Projects

ŠKODA AUTO - EV Fleet Charging

ŠKODA AUTO - EV Fleet Charging

Case study of our successful collaboration with ŠKODA AUTO. We determined the optimal distribution of charging stations in the factory using the power of AI, mathematical optimization and simulation fed by the real-world data.

Active Environment Modeling With Mobile Robots

Active Environment Modeling With Mobile Robots

Autonomous mobile robots can carry out tasks in environments that are unsafe or otherwise unsuitable for humans. The robots' missions in such environments range from remote facilities inspections to searching for survivors in the collapsed buildings or caves. Our models were also deployed on a tracked robot during the DARPA Subterranean Challenge.

Computational Propaganda

Computational Propaganda

Propaganda, fake news, and misinformation are not just social science topics. Our security research deals with so-called computational propaganda. In addition to politics, algorithms and automation are increasingly entering communication. Learn how they are being exploited.

AI in Journalism

AI in Journalism

What does the future of journalism look like with the introduction of artificial intelligence? Automatic generation of reports, verification of facts, search for articles confirming or refuting claims. These and other topics are explored by our researchers in the new TAČR project.

Civilsphere Project

Civilsphere Project

The goal of Civilsphere project is to provide simple solutions for journalists, activists, and NGOs for detecting attacks in their devices using our network behavioral Intrusion Detection and Prevention System, Stratosphere IPS.

Stratosphere Linux IPS

Stratosphere Linux IPS

The Stratosphere Linux IPS (Slips), is a behavioral-based intrusion detection and prevention system that uses machine learning algorithms to detect malicious behaviors.

Aposemat Project

Aposemat Project

Together with Avast company, we aim to protect IoT devices by analyzing, executing, and detecting attacks and malware. The project leverages real IoT devices that are infected and attacked constantly, including routers, Raspberry Pi's, Alexa and other devices.