Home » R&I Project Hub

R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Click here for practical guidance on "How to manage your project minisite", and "How to add your project to the European Cybersecurity Radar." 

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

COBALT

COBALT proposes the introduction of a Common Certification Model (CCM) for European industries, leveraging existing standards and composing a unified cybersecurity namespace for ICT processes. The proposal will uphold the paradigm of Digital Twinning (DT) via the creation of Digital Threads and extend it in a vertical agnostic approach across different industries, including Quantum computing (involving FHG’s Quantum Computer) and I4.0.

CUSTODES

Cybersecurity certification as introduced by the EU Cybersecurity Act (EUCSA) will play a crucial role in increasing the trust to and security of ICT Products, ICT Services and ICT Processes. Cybersecurity certification is a complex process, posing a variety of challenges to the different interested parties.

CERTIFAI

According to the EU Cyber Resilience Act, “hardware and software products are increasingly subject to successful cyberattacks, leading to an estimated global annual cost of cybercrime of EUR 5.5 trillion by 2021”. This is due to a low level of cybersecurity, reflected by widespread vulnerabilities and inadequate approaches for identifying and mitigating the rapidly and constantly evolving cyber threats and vulnerabilities, as well as ensuring continuous compliance with regulations, industry standards, and best practices.

EMERALD

Cloud-based services have grown from basic computing services to complex ecosystems, comprising (virtual) infrastructure, business processes and application code. These advanced services also increasingly leverage the usage of Artificial Intelligence, including Machine Learning or Natural Language Processing techniques, raising the complexity even higher. Due to the cascade of dependencies among the different products and services, the need arose to bring more agility to the certification process of cloud-based services, e.g.

CyberSecDome

Organisations across the sectors significantly benefit from digital transformation to support evolving business models, services and customer experience. Despite the benefits of digital infrastructure adoption, there are numerous security challenges that could pose any digital disruption and risks for the critical service delivery and overall business continuity.

COCOON

The convergence of Information Technology (IT) with Operational Technology (OT) environments for digitising mission-critical stability and flexibility of Electrical Power and Energy System (EPES) operations as well as new Ancillary Services (AS) business markets through Distributed Renewable Energy Sources (DRES), has undoubtedly expanded the cyber-attack spectrum in modern power grids with intrinsic cyber-physical properties.

QUBIP

The exciting frontiers opened by the development of quantum computers (QC) come at the cost of breaking the foundations of current digital security. The research community is working to the definition of post-quantum cryptography (PQC) to counteract this threat. However, the transition to PQC is delicate and takes time because it impacts many functions, algorithms, and protocols in a-priori unknown cascade of dependencies.

PQ-REACT

In the last three decades, public key cryptography has become an indispensable component of global communication digital infrastructure. These networks support a plethora of applications that are important to our economy, our security, and our way of life, such as mobile phones, internet commerce, social networks, and cloud computing. In such a connected world, the ability of individuals, businesses and governments to communicate securely is of the utmost importance.

DOSS

DOSS elaborates a secure-by-design methodology and implements related technology for complex IoT architectures, based on supply chain monitoring, component testing and architecture modelling.

Sec4AISec

With AI-enhanced components being deployed everywhere, including the very toolchains used for secure software development, the traditional security focus on software and hardware assets can no longer guarantee “secure services, processes and products, [and] digital infrastructures” in the EU Strategic Plan 2021-2024.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.

Deliverables Research

This deliverable presents the results of the analysis of the Cybersecurity and Privacy European research projects and their results, including the characterisation of the projects comprised in the Project Radar, the analysis of the Market and Technology Readiness Levels (MTRL)

The Cyberwatching.eu team present in this report a series of visualisations of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies.

This deliverable (August 2020) presents a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.