNs
  • Provability: authentic vs. non-authentic


  • What kind of toolset public authorities will need, so that it will be possible for them to (successfully) investigate ongoing or already happened cyber attack?
  • SOL-operations
  • Forensics
  • Incident response -processes
  • Planning and process to do post-mortem cyber forensic to unknown cyber threats

Industrial partners

OrganizationContact personRole & contribution


Missing Link


Research partners

OrganizationContact personRole & contribution