R&I Project Hub

Home » Projects » Node » R&I Project Hub

DEFENDER - Defending the European Energy Infrastructures

Critical Energy infrastructures (CEI) protection and security are becoming of utmost importance in our everyday life. However, cyber and system-theoretic approaches fail to provide appropriate security levels to CEIs, since they are often used in isolation and build on incomplete attack models, resulting in silos-like security management fragmented operational policies.

GUARD

A cybersecurity framework to GUArantee Reliability and trust for Digital service chains

Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures

In the digital era, Critical Infrastructures (CIs) are operating under the premise of robust and reliable ICT components, complex ICT infrastructures and emerging technologies (e.g. IoT, Cloud Computing, Big Data) and are transforming into Critical Information Infrastructures (CIIs) that can offer a high degree of flexibility and efficiency in the communication and coordination of advanced services and processes.

CE-IoT

The overall aim of CE-IoT is to develop an innovative framework of interplay between Circular Economy and IoT, to explore novel ways in which this interaction can drastically change the nature of products, services, business models and ecosystems.

The CE-IoT framework will be bi-dimensional and bi-directional in terms of circularity aiming to develop:

SAWSOC

SAWSOC aims at bringing a significant advancement in the convergence of physical and logical security, meaning effective cooperation (i.e. a coordinated and results-oriented effort to work together) among previously disjointed functions. Recently some achievements have been made (e.g. SEM and SIM have merged into SIEM, and LACS and PACS have merged into IM), Security Operations Center (SOC) technology has improved significantly, but much is yet to be done.

U2PIA

Nier Soluzioni Informatiche (NSI), with the support of Orlandi-Leone Studio Legale, launched U2PIA, a disruptive cloud platform designed to enable the creation of in-depth analysis of the risks which Personal Data are subject to through a Privacy Impact Assessment (PIA).

SocialPrivacy

The SocialPrivacy project aims to understand the issues of privacy at the level of users, commercial enterprises and society (Diagnostic Phase) and then to propose solutions (Generative Phase) which help manage the trade-offs inherent in allowing companies to access users’ personal data, while providing sufficient privacy safeguards.

SecIoT

The IoT refers to ordinary objects – other than computers, phones and tablets – having an internet connection. Among countless others, these typically include home appliances, medical devices and utilities meters. Although the connections are convenient, they are built using so many communications technologies, for so many purposes, that security levels vary greatly. Many connections are highly insecure and vulnerable to hacking. Such cyberattacks have already brought about severe consequences.

REVEN-X1

TETRANE wants to further develop REVEN®, a product that automatically discovers, characterizes and helps solving nearly any software flaw that could be exploited by malicious hackers. REVEN represents the only answer to a growing social issue: cybersecurity for critical infrastructure and loss of revenue due to cyberattacks.

REVEN helps to anticipate threats by directly analysing executable binaries (source code is not needed) thanks to the mathematical simulation of processors’ physical structures. Before REVEN, it was considered impossible.

Pages