Projects overview

Sort by


Show more information
Description That is why SOTER is mainly focused on it, aiming at providing a comprehensive set of tools that will act as a transformative process of the finance sector, helping their players to increase their cybersecurity
 White Paper on Cybersecurity standards Result title White Paper on Cybersecurity standards
 Periodic Reporting for period 1 - SOTER (cyberSecurity Optimization and Training for Enhanced Resilience in finance) Result description They are considered critical sectors in terms of Cybersecurity according to NIS directive. Therefore...
Show more information
Description in shaping the future global cybersecurity and privacy landscape.
 White Paper on Cybersecurity Policies Result title White Paper on Cybersecurity Policies
 Cybersecurity and Privacy landscape in Europe Result description Mapping of the cybersecurity landscape in Europe, including technological aspects, EU cybersecurity strategy, policies and legislations, strengths and weaknesses of the European cybersecurity and privacy
Show more information
Description Trust-IT: Expert SME in communicating ICT innovation, developing cybersecurity tools & go-to-market strategies. The University of Oxford: Academic Centre of Excellence in CyberSecurity Research.
 EU Cybersecurity & Privacy Interim Roadmap Result title EU Cybersecurity & Privacy Interim Roadmap
 White Paper on cybersecurity standard gap analysis Result description White Paper on cybersecurity standard gap analysis
Show more information
Description ERASTOSTHENES will leverage breakthrough solutions: (a) the first-ever enclosure of cybersecurity features in IoT devices through deployment of Trust Agents and continuous trust evaluation within the network
Organisation AIRBUS CYBERSECURITY SAS (ACS)
 Periodic Reporting for period 1 - ERATOSTHENES (Secure management of IoT devices lifecycle through identities, trust and distributed ledgers) Result description This will undoubtedly create a huge attack surface and consequently generate cascading cybersecurity risks...
Show more information
Description CYBERWISER.EU will be an educational, collaborative, real-time civil cyber range platform where cybersecurity competitions will take place, making it the EU’s reference, authoritative, independent cybersecurity
 An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models Result title An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models
 Periodic Reporting for period 2 - CYBERWISER.EU (Civil Cyber Range Platform for a novel approach to cybersecurity threats simulation and professional training) Result description CYBERWISER.eu is a H2020 innovation action born to respond to the increasing need for highly-skilled cybersecurity professionals, and also the need to respond swiftly to a complex, multifaceted, cyber
Show more information
Description A combination of innovative technologies are the technology enablers of the proposed Cyber-MAR platform which is not only a knowledge-based platform but more importantly a decision support tool to cybersecurity
 Building a Virtual Maritime Logistics Cybersecurity Training Platform Result title Building a Virtual Maritime Logistics Cybersecurity Training Platform
 Guidelines for Cybersecurity Training Programme across EU (Intermediate) Result description It will provide a first list of recommendation on Cybersecurity Training across EU based on the first findings throughout the implementation of Cyber-MAR.
Show more information
Description The integrated nature introduces new potential entry points for cybersecurity risks. Thus, there is an urgent, pressing need for the Health operators to protect their HCIIs.
 The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations Result title The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
 Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores Result description link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.Authors: Kitty Kioskli, Nineta PolemiJournal title: Human Factors in CybersecurityJournal
Show more information
Description This is only one example of the numerous ways in which cyber criminals are innovating and developing new means of bypassing cybersecurity measures.
 Periodic Reporting for period 1 - REDSENTRY (Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry) Result title Periodic Reporting for period 1 - REDSENTRY (Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry) Result description The SME Instrument Phase I project “redsentry” was a result of the market opportunity detected by ENEO Technología, S.L: (hereafter: ENEO) for cybersecurity solutions based on active network monitoring
Show more information
Description to the currently actively developing legal and regulatory framework for cybersecurity.
 Challenges in Cybersecurity and Privacy - the European Research Landscape Result title Challenges in Cybersecurity and Privacy - the European Research Landscape
 Pilot evaluation report Result description mechanisms provided by the CS-AWARE solution (cybersecurity situational awareness, cybersecurity information sharing and self-healing).
Show more information
Description Emergency procedures can be triggered simultaneously through an alerting system in order to reschedule airside/landside operations, notify first responders, cybersecurity and maintenance teams towards
Organisation AIRBUS CYBERSECURITY SAS (ACS)
 Approaching Interoperability of Airport Cybersecurity Systems Through an Ontology Result title Approaching Interoperability of Airport Cybersecurity Systems Through an Ontology
Show more information
Description through targeted cybersecurity services, increase their cybersecurity awareness through the efficient heterogeneous information processing, the establishment of knowledge sharing with other SMEs&MEs and
 Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints Result title Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints
 Periodic Reporting for period 1 - PUZZLE (Towards a Sophisticated SIEM Marketplace for Blockchain-based Threat Intelligence and Security-as-a-Service) Result description In spite the current cyberthreat landscape, 68% of SMEs&MEs have no systematic approach for ensuring cybersecurity, 60% of them who were victims of cyber attacks did not recover and thus shut down within
Show more information
Description With the prevailing risk of cybersecurity breaches, improving the cyber security posture and detection algorithms is of utmost importance.
Organisation AIRBUS CYBERSECURITY SAS (ACS)
 Cyberspace threats - not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective Result title Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective
Show more information
Description cybersecurity.
