R&I Project Hub

Home » R&I Project Hub

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate, click here

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

DEFENDER - Defending the European Energy Infrastructures

Critical Energy infrastructures (CEI) protection and security are becoming of utmost importance in our everyday life. However, cyber and system-theoretic approaches fail to provide appropriate security levels to CEIs, since they are often used in isolation and build on incomplete attack models, resulting in silos-like security management fragmented operational policies.

GUARD

A cybersecurity framework to GUArantee Reliability and trust for Digital service chains

Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures

In the digital era, Critical Infrastructures (CIs) are operating under the premise of robust and reliable ICT components, complex ICT infrastructures and emerging technologies (e.g. IoT, Cloud Computing, Big Data) and are transforming into Critical Information Infrastructures (CIIs) that can offer a high degree of flexibility and efficiency in the communication and coordination of advanced services and processes.

CE-IoT

The overall aim of CE-IoT is to develop an innovative framework of interplay between Circular Economy and IoT, to explore novel ways in which this interaction can drastically change the nature of products, services, business models and ecosystems.

The CE-IoT framework will be bi-dimensional and bi-directional in terms of circularity aiming to develop:

SAWSOC

SAWSOC aims at bringing a significant advancement in the convergence of physical and logical security, meaning effective cooperation (i.e. a coordinated and results-oriented effort to work together) among previously disjointed functions. Recently some achievements have been made (e.g. SEM and SIM have merged into SIEM, and LACS and PACS have merged into IM), Security Operations Center (SOC) technology has improved significantly, but much is yet to be done.

U2PIA

Nier Soluzioni Informatiche (NSI), with the support of Orlandi-Leone Studio Legale, launched U2PIA, a disruptive cloud platform designed to enable the creation of in-depth analysis of the risks which Personal Data are subject to through a Privacy Impact Assessment (PIA).

SocialPrivacy

The SocialPrivacy project aims to understand the issues of privacy at the level of users, commercial enterprises and society (Diagnostic Phase) and then to propose solutions (Generative Phase) which help manage the trade-offs inherent in allowing companies to access users’ personal data, while providing sufficient privacy safeguards.

SecIoT

The IoT refers to ordinary objects – other than computers, phones and tablets – having an internet connection. Among countless others, these typically include home appliances, medical devices and utilities meters. Although the connections are convenient, they are built using so many communications technologies, for so many purposes, that security levels vary greatly. Many connections are highly insecure and vulnerable to hacking. Such cyberattacks have already brought about severe consequences.

REVEN-X1

TETRANE wants to further develop REVEN®, a product that automatically discovers, characterizes and helps solving nearly any software flaw that could be exploited by malicious hackers. REVEN represents the only answer to a growing social issue: cybersecurity for critical infrastructure and loss of revenue due to cyberattacks.

REVEN helps to anticipate threats by directly analysing executable binaries (source code is not needed) thanks to the mathematical simulation of processors’ physical structures. Before REVEN, it was considered impossible.

Pages

News

CyberSolace, has added a new niche capability to its portfolio of cybersecurity consulting services in the form of Crypto-Currency traceability services in Cybercrime cases.  Especially in relation to ransomware attacks and extorted funds tracing and recoverability.

Future Events

The sec4dev Conference & Bootcamp is a Vienna-based security event which targets one very specific group: people involved in software development.

From February 24-27 2020 experts will gather in the TU Wien to discuss and promote, among other things, secure coding, security testing, automation and continuous integration.

24/02/2020 to 27/02/2020

As Europe’s largest legal technology conference and exhibition, The British Legal Technology Forum 2020 will bring together the most respected professionals from both the legal and commercial technology sectors to examine and explore the systems, strategies, processes and platforms that will drive law firms and legal businesses into the next decade and beyond.

10/03/2020

Deliverables Research

This deliverable is the first in a series of publications over the duration of the cyberwatching.eu project, related with to methodology for the classification of projects/services and their Market Readiness.

We present in this report a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This document presents a view of the European cyber security and privacy research and innovation ecosystem with a view of getting input and feedback via a survey and the concertation meeting held on 26 April 2018 in Brussels.
A key component of developing this deliverable was to target research projects in the field of cyber security in the current cyber security framework. To this aim, a survey was sent out to projects in cyber security in the EU. All the projects were also invited to the First Concertation Meeting, which was held on 26 April 2018 in Brussels. Feedback from that first Concertation meeting is included in this deliverable.

One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.