Home » Projects » Node » R&I Project Hub

R&I Project Hub

VALU3S

Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities. This effort translates into an overhead on the V&V (verification and validation) process making it time-consuming and costly. The ECSEL JU project VALU3S aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process.

ENSURESEC

In times of a global pandemic, there is an increased use of online services such as e-commerce, which goes together with an increased number of threats and attacks related to the services, as well as to the underlying processes.  From the online presentation of the goods to the consumer to the product delivery, passing through online payment – every step of the process is facing threats on a cyber and/or a physical level.

FINSEC

FINSEC is an example of integration between Physical + Cyber security fully dedicated to the critical infrastructures in the financial sector. The main results of the FINSEC project are:

  • Standard based reference architecture
  • Predictive security
  • Collaborative security
  • Security toolbox and certification services

CyberKit4SME

 

 

CyberKit4SME will provide cybersecurity tools that help SMEs and MEs become aware of, analyze, forecast, and manage cybersecurity and data protection risks. The toolkit will provide sophisticated levels of analysis and protection in a manner that is low-cost, easy to understand, and collaborative in nature, plus facilities supporting incident reporting and security intelligence sharing and collaboration with other SMEs, larger supply chain partners, and CERT/CSIRTs.

SOCCRATES

Over the past years, the cyber threat landscape has greatly evolved. Organizations are faced with a
challenging task of preventing attacks and have fast and effective detection and response mechanisms
if attacks cannot be prevented. In addition, it is commonly reported that the time to compromise is
typically very short (i.e. seconds to minutes), while the discovery time is more likely to be weeks or
months. In addition, the time from detection to containment of the attack may again take weeks.

TeraFlow

TeraFlow will create a novel cloud-native SDN controller for beyond 5G networks. This new SDN controller shall be able to integrate with current NFV and MEC frameworks as well as to provide revolutionary features for flow aggregation, management (service layer), network equipment integration (infrastructure layer), and AI/ML-based security and forensic evidence for multi-tenancy. 

The project proposes an integrated solution for tackling various challenges of B5G networks to support service providers and telecommunication operators in their journey towards future networks.

PUZZLE

PUZZLE brings together multidisciplinary competences and resources from the academia, industry and research community focusing on digital community, multi-dependency cyberphysical risk assessment, edge trust assurance services and remote attestation, distributed processing, programmable networking mechanisms, cybersecurity analytics, deep analysis and distributed machine learning, threat intelligence and blockchain technologies. 

IoTAC

The IoTAC project aims to deliver a secure and privacy-friendly IoT architecture that will facilitate the development of more resilient IoT service environments. Our system, comprising of a secure gateway, runtime security applications and cloud-based service platforms, will provide comprehensive protection for service environments of various IoT domains. The technology will not only protect new deployments but can also enhance the security level of legacy operations.

IoTAC has a multi-layer approach to improve IoT security.

SAFECARE

Over the last decade the European Union has faced numerous threats that quickly increased in their magnitude, changing the lives, the habits and the fears of hundreds of millions of citizens. The sources of these threats have been heterogeneous, as well as weapons to impact the population. As Europeans, we know now that we must increase our awareness against these attacks that can strike the places we rely upon the most and destabilize our institutions remotely. Today, the lines between physical and cyber worlds are increasingly blurred.

CitySCAPE

The Challenge

The traditional security controls and security assurance arguments are becoming increasingly inefficient in supporting the emerging needs and applications of the multimodal transport systems, allowing threats and security incidents to disturb all dimensions of transportation. Therefore, the enormous potential of the multimodal ecosystem, namely a more efficient transportation, which lies on the extent to which it globally remains cyber-secure, is becoming vulnerable.

Pages