Home » R&I Project Hub

R&I Project Hub

 

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate.

Manage and update your project's mini-page now!

Be one of the featured Project of the Week and get extra visibility to showcase the latest developments, reports, events, news and results to a wider pool of stakeholders.

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

KRAKEN Project

KRAKEN develops a trusted and secure personal data platform with state-of-the-art privacy aware analytics methods, guaranteeing on metadata privacy, including query privacy.

GEIGER

GEIGER - easy and affordable cybersecurity solution for small businesses

Businesses are increasingly going digital. This also increases the likelihood of cyber incidents.

It's crucial to be aware of your risks related to cybersecurity & data protection – and to take the right steps to reduce them. There are plenty of solutions available, but they don't match the needs of small businesses that often have no IT expertise or resources to invest in costly solutions.

SPHINX

Overview

SPHINX aims to introduce a Universal Cyber Security Toolkit, thus enhancing the cyber protection of Health IT Ecosystem and ensuring the patient data privacy and integrity. It will also provide an automated zero-touch device and service verification toolkit that will be easily adapted or embedded on existing, medical, clinical or health available infrastructures.

FutureTPM

With the emergence of the Internet of Things (IoT), industry’s digital transformation has begun by bringing new challenges. Security is one of the main concerns, due in part to recent developments in quantum computing.

UP2DATE

The overall UP2DATE goal is to provide a new software paradigm for SASE Over-the-Air software updates for Mixed-Criticality Cyber-Physical Systems (MCCPS).

EnergyShield

EnergyShield captures the needs of Electrical Power and Energy System (EPES) operators and combines the latest technologies for vulnerability assessment, supervision and protection to draft a defensive toolkit. The toolkit combines the latest technologies for automated threat modelling and security behaviour analysis, anomaly detection and DDoS mitigation and security information and event management) The results will be validated and demonstrated in two locations: Italy (offline pilot) and Bulgaria, 

The objectives of the project are to: 

ASCLEPIOS

The vision of ASCLEPIOS is to maximize and fortify the trust of users on cloud-based healthcare services by developing mechanisms for protecting both corporate and personal sensitive data. While researchers have developed many theoretical models that could enhance the security level of healthcare services, only a rudimentary set of techniques are currently in use. ASCLEPIOS is exploiting this gap by using several modern cryptographic approaches to build a cloud-based eHealth framework that protects users’ privacy and prevents both internal and external attacks.

TRINITY

ABOUT

Agility for production in Europe

The main objective of TRINITY is to create a network of multidisciplinary and synergistic local digital innovation hubs (DIHs) composed of research centers, companies, and university groups that cover a wide range of topics that can contribute to agile production: advanced robotics as the driving force and digital tools, data privacy and cyber security technologies to support the introduction of  advanced robotic systems in the production processes.

RESISTO

RESISTO, (RESIlience enhancement and risk control platform for communication infraSTructure Operators), is project funded by the European Commission under the H2020 project. RESISTO is an innovative solution for Communication Infrastructure providing holistic (cyber/physical) situation awareness and enhanced resilience.

SECONDO

SECONDO will support professionals who seek cyber security investments, developed to support human decision making, and a complete well-founded security strategy. This is a timely research problem, as the rapid growth of cyber-attacks is expected to continue its upwards trajectory. 

Pages

News

In the last few years, cyber security has become more of a priority for all types of organisations than ever before.

Future Events

The European Cybersecurity Competence Centre (ECCC), with the support of ECCO, launches “The Info Days”, a series of events to share information on important European calls and funding opportunities. The second event, organised in cooperation with the Swedish National Coordination Centre, will be held on 16 June 14:00 – 16:00 in Stockholm, as a side event of the Digital Assembly(15 – 16 June).

16/06/2023

Deliverables Research

This deliverable presents the results of the analysis of the Cybersecurity and Privacy European research projects and their results, including the characterisation of the projects comprised in the Project Radar, the analysis of the Market and Technology Readiness Levels (MTRL)

The Cyberwatching.eu team present in this report a series of visualisations of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies.

This deliverable (August 2020) presents a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.