Home » R&I Project Hub

R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

M-Sec

M-Sec is an EU&JP R&D Project co financed by the European Commission under the H2020 programme and the National Institute of Information and communications - National Research and Development Agency specialized in the field of information and communications technology that promotes innovation and research in Japan.

CPSoSAWARE

CPSoSaware will contribute to all expected impact areas set out in H2020 ICT-01-2019 Computing technologies and engineering methods for cyber-physical systems of systems under the topic of Models, tools and methods for design-operations continuum of dependable CPSoS, as explained below (the text in the left column refers to H2020 Work programme document and is provided for reference).

INSPIRE-5Gplus

The next-generation of telecom networks (fifth generation or 5G) is expected to unleash a massive Internet of Things (IoT) where networks can serve billions of connected devices. Improving security of 5G and Beyond networks is necessary. The EU-funded INSPIRE-5Gplus project will introduce novel solutions and paradigms to make maximum use of artificial intelligence (AI), machine learning (ML) and Blockchains. The overall aim of the project is to deliver unique assets to achieve intelligent and trusted multi-tenancy (confident, evidence-based and liable) across multi-tenants’ infrastructure.

DAN

The Dark Web is a haven for criminals. It has become a forum and marketplace for weapons, drugs, organs, illicit pornography, software exploits, stolen private data, passwords, credit card details, counterfeit products and money. Illegal services are offered, like phishing, cyber-attacks, murder and rape for hire and money laundering.

MALAGA

The rise of connectivity and automation technology is creating more and more opportunities in many fields. Connected and autonomous vehicles (CAV) is a field widely affected by these technology advancements. While innovation is disrupting business standards and encouraging investments, it is also at risk of cybersecurity attacks.

RADDICS

This ERC project pushes the boundary of reliable data-driven decision making in cyber-physical systems (CPS), by bridging reinforcement learning (RL), nonparametric estimation and robust optimization. RL is a powerful abstraction of decision making under uncertainty and has witnessed dramatic recent breakthroughs. Most of these successes have been in games such as Go - well specified, closed environments that - given enough computing power - can be extensively simulated and explored.

CYBERSECURITY

A recent wave of cyberattacks has made it evident that cybercrime is a growing global concern. Numerous threats such as malware infections, phishing attempts and identity thefts can have disastrous consequences for citizens, firms and nations. Cybercrime, defined as crimes where expertise about cyberspace is used to violate the law, is an increasing threat due to criminals’ creativity, faster digitization, growing dependence on technologies and huge data accumulation.

ODIX 2.0

Incoming files present one of the most serious threats to every corporate network. Cyber attackers have the knowledge and resources to implement highly sophisticated attacks using various methods such as encrypted and distributed malware attacks, zero-day attacks and more. These are delivered via files which are introduced into the target network by various channels, including email, removable media, and web download. Malware attacks can create serious damage to the organization but current available defensive measures fail to provide any protection against such attack.

C4IIOT

As digitisation becomes a business priority for many organisations in Europe and around the world, the industrial Internet of Things (IIoT) will generate huge opportunities for key industries like manufacturing, oil and gas, agriculture, mining and transportation. IIoT is bringing machines, analytics, and people to form a network of industrial devices connected by communications technologies. Machine-to-machine communication, however, increases the risk of cyberattacks.

AERAS

AERAS aims to develop a realistic and rapidly adjustable cyber range platform for systems and organisations in the critical healthcare sector, to effectively prepare stakeholders with different types of responsibility and levels of expertise in defending high-risk, critical cyber-systems and organizations against advanced, known and new cyber-attacks, and reduce their security risks.

Pages

News

Have you ever received an SMS to your smartphone that asked you to follow a link for more information? It could be a delivery notice from an online store or postal service, or a notification of a new voicemail. Maybe the SMS seemed a bit off, and you might have wondered whether you should click the link or not. But you wanted to know where your parcel is or who left a message, so you went on and clicked it anyway.

Future Events

OLYMPUS H2020 project wants to invite you to a workshop on possible business opportunities around the results of the project. OLYMPUS has defined a quite new and advanced privacy preserving IdM solution based on a distributed model that can be interoperable with existing IdM solutions and that provide user centric vision of the privacy of his data.

27/10/2021

SWForum.eu is organising its 2nd MTRL webinar series on 27 October 2021 from 14:00 to 15:00 CEST, understanding the criteria for optimal self-assessment of project outcomes using Market and Technology Readiness Levels (MTRL).

27/10/2021

Deliverables Research

This deliverable presents the results of the analysis of the Cybersecurity and Privacy European research projects and their results, including the characterisation of the projects comprised in the Project Radar, the analysis of the Market and Technology Readiness Levels (MTRL)

The Cyberwatching.eu team present in this report a series of visualisations of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies.

This deliverable (August 2020) presents a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.