Home » R&I Project Hub » Node » R&I Project Hub

R&I Project Hub

SAFECARE

Over the last decade the European Union has faced numerous threats that quickly increased in their magnitude, changing the lives, the habits and the fears of hundreds of millions of citizens. The sources of these threats have been heterogeneous, as well as weapons to impact the population. As Europeans, we know now that we must increase our awareness against these attacks that can strike the places we rely upon the most and destabilize our institutions remotely. Today, the lines between physical and cyber worlds are increasingly blurred.

CitySCAPE

The Challenge

The traditional security controls and security assurance arguments are becoming increasingly inefficient in supporting the emerging needs and applications of the multimodal transport systems, allowing threats and security incidents to disturb all dimensions of transportation. Therefore, the enormous potential of the multimodal ecosystem, namely a more efficient transportation, which lies on the extent to which it globally remains cyber-secure, is becoming vulnerable.

M-Sec

M-Sec is an EU&JP R&D Project co financed by the European Commission under the H2020 programme and the National Institute of Information and communications - National Research and Development Agency specialized in the field of information and communications technology that promotes innovation and research in Japan.

CPSoSAWARE

CPSoSaware will contribute to all expected impact areas set out in H2020 ICT-01-2019 Computing technologies and engineering methods for cyber-physical systems of systems under the topic of Models, tools and methods for design-operations continuum of dependable CPSoS, as explained below (the text in the left column refers to H2020 Work programme document and is provided for reference).

INSPIRE-5Gplus

The next-generation of telecom networks (fifth generation or 5G) is expected to unleash a massive Internet of Things (IoT) where networks can serve billions of connected devices. Improving security of 5G and Beyond networks is necessary. The EU-funded INSPIRE-5Gplus project will introduce novel solutions and paradigms to make maximum use of artificial intelligence (AI), machine learning (ML) and Blockchains. The overall aim of the project is to deliver unique assets to achieve intelligent and trusted multi-tenancy (confident, evidence-based and liable) across multi-tenants’ infrastructure.

DAN

The Dark Web is a haven for criminals. It has become a forum and marketplace for weapons, drugs, organs, illicit pornography, software exploits, stolen private data, passwords, credit card details, counterfeit products and money. Illegal services are offered, like phishing, cyber-attacks, murder and rape for hire and money laundering.

MALAGA

The rise of connectivity and automation technology is creating more and more opportunities in many fields. Connected and autonomous vehicles (CAV) is a field widely affected by these technology advancements. While innovation is disrupting business standards and encouraging investments, it is also at risk of cybersecurity attacks.

RADDICS

This ERC project pushes the boundary of reliable data-driven decision making in cyber-physical systems (CPS), by bridging reinforcement learning (RL), nonparametric estimation and robust optimization. RL is a powerful abstraction of decision making under uncertainty and has witnessed dramatic recent breakthroughs. Most of these successes have been in games such as Go - well specified, closed environments that - given enough computing power - can be extensively simulated and explored.

CYBERSECURITY

A recent wave of cyberattacks has made it evident that cybercrime is a growing global concern. Numerous threats such as malware infections, phishing attempts and identity thefts can have disastrous consequences for citizens, firms and nations. Cybercrime, defined as crimes where expertise about cyberspace is used to violate the law, is an increasing threat due to criminals’ creativity, faster digitization, growing dependence on technologies and huge data accumulation.

ODIX 2.0

Incoming files present one of the most serious threats to every corporate network. Cyber attackers have the knowledge and resources to implement highly sophisticated attacks using various methods such as encrypted and distributed malware attacks, zero-day attacks and more. These are delivered via files which are introduced into the target network by various channels, including email, removable media, and web download. Malware attacks can create serious damage to the organization but current available defensive measures fail to provide any protection against such attack.

Pages