Cybersecurity aims to ensure correct and consistent computations in the presence of an intelligent adversary. This includes security of hardware and software systems, as well as security of networks used to connect individual components into systems of systems, where components may belong to different organisations.
The Cybersecurity research group embraces a holistic approach to system security, which means that we include external services, supply lines and the human element in the scope of our interests. We develop models, policies, techniques and tools to support secure development and operation of computing systems, ranging in scale from small embedded systems to global computing infrastructures, such as the Internet.
The lead of the co-simulation research group is Christian Damsgaard Jensen. Christian ...
We ...
...
HeatSync
The HeatSync project develops a common data model across the district heating sector, as well as a data broker for easy data access for service providers. The demonstrator will include 3 use cases for commercial application to show a savings potential in both efficiency gains in DKK and in saved CO2 through easier access to data. The Cybersecurity Research Group at AU leads the development of the access control model to allow flexible sharing of production and consumer data across multiple organisations.
AccessQKD
AccessQKD will develop, test, and validate a world class Continuous Variable Quantum Key Distribution (CV-QKD) system to provide the absolute strongest protection against future cyberattacks. The AccessQKD project will result in a low-cost CV-QKD system that can be integrated into existing telecom infrastructure ensuring resilient, secure and trusted data connectivity in the quantum world. The Cybersecurity Research Group at AU leads the efforts to extend quantum secured links to communication networks.
Secure Digital Twins in DTaaS
The Cybersecurity research group defines the overall security model and develops the security policies and mechanisms to support collaboration among mutually suspicious agents on the DTaaS platform.