R&I Project Hub

Home » R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

BIOSEC

The core intellectual aim of BIOSEC is to explore whether concerns about biodiversity protection and global security are becoming integrated, and if so, in what ways. It will do so via building new theoretical approaches for political ecology.

ASAP

The ASAP FP7 research project developed a dynamic open-source execution framework for scalable data analytics. The underlying idea was that no single execution model is suitable for all types of tasks, and no single data model (and store) is suitable for all types of data. Complex analytical tasks over multi-engine environments therefore require integrated profiling, modeling, planning and scheduling functions.

Goals

symbIoTe

The current IoT ecosystem is however fragmented: a series of vertical solutions exist today which, on the one hand, integrate connected objects within local environments using purpose-specific implementations and, on the other hand, connect smart spaces with a back-end cloud hosting dedicated often proprietary software components.

STORM

STORM project incorporates such valuable information in a practical and useful set of tools for heritage safeguarding, taking it to a higher level. By making the processes user-focused and citizen-centred, STORM brings together wider awareness of protection and prevention than ever before. The project enables to go far beyond the current state of the art by way of:

SPOOC

The rise of the Internet and the ubiquity of electronic devices has deeply changed our way of life. Many face to face and paper transactions have nowadays digital counterparts: home banking, e- commerce, e-voting, etc. The security of such transactions is ensured by the means of cryptographic protocols. While historically the main goals of protocols were to ensure confidentiality and authentication the situation has changed. The ability of people to stay connected constantly combined with ill-conceived systems seriously threatens people’s privacy.

SHIELD

The SHIELD project proposes a universal solution for dynamically establishing and deploying virtual security infrastructures into ISP and corporate networks. SHIELD builds on the huge momentum of Network Functions Virtualisation (NFV), as currently standardised by ETSI, in order to virtualise security appliances into virtual Network Security Functions (vNSFs), to be instantiated within the network infrastructure using NFV technologies and concepts, effectively monitoring and filtering network traffic in a distributed manner.

SEMIoTICS

SEMIoTICS main scope aims to develop a pattern-driven framework, built upon existing IoT platforms, to enable and guarantee secure and dependable actuation and semi-autonomic behaviour in IoT/IIoT applications. The SEMIoTICS framework will support cross-layer intelligent dynamic adaptation, including heterogeneous smart objects, networks and clouds. To address the complexity and scalability needs within horizontal and vertical domains, SEMIoTICS will develop and integrate smart programmable networking and semantic interoperability mechanisms.

DSSC

The DSSC Research Training Programme is a Marie Sklodowska-Curie COFUND action developed at the University of Groningen that will train 10 PhD students for 4 years to be part of the next generation of interdisciplinary data and complexity experts. The research areas of the DSSC COFUND Doctoral Programme are: Adaptive Models & Big Data; Complex Systems & Engineering and Advanced Instrumentation & Big Data.

The 4-year Doctoral Programme offers:

CryptoCloud

Privacy for the Cloud will have a huge societal impact since it will revolutionize the trust model: users will be able to make safe use of outsourced storage, namely for personal, financial and medical data, without having to worry about failures or attacks of the server. It will also have a strong economic impact, conferring a competitive advantage on Cloud providers implementing these tools.

FeatureCloud

FeatureCloud is a transformative, pan-European research collaboration and AI-development project which implements a software toolkit for substantially reducing cyber risks to healthcare infrastructure by employing the worldwide first “privacy by design” approach.

The final product of FeatureCloud will be characterized by three key strengths:

Pages

News

What are the challenges and (cybersecurity) issues the financial sector is currently facing? 

Future Events

The Digital Transformation EXPO Manchester (formerly IP EXPO Manchester) is the North's biggest IT event, and it's completely free to attend.

It will offer the opportunity to learn all about the technologies that enable digital transformation: upgrade legacy systems to build modern infrastructure; migrate to a secure public, private or hybrid cloud; detect and prevent cyber attacks; improve business operations with AI and robotic process automation (RPA); collect data for effective analysis. 

04/11/2020 to 05/11/2020

Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. Similarly, many of the novel technological solutions that are used to improve the security of systems and networks are also being used by those who wish to threaten well-established algorithms and protocols.

13/11/2020

Deliverables Research

This deliverable is the first in a series of publications over the duration of the cyberwatching.eu project, related with to methodology for the classification of projects/services and their Market Readiness.

We present in this report a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This document presents a view of the European cyber security and privacy research and innovation ecosystem with a view of getting input and feedback via a survey and the concertation meeting held on 26 April 2018 in Brussels.
A key component of developing this deliverable was to target research projects in the field of cyber security in the current cyber security framework. To this aim, a survey was sent out to projects in cyber security in the EU. All the projects were also invited to the First Concertation Meeting, which was held on 26 April 2018 in Brussels. Feedback from that first Concertation meeting is included in this deliverable.

One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.