Home » R&I Project Hub » Http< » Body>< » R&I Project Hub

R&I Project Hub

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems. The purpose of creating such policies will be to enhance the trustworthiness of cyber systems and provide a sound basis for liability in cases of security and privacy breaches in them.

CHINO

Digital health applications are disrupting the healthcare sector by bringing huge innovation and improving the quality of care. However, this innovation brings also some risks since those apps collect and store extremely privacy-sensitive data in the cloud and mobile environments.

Eye-O-T

Today there are around 800 million connected devices in Smart Homes, which forecasted to reach 2 billion devices by 2020 - an uptick of about 250 million new devices per year. Smart Home networks become crowded, difficult to maintain and vulnerable.

ThreatMark

ThreatMark vision is to secure the assets of people/companies by better protection of digital transaction systems against cyber-attacks. It dramatically improves the detection & protection capabilities of cyber-operators against threats, fraud & incidents. It allows them to increase their security by complex preparedness, rapid detection and faster response.

ConnectProtect

This project focuses on cyber-security and aims to address any form of internal or external malware and cyber-attacks. Estimates of global financial losses due to cyber-crime are at least €350 billion per year and are expected to reach €1.89 trillion by 2019. Cyber-crime has led to the loss of up to 150,000 jobs in Europe, which is about 0.6% of the total unemployed population.

LipVerify

The LipVerify project will explore the feasibility of commercialising a new service which provides secure access to sensitive data, applications and physical areas via a unique biometric authentication technique - based on analysis of the users lip movements.

ASCEMA

Manufacturers increasingly rely upon development in the supply chain; e.g. a typical automotive company has 60% of components manufactured in the supply chain. A significant level of resistance, to sharing and enforcement of IP, is damaging supply chain partnerships and the manufacturing production processes that rely upon them; costs to industry estimated at millions of euro (NFF Symposium, 2013).

SecIoT

The IoT refers to ordinary objects – other than computers, phones and tablets – having an internet connection. Among countless others, these typically include home appliances, medical devices and utilities meters. Although the connections are convenient, they are built using so many communications technologies, for so many purposes, that security levels vary greatly. Many connections are highly insecure and vulnerable to hacking. Such cyberattacks have already brought about severe consequences.

DISCOVERY

DISCOVERY aims at supporting dialogues between Europe and North America (US and Canada); and fostering cooperation in collaborative ICT R&I, both under Horizon 2020 and under US and Canada funding programmes. With this purpose, DISCOVERY proposes a radically new approach to engage more actively and strategically in supporting dialogues and partnership building for ICT R&I cooperation.

Caramel

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous.

Pages