R&I Project Hub

Home » R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

PACT

The project Public Perception of Security and Privacy: Assessing Knowledge, Collecting Evidence, Translating Research into Action (PACT) is a three year collaborative project under the EU 7th Framework research programme led by CSSC - Centre for Science, Society and Citizenship in Rome. PACT seeks to develop and validate an evidence-based Privacy Reference Framework for a Security Decision Support System that may assist end-users and policy makers to consider human rights, privacy and fundamental rights when they evaluate pros and cons of specific security investments and measures.

OCGN

There are a few EU publications on cyber security/cyber crime and the gambling sector. This proposal is novel in that it focused on the threat to the integrity of online gambling sites from organised criminal elements in the EU (most research on this subject is done in the USA), and their ability to withstand threats, intimidation and extortion and responses to these threats.

MAS2TERING

MAS2TERING was a three-year technology-driven and business-focused project (2014-2017), aimed at developing an innovative information and communication technology (ICT) platform for the monitoring and optimal management of local communities of prosumers. MAS2TERING combined an original business vision, with goals towards the enablement of local energy aggregation markets, utilizing a set of enabling technologies from the artificial intelligence, communications, and security domains.

LV-Pri20

The goal of the LV-Pri20 project is to aid our ICT-driven lives, by “safeguarding the human right of privacy in the digital society”. Concretely, the main focus of LV-Pri20 is the formal and automatic analysis of privacy-preservation in today’s ICT. LV-Pri20 will focus on the prevalent wireless media, e.g., RF-identification protocols, remote car-unlocking, wearables, machine-to-machine communication in the Internet of Things (IoT)/ubiquitous computing, but it will not neglect wired environments (given their common cloud-connection).

HIPS

Until now, research in efficient cryptographic protocols has typically been in two different directions. The first direction, and the major one, is to construct more efficient protocols and prove them secure, where efficiency is measured by the amount of communication sent, the number of heavy cryptographic operations carried out (e.g., exponentiations), and so on. The second direction is to take the state-of-the-art protocols and implement them while optimising the implementation based on systems concerns.

FIDELITY

FIDELITY is a multi-disciplinary initiative which will analyse shortcomings and vulnerabilities in the whole ePassports life cycle and develop technical solutions and recommendations to overcome them. FIDELITY will demonstrate privacy enhanced solutions to:

ECRYPT-NET

ECRYPT-NET is a research network of six universities and two companies, as well as 7 associated companies, that intends to develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create efficient and secure implementations of those techniques on a broad range of platforms.

ECRYPT-CSA

The goal of ECRYPT-CSA is to strengthen European excellence in the area of cryptology and to build on the Network of Excellence ECRYPT and ECRYPT II to achieve a durable integration and structuring of the European cryptography community, involving academia, industry, law enforcement and defence agencies. The project has the following concrete objectives:

DAPPER

This Marie Curie career integration project considered the whole data release process, from the data owner to the data user. It laid out a set of principles for privacy tool design that highlight the requirements for interoperability, extensibility and scalability. The aim of the project was in Delivering Anonymization Practically, Privately, Effectively and Reusably (DAPPER).  It produced published results under the following four themes:

COCKPITCI

The CockpitCI vision identifies the need to complement business awareness with cyber-security awareness in order to reach a superior level of awareness (global awareness) and increase the business continuity of the infrastructure.

Pages

News

What are the challenges and (cybersecurity) issues the financial sector is currently facing? 

Future Events

The Digital Transformation EXPO Manchester (formerly IP EXPO Manchester) is the North's biggest IT event, and it's completely free to attend.

It will offer the opportunity to learn all about the technologies that enable digital transformation: upgrade legacy systems to build modern infrastructure; migrate to a secure public, private or hybrid cloud; detect and prevent cyber attacks; improve business operations with AI and robotic process automation (RPA); collect data for effective analysis. 

04/11/2020 to 05/11/2020

Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. Similarly, many of the novel technological solutions that are used to improve the security of systems and networks are also being used by those who wish to threaten well-established algorithms and protocols.

13/11/2020

Deliverables Research

This deliverable is the first in a series of publications over the duration of the cyberwatching.eu project, related with to methodology for the classification of projects/services and their Market Readiness.

We present in this report a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This document presents a view of the European cyber security and privacy research and innovation ecosystem with a view of getting input and feedback via a survey and the concertation meeting held on 26 April 2018 in Brussels.
A key component of developing this deliverable was to target research projects in the field of cyber security in the current cyber security framework. To this aim, a survey was sent out to projects in cyber security in the EU. All the projects were also invited to the First Concertation Meeting, which was held on 26 April 2018 in Brussels. Feedback from that first Concertation meeting is included in this deliverable.

One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.