Home » R&I Project Hub

R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

Eye-O-T

Today there are around 800 million connected devices in Smart Homes, which forecasted to reach 2 billion devices by 2020 - an uptick of about 250 million new devices per year. Smart Home networks become crowded, difficult to maintain and vulnerable.

ThreatMark

ThreatMark vision is to secure the assets of people/companies by better protection of digital transaction systems against cyber-attacks. It dramatically improves the detection & protection capabilities of cyber-operators against threats, fraud & incidents. It allows them to increase their security by complex preparedness, rapid detection and faster response.

ConnectProtect

This project focuses on cyber-security and aims to address any form of internal or external malware and cyber-attacks. Estimates of global financial losses due to cyber-crime are at least €350 billion per year and are expected to reach €1.89 trillion by 2019. Cyber-crime has led to the loss of up to 150,000 jobs in Europe, which is about 0.6% of the total unemployed population.

LipVerify

The LipVerify project will explore the feasibility of commercialising a new service which provides secure access to sensitive data, applications and physical areas via a unique biometric authentication technique - based on analysis of the users lip movements.

ASCEMA

Manufacturers increasingly rely upon development in the supply chain; e.g. a typical automotive company has 60% of components manufactured in the supply chain. A significant level of resistance, to sharing and enforcement of IP, is damaging supply chain partnerships and the manufacturing production processes that rely upon them; costs to industry estimated at millions of euro (NFF Symposium, 2013).

SecIoT

The IoT refers to ordinary objects – other than computers, phones and tablets – having an internet connection. Among countless others, these typically include home appliances, medical devices and utilities meters. Although the connections are convenient, they are built using so many communications technologies, for so many purposes, that security levels vary greatly. Many connections are highly insecure and vulnerable to hacking. Such cyberattacks have already brought about severe consequences.

DISCOVERY

DISCOVERY aims at supporting dialogues between Europe and North America (US and Canada); and fostering cooperation in collaborative ICT R&I, both under Horizon 2020 and under US and Canada funding programmes. With this purpose, DISCOVERY proposes a radically new approach to engage more actively and strategically in supporting dialogues and partnership building for ICT R&I cooperation.

Caramel

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous.

DEFENDER - Defending the European Energy Infrastructures

Critical Energy infrastructures (CEI) protection and security are becoming of utmost importance in our everyday life. However, cyber and system-theoretic approaches fail to provide appropriate security levels to CEIs, since they are often used in isolation and build on incomplete attack models, resulting in silos-like security management fragmented operational policies.

GUARD

A cybersecurity framework to GUArantee Reliability and trust for Digital service chains

Pages

News

Have you ever received an SMS to your smartphone that asked you to follow a link for more information? It could be a delivery notice from an online store or postal service, or a notification of a new voicemail. Maybe the SMS seemed a bit off, and you might have wondered whether you should click the link or not. But you wanted to know where your parcel is or who left a message, so you went on and clicked it anyway.

Future Events

OLYMPUS H2020 project wants to invite you to a workshop on possible business opportunities around the results of the project. OLYMPUS has defined a quite new and advanced privacy preserving IdM solution based on a distributed model that can be interoperable with existing IdM solutions and that provide user centric vision of the privacy of his data.

27/10/2021

SWForum.eu is organising its 2nd MTRL webinar series on 27 October 2021 from 14:00 to 15:00 CEST, understanding the criteria for optimal self-assessment of project outcomes using Market and Technology Readiness Levels (MTRL).

27/10/2021

Deliverables Research

This deliverable presents the results of the analysis of the Cybersecurity and Privacy European research projects and their results, including the characterisation of the projects comprised in the Project Radar, the analysis of the Market and Technology Readiness Levels (MTRL)

The Cyberwatching.eu team present in this report a series of visualisations of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies.

This deliverable (August 2020) presents a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.