Projects overview

Sort by


Show more information
Organisation AIRBUS CYBERSECURITY SAS (ACS)
 The Cybersecurity Project - FORESIGHT, in an advanced stage of its activities. Result title The Cybersecurity Project - FORESIGHT, in an advanced stage of its activities.
 Outreach & communication plan and dissemination report (I) Result description These might include scientific conferences, developer workshops or symposia as well as large cybersecurity fairs and exhibitions.
 Outreach & communication plan and dissemination report (II) Result description These might include scientific conferences, developer workshops or symposia as well as large cybersecurity fairs and exhibitions.
Show more information
Description The founding team brings extensive experience in the fields of cybersecurity, scalable software architecture, software company leadership and SME growth.
 Periodic Reporting for period 1 - SecIoT (Cybersecurity Threat Detection for Internet of Things Connected Devices) Result title Periodic Reporting for period 1 - SecIoT (Cybersecurity Threat Detection for Internet of Things Connected Devices)
Show more information
Description develop novel methodologies that allow better understanding the factors affecting online behaviour related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity
 TFM Master in Cybersecurity, “Análisis y Evaluación de Sistemas de Autenticación para Smart Personal Assistants”, Result title TFM Master in Cybersecurity, “Análisis y Evaluación de Sistemas de Autenticación para Smart Personal Assistants”,
Show more information
Description While a lot is being done, certain environments, in particular in the IoT area, are receiving little attention by cybersecurity experts.
 Periodic Reporting for period 1 - rev.ng (rev.ng: a tool for security assessments of emerging and legacy platforms) Result description In fact, one of the key principles in cybersecurity is to avoid the so-called "security through obscurity", which means that a system...
Show more information
Description Given the accelerating growth and importance of cybersecurity across many sectors of the economy and society, we have detected and aim to solve the lack of effective security provision in software engineering
 Periodic Reporting for period 1 - SCR (Disruptive Cybersecurity SaaS for SMEs and freelance developers) Result title Periodic Reporting for period 1 - SCR (Disruptive Cybersecurity SaaS for SMEs and freelance developers)
Show more information
Description SIGAGuard is a next generation cybersecurity technology measuring low-level electric signals in order to detect at an early stage cybersecurity threats and operational anomalies in ICS-SCADA systems.
 Periodic Reporting for period 1 - SIGAGuard (Cybersecurity anomaly detection solution for critical infrastructures) Result title Periodic Reporting for period 1 - SIGAGuard (Cybersecurity anomaly detection solution for critical infrastructures)
Show more information
Description Our business opportunity is promising, with the European market of cybersecurity to reach €38.10 billion and the specific market of security testing solutions valued at €2.71 billion in 2022.
 Periodic Reporting for period 1 - V-SPHERE (Vulnerability Search and Prevention through Holistic End-to-end Risk Evaluation) Result description PROSA’s V-Sphere is a holistic cybersecurity tool allowing clients to keep their IT systems secure and generate comprehensive security reports.
Show more information
Description Moreover, the advent of more “intelligent” cybersecurity solutions, which make use of technologies like machine learning, statistical analysis and user behaviour analysis, requires sophisticated and hands-on
 Conceptualization of a CyberSecurity Awareness Quiz Result title Conceptualization of a CyberSecurity Awareness Quiz
Show more information
Description PHOENIX will realise 3 strategic goals: (1) Strengthen EPES cybersecurity preparedness by employing security a) “by design” via novel protective concepts for resilience, survivability, self-healing and
 Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements Result title Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements
Show more information
Description The deployment of IDUNN will (i) increase trust in ICT for both IT and OT, (ii) decrease person effort to ensure cybersecurity operations, (iii) increase response and lower recovery time, and above all
 Overview of existing standards and ongoing standardization activities in the field of cybersecurity Result title Overview of existing standards and ongoing standardization activities in the field of cybersecurity
Show more information
Description Tackling conflicting trends in the cybersecurity market, like fragmentation or vendor lock-ins, GUARD will develop an open and extensible platform for advanced assurance and protection of trustworthy and
 Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools Result title Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools
Show more information
Description Furthermore, according to EC Cybersecurity research ransomware attacks have increased by 300% since 2015.
 Periodic Reporting for period 1 - TrueProactive (ROMAD TrueProactive - a next generation cyber defence software for European SMEs) Result description The End Point Detection and Response market is a new and competitive landscape where new companies can succeed with innovation in the technologies and process that legacy cybersecurity companies have fail
Show more information
Description C4IIoT will build and demonstrate a novel and unified IIoT cybersecurity framework for malicious and anomalous behavior anticipation, detection, mitigation, and end-user informing.
 Periodic Reporting for period 2 - C4IIoT (Cyber security 4.0: protecting the Industrial Internet Of Things) Result description C4IIoT novel cybersecurity mechanisms are orchestrated across all infrastructure elements involved within an...
Show more information
Description AllPriv is developing next generation nomadic cybersecurity set to entirely disrupt the way data privacy is protected out of the office.
 Periodic Reporting for period 1 - LPS (For a full data privacy on the go.) Result description Allpriv is a cybersecurity company involved in efficient nomadic data privacy protection.Employees working out of office in situations like:- Telework, occasionally or permanent.
Show more information
Description The cybersecurity panorama is alarming: cyberattacks in EU are costing businesses approx. €208 billion/year (1.6% of GDP), i.e. around €1.6 to €10.8 million per company.
 Periodic Reporting for period 1 - ADVERSARY (Digital platform for hands-on cybersecurity training) Result title Periodic Reporting for period 1 - ADVERSARY (Digital platform for hands-on cybersecurity training)
Show more information
Description The outputs of SWForum include: 1 Cross-fertilization workshops between the areas of software, digital infrastructures, and cybersecurity, 2 A self-sustainable forum of researchers and practitioners supported
 Landscape Reports - v1 Result description These set of reports will present the results from the analysis on software digital infrastructures and cybersecurity This is the result of Task 31
 Landscape Reports - v2 Result description These set of reports will present the results from the analysis on software digital infrastructures and cybersecurity This is the result of Task 31
Show more information
Description Complete cybersecurity in the health sector is unachievable, and would exceed financial means; nevertheless, vital steps can be taken to minimize the risk of cyber- attacks against healthcare facilities
 Common Cybersecurity Threats In Healthcare Result title Common Cybersecurity Threats In Healthcare
Show more information
Description DWC integrates the development of digital solutions in a dedicated guiding protocol to cover the existing gaps regarding ICT governance, interoperability, ontology and cybersecurity.
 Water-Tight IoT–Just Add Security Result description there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.Authors: Bour, Guillaume et al.Journal title: Journal of Cybersecurity