Home » R&I Project Hub

R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

CYBERSECURITY

A recent wave of cyberattacks has made it evident that cybercrime is a growing global concern. Numerous threats such as malware infections, phishing attempts and identity thefts can have disastrous consequences for citizens, firms and nations. Cybercrime, defined as crimes where expertise about cyberspace is used to violate the law, is an increasing threat due to criminals’ creativity, faster digitization, growing dependence on technologies and huge data accumulation.

ODIX 2.0

Incoming files present one of the most serious threats to every corporate network. Cyber attackers have the knowledge and resources to implement highly sophisticated attacks using various methods such as encrypted and distributed malware attacks, zero-day attacks and more. These are delivered via files which are introduced into the target network by various channels, including email, removable media, and web download. Malware attacks can create serious damage to the organization but current available defensive measures fail to provide any protection against such attack.

C4IIOT

As digitisation becomes a business priority for many organisations in Europe and around the world, the industrial Internet of Things (IIoT) will generate huge opportunities for key industries like manufacturing, oil and gas, agriculture, mining and transportation. IIoT is bringing machines, analytics, and people to form a network of industrial devices connected by communications technologies. Machine-to-machine communication, however, increases the risk of cyberattacks.

AERAS

AERAS aims to develop a realistic and rapidly adjustable cyber range platform for systems and organisations in the critical healthcare sector, to effectively prepare stakeholders with different types of responsibility and levels of expertise in defending high-risk, critical cyber-systems and organizations against advanced, known and new cyber-attacks, and reduce their security risks.

LOCARD

LOCARD aims to provide a holistic platform for chain of custody assurance along the forensic workflow, a trusted distributed platform allowing the storage of digital evidence metadata in a blockchain.

5GZORRO

The EU-funded 5GZORRO project (Zero-touch security and trust for ubiquitous computing and connectivity in 5G networks) will develop these envisaged solutions for zero-touch service, network and security management in multi-stakeholder environments (ubiquitous), making use of Smart contracts based on Distributed Ledgers Technologies to implement required business agility.

ELIoT Pro

The project ELIoT Pro (Easy& Lightweight IoT Protector) an end-to-end cybersecurity solution for IoT networks. For H2M authentication in IoT environments the solution eliminates passwords – nothing for hackers to steal. Our core technology is based on the One-Time Password (OTP) user authentication protocol, mathematically proven unbreakable. For M2M in IoT environments ELIoT Pro ensures secure device-to-device authentication and data security using a lightweight encryption protocol.

AF-Cyber

The main goal of AF-Cyber is to investigate and analyse the problem of attributing cyber attacks. We plan to construct a logic-based framework for performing attribution of cyber attacks, based on cyber forensics evidence, social science approaches and an intelligent methodology for dynamic evidence collection. AF-Cyber will relieve part of the cyberattacks problem, by supporting forensics investigation and attribution with logical-based frameworks representation, reasoning and supporting tools.

E-CORRIDOR: Edge enabled Privacy and Security Platform for Multi Modal Transport

E-CORRIDOR aims at providing a flexible, secure and privacy-aware framework allowing confidential, distributed and edge enabled security services, as threat analysis and prevention as well as privacy-aware seamless access mechanism in multi-modal transport systems.

nIoVe

nIoVe aims to deploy a novel multi-layered interoperable cybersecurity solution for the Internet-of-Vehicles

Pages

News

Risk-!n Conference 2022 took place on 19-20 May in Zürich, Switzerland. GEIGER was presented in a dedicated session that built on the comparison of cyber risks and radioactivity, called 'GEIGER - We make the invisible visible!'.

Future Events

The IRIS consortium and the European Cyber Security Organisation (ECSO) have the pleasure to invite you to the official IRIS launch event, taking place virtually on the 5th July from 9:30 to 12:30 CET.

05/07/2022

Deliverables Research

This deliverable presents the results of the analysis of the Cybersecurity and Privacy European research projects and their results, including the characterisation of the projects comprised in the Project Radar, the analysis of the Market and Technology Readiness Levels (MTRL)

The Cyberwatching.eu team present in this report a series of visualisations of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies.

This deliverable (August 2020) presents a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.