Projects

Home » Projects

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate, click here

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

TYPES

TYPES aims to cope with this challenge by defining, implementing, and validating in pre-market status a holistic framework of technologies and tools that guarantees both transparency and privacy preservation, gives the end user control upon the amount of information he/she is willing to share, and defines privacy-by-design solutions.

Trusted Cloud

Trusted Cloud provides cloud solutions and services to gain greater control over sensitive and personal data. This initiative is a European solution to store digital data and contents, so that consumers and businesses in Europe do not have to worry on where and by whom their valuable digital age assets are handled. 

TRUESSEC.EU

The assurance of security, privacy, reliability and safety features is key-point to unlock the enormous potential that the connected vehicles systems paradigm i.e., the dynamic Cyberphysical system of highly-equipped infrastructure-connected vehicles with numerous third-party components, can offer towards safer transportation. The emerging systems expose a variety of wireless-communication and hardware interfaces which result in a large attack surface.

TREDISEC

The current trend for data placement shows a steady shift towards 'the cloud'. The advent of cloud storage and computation services however comes at the expense of data security and user privacy. To remedy this, customers nowadays call for end-to-end security whereby only end-users and authorized parties have access to their data and no-one else. This is especially true after the outbreak of data breaches and global surveillance programs last year.

TOREADOR

The TOREADOR project is aimed at overcoming some major hurdles that until now have prevented many European companies from reaping the full benefits of Big Data analytics (BDA). Companies and organisations in Europe have become aware of the potential competitive advantage they could get by timely and accurate Big Data analytics, but lack the IT expertise and budget to fully exploit BDA.

THREAT-ARREST

Introduction:

SysSec

Over the past decade we are witnessing an ever-increasing amount of cyberattacks on the Internet. Prolific, ingenious, and ranging in style from large-scale worms to 'below the radar' phishing attempts, cyberattacks have evolved to unprecedented levels of sophistication. To counter these cyberattacks, defenders are (mostly) developing safeguards, after the attack was made. In the meantime, while defenders are busy with mending the fences, attackers had already developed and planned their next strike

SURPRISE

Wireless networks transform our environments into smart ones: ubiquitous medical services, smart energy production & distribution, automated logistics chains, smart buildings, more effective tactical operations, more efficient and safer transportation. We have every reason to embrace smart environments but without new dangers for the systems and their users.

SUPERCLOUD

SUPERCLOUD researches and develops new security and dependability infrastructure management paradigm. Our approach is on one hand, User-Centric for self-service clouds-of-clouds, i.e., customers can define their own protection requirements and avoid provider lock-ins. On the other hand we focus on Self-Managed services for self-protecting clouds-of-clouds which can reduce administration complexity through automation.

SUNFISH

Today the European Public Sector Players lack the necessary infrastructure and technology to allow them to integrate their computing clouds. Furthermore, legislative barriers often make it difficult to use available commercial technological solutions. The SUNFISH project aims to provide a specific and new solution to face these issues.

Pages

News

The 2nd Concertation Meeting of H2020 projects from unit H1 "Cybersecurity & Privacy” gathered over 60 representatives from all projects in the unit in order to dis

Future Events

The 14th International Conference on Availability, Reliability and Security (ARES 2019), will be held from August 26 to August 29, 2019 at the University of Kent, Canterbury, UK.

26/08/2019 to 29/08/2019

PROTECTIVE is co-organising the 2nd International Workshop on Cyber Threat Intelligence Management(CyberTIM 2019) as apart of the ARES 2019 conference in the UK on 26-29 August 2019.

26/08/2019 to 29/08/2019