Projects overview

Sort by

Show more information
Description The outputs of SWForum include: 1 Cross-fertilization workshops between the areas of software, digital infrastructures, and cybersecurity, 2 A self-sustainable forum of researchers and practitioners supported
 Landscape Reports - v1 Result description These set of reports will present the results from the analysis on software digital infrastructures and cybersecurity This is the result of Task 31
 Landscape Reports - v2 Result description These set of reports will present the results from the analysis on software digital infrastructures and cybersecurity This is the result of Task 31
Show more information
Description Tackling conflicting trends in the cybersecurity market, like fragmentation or vendor lock-ins, GUARD will develop an open and extensible platform for advanced assurance and protection of trustworthy and
 Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools Result title Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools
Show more information
Description develop novel methodologies that allow better understanding the factors affecting online behaviour related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity
 TFM Master in Cybersecurity, “Análisis y Evaluación de Sistemas de Autenticación para Smart Personal Assistants”, Result title TFM Master in Cybersecurity, “Análisis y Evaluación de Sistemas de Autenticación para Smart Personal Assistants”,
Show more information
Description The deployment of IDUNN will (i) increase trust in ICT for both IT and OT, (ii) decrease person effort to ensure cybersecurity operations, (iii) increase response and lower recovery time, and above all
 Overview of existing standards and ongoing standardization activities in the field of cybersecurity Result title Overview of existing standards and ongoing standardization activities in the field of cybersecurity
Show more information
Description The project will consider AI-enabled security solutions to provide a better prediction of cybersecurity threats and related risks towards an efficient and dynamic incident management and optimise collaborative
Organisation AIRBUS CYBERSECURITY SAS (ACS)
Show more information
 Review of cybersecurity legislation in eight countries and gap analysis Result title Review of cybersecurity legislation in eight countries and gap analysis Result description Review of cybersecurity legislation in eight countries and gap analysis R PU ISF M16This task is based exclusively on publicly available legislation and publicly available strategy documents It does not
Show more information
 Cybersecurity and privacy Criteria Catalogue for assurance and certification Result title Cybersecurity and privacy Criteria Catalogue for assurance and certification
 Summary of existing trustworthiness seals and labels Result description Cybersecurity & Privacy indicators used in existing security seals and labels, collected through surveys and desktop research analysis.
Show more information
 A Systematic Review of Recommender Systems and Their Applications in Cybersecurity Result title A Systematic Review of Recommender Systems and Their Applications in Cybersecurity
 Post-event analysis and auditing Result description This deliverable includes the specification deployment and testing of the procedures for postevent analysis and auditing as well as the knowledge base of postevents and cybersecurity incidentsAn accompanying
Show more information
 SMESEC: A Cybersecurity Framework to Protect, Enhance and Educate SMEs Result title SMESEC: A Cybersecurity Framework to Protect, Enhance and Educate SMEs
 Periodic Reporting for period 2 - SMESEC (Protecting Small and Medium-sized Enterprises digital technology through an innovative cyber-SECurity framework) Result description If we add that SMEs have usually no expertise or resources for cybersecurity, it is a recipe for disaster. Examples...
Show more information
 How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project Result title How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project
 Periodic Reporting for period 2 - COMPACT (COmpetitive Methods to protect local Public Administration from Cyber security Threats) Result description "The cybersecurity landscape is changing, and Local Public Administrations (LPAs) are now an attractive target for cybercriminals.
Show more information
 SHIELD: A novel NFV-based cybersecurity framework Result title SHIELD: A novel NFV-based cybersecurity framework
 Interim report on Exploitation Activities Result description This Deliverable will provide an initial report on SHIELD exploitation activities including: analysis of global cybersecurity market and environment, identification of SHIELD positioning in the market
Show more information
 Challenges in Cybersecurity and Privacy - the European Research Landscape Result title Challenges in Cybersecurity and Privacy - the European Research Landscape
 A set of standards stemming from the application of cybersecurity technologies on SMEs.v1 Result description A report on the corresponding standards stemming the application of cybersecurity technologies on SMEs (updated at M12, M24 and M36)
Show more information
 Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review Result title Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review
 Periodic Reporting for period 2 - ASCLEPIOS (Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare) Result description The ASCLEPIOS proposal identified three key cybersecurity challenges. (1) Many of the existing cybersecurity approaches fail to protect users’ data against attacks that originate from inside and/or external
Show more information
 Report on cybersecurity framework design & specifications for data protection & privacy v1 Result title Report on cybersecurity framework design & specifications for data protection & privacy v1
 Report on cybersecurity framework design & specifications for data protection & privacy v2 Result description This deliverable is an update of D25 documenting the final cybersecurity framework as it has evolved and finetuned along the development of the system
Show more information
 Guidelines for railway cybersecurity design Result title Guidelines for railway cybersecurity design
 Security architecture, protection profiles and security for legacy systems Result description This deliverable comprises also the results of the application of the cybersecurity railway processes to other systems of the railway sector.
Show more information
 Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments Result title Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments
 Open modular system architecture and tools - first version Result description and protocols will be defined in detail for all the project communication needs meaning per WP1 Use Case as each of them will be implemented in each SHOW test site Functional requirements of dashboard cybersecurity
Show more information
 A holistic framework for Autonomous shipping safety, security/cybersecurity assurance Result title A holistic framework for Autonomous shipping safety, security/cybersecurity assurance
 Functional/Operational requirements and KPIs - Gaps and barriers for scaling up Result description It will holistically base the analysis on the logistic supply chain requirements over safety, security/cybersecurity, operational performance, environmental footprint, societal acceptance and economics