 An Adversarial Risk Analysis Framework for Cybersecurity Result title An Adversarial Risk Analysis Framework for Cybersecurity
 Periodic Reporting for period 2 - CYBECO (Supporting Cyberinsurance from a Behavioural Choice Perspective) Result description Cyber insurance can fulfill a key role in the economics of cybersecurity by keeping the risk manageable for the insured companies by transferring it to the insurance provider, while providing incentives
Show more information
Description We, Cybertrap GmbH, are an Austrian start-up devoted to create cybersecurity solutions.
 Periodic Reporting for period 1 - D-FENCE (D-FENCE: Deceptive Monitored Environments for Cybersecurity in Enterprises) Result title Periodic Reporting for period 1 - D-FENCE (D-FENCE: Deceptive Monitored Environments for Cybersecurity in Enterprises) Result description The ineffectiveness of current cybersecurity solutions is alarming: 97% of entities are vulnerable to the more and more sophisticated attacks of hackers and the reported incidences have multiplied its
Show more information
Description Foster and promote European cybersecurity innovation activities and increase the international visibility of EU activities in cybersecurity .
 Periodic Reporting for period 2 - EUNITY (Cybersecurity and privacy dialogue between Europe and Japan) Result title Periodic Reporting for period 2 - EUNITY (Cybersecurity and privacy dialogue between Europe and Japan)
 Community engagement report Result description It includes a collection of sources and cybersecurity related material describing the current research scenarios in both regions.
Show more information
Description The project will develop the INDIMO Inclusive Digital Mobility Toolbox consisting of the Universal design manual, Universal language interface icons for transport services, Guidelines for cybersecurity
 Guidelines for cybersecurity and personal data protection Result title Guidelines for cybersecurity and personal data protection Result description This docuemnt provides guidelines to take into account when developing digital mobility services in terms of cybersecurity and personal data protection This document is the outcome of T24
Show more information
Description DISCOVERY will specifically focus on key aspects that until now have not been properly addressed in the political dialogue, such as funding mechanisms, ICT policy and regulations, and cybersecurity, as
 Input Paper Cybersecurity Working Group Result title Input Paper Cybersecurity Working Group Result description Identification of priority topics for cooperation in the areas related to cybersecurity.
Show more information
Description More recently, the Cybersecurity PPP has brought together public institutions and industrial actors around common roadmaps and projects.
 Cybersecurity skills framework Result title Cybersecurity skills framework
 International and national cybersecurity certification initiatives Result description This deliverable will be a mapping of cybersecurity initiatives.
Show more information
Description needed by cybersecurity practitioners.
 ECHO Cybersecurity Certification Scheme Result title ECHO Cybersecurity Certification Scheme Result description technologies compliant with the ENISA defined approach for an EUwide cybersecurity certification framework
 Update - ECHO Cybersecurity Certification Scheme Result title ECHO Cybersecurity Certification Scheme
Show more information
Description an advanced cybersecurity system enabling all relevant stakeholders and incident response teams to share cyber threat intelligence, synchronize and coordinate their cybersecurity strategies, response and
 CAVs Cybersecurity threats digest and analysis Result title CAVs Cybersecurity threats digest and analysis
 Periodic Reporting for period 2 - nIoVe (A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles) Result description an advanced cybersecurity system enabling all relevant stakeholders and...
Show more information
Description The Health sector’s increasing dependence on digital information and communication infrastructures renders it vulnerable to threats to privacy and cybersecurity, especially as the theft of health data
 Cybersecurity Assessment Tool Result title Cybersecurity Assessment Tool Result description This deliverable contains the implementation and specification report and the prototype of the CUREX Cybersecurity Assessment Tool
Show more information
Description They depend on a high level of understanding of both cybersecurity and of the system or network to be protected, are labour intensive and costly and typically done by small teams.
 Release of the final cybersecurity risk mitigation tools Result title Release of the final cybersecurity risk mitigation tools Result description Release of the final cybersecurity risk mitigation tools
Show more information
Description like 5G, autopilots, and smart charging of Electric Vehicles (EVs) introduce cybersecurity gaps, not addressed satisfactorily yet.
 Addressing Cybersecurity in the Next Generation Mobility Ecosystem with CARAMEL Result title Addressing Cybersecurity in the Next Generation Mobility Ecosystem with CARAMEL
 Periodic Reporting for period 2 - CARAMEL (Artificial Intelligence based cybersecurity for connected and automated vehicles) Result description Nowadays, cars becoming safer, smarter, and “greener” through connectivity, Artificial Intelligence (AI), and Machine Learning (ML), while cybersecurity aims for more sustainable...
Show more information
Description PANACEA will deliver people-centric cybersecurity solutions in healthcare.
 Promoting Cybersecurity Culture Change in Healthcare Result title Promoting Cybersecurity Culture Change in Healthcare
 Models of health services and of medical device lifecycle for cybersecurity Result description Models of health services and of medical device lifecycle for cybersecurity: This deliverable is the output of the work carried out in T1.1 in terms of models of health services.
Show more information
Organisation AIRBUS CYBERSECURITY SAS (ACS)
 The Cybersecurity Project - FORESIGHT, in an advanced stage of its activities. Result title The Cybersecurity Project - FORESIGHT, in an advanced stage of its activities.
 Outreach & communication plan and dissemination report (I) Result description These might include scientific conferences, developer workshops or symposia as well as large cybersecurity fairs and exhibitions.
 Outreach & communication plan and dissemination report (II) Result description These might include scientific conferences, developer workshops or symposia as well as large cybersecurity fairs and exhibitions.