R&I Project Hub

Home » R&I Project Hub

The Cyberwatching.eu PROJECT HUB is Europe’s ONLY complete and unabridged compilation of EU-funded research projects on cybersecurity topics. It was created specifically to facilitate information transfer, communication and cross-pollination.

Browse the categories to:

  • IDENTIFY individual projects
  • ACCESS project information
  • CONNECT with the researchers

Project pages are independently populated and managed. How much information you find depends on the project owner.
In addition to reports and information, project owners may use the PROJECT HUB to publish news and events and interact with users.

To populate, manage and promote your own project page and participate in the debate, click here

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

UNICORN

Unicorn aims to simplify the design, deployment and management of secure and elastic–by design- multi-cloud services

TYPES

TYPES aims to cope with this challenge by defining, implementing, and validating in pre-market status a holistic framework of technologies and tools that guarantees both transparency and privacy preservation, gives the end user control upon the amount of information he/she is willing to share, and defines privacy-by-design solutions.

Trusted Cloud

Trusted Cloud provides cloud solutions and services to gain greater control over sensitive and personal data. This initiative is a European solution to store digital data and contents, so that consumers and businesses in Europe do not have to worry on where and by whom their valuable digital age assets are handled. 

TRUESSEC.EU

The assurance of security, privacy, reliability and safety features is key-point to unlock the enormous potential that the connected vehicles systems paradigm i.e., the dynamic Cyberphysical system of highly-equipped infrastructure-connected vehicles with numerous third-party components, can offer towards safer transportation. The emerging systems expose a variety of wireless-communication and hardware interfaces which result in a large attack surface.

TREDISEC

The current trend for data placement shows a steady shift towards 'the cloud'. The advent of cloud storage and computation services however comes at the expense of data security and user privacy. To remedy this, customers nowadays call for end-to-end security whereby only end-users and authorized parties have access to their data and no-one else. This is especially true after the outbreak of data breaches and global surveillance programs last year.

TOREADOR

The TOREADOR project is aimed at overcoming some major hurdles that until now have prevented many European companies from reaping the full benefits of Big Data analytics (BDA). Companies and organisations in Europe have become aware of the potential competitive advantage they could get by timely and accurate Big Data analytics, but lack the IT expertise and budget to fully exploit BDA.

THREAT-ARREST

Overview

SysSec

Over the past decade we are witnessing an ever-increasing amount of cyberattacks on the Internet. Prolific, ingenious, and ranging in style from large-scale worms to 'below the radar' phishing attempts, cyberattacks have evolved to unprecedented levels of sophistication. To counter these cyberattacks, defenders are (mostly) developing safeguards, after the attack was made. In the meantime, while defenders are busy with mending the fences, attackers had already developed and planned their next strike

SURPRISE

Wireless networks transform our environments into smart ones: ubiquitous medical services, smart energy production & distribution, automated logistics chains, smart buildings, more effective tactical operations, more efficient and safer transportation. We have every reason to embrace smart environments but without new dangers for the systems and their users.

SUPERCLOUD

SUPERCLOUD researches and develops new security and dependability infrastructure management paradigm. Our approach is on one hand, User-Centric for self-service clouds-of-clouds, i.e., customers can define their own protection requirements and avoid provider lock-ins. On the other hand we focus on Self-Managed services for self-protecting clouds-of-clouds which can reduce administration complexity through automation.

Pages

Future Events

Supporting Specialised Skills Development: Big Data, Internet of Things and Cybersecurity for SMEs (EASME/COSME/2017/007)

19/11/2019

Block your calendar on 19th of November at 11:00 AM CET!

19/11/2019

Deliverables Research

This deliverable is the first in a series of publications over the duration of the cyberwatching.eu project, related with to methodology for the classification of projects/services and their Market Readiness.

We present in this report a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

This document presents a view of the European cyber security and privacy research and innovation ecosystem with a view of getting input and feedback via a survey and the concertation meeting held on 26 April 2018 in Brussels.
A key component of developing this deliverable was to target research projects in the field of cyber security in the current cyber security framework. To this aim, a survey was sent out to projects in cyber security in the EU. All the projects were also invited to the First Concertation Meeting, which was held on 26 April 2018 in Brussels. Feedback from that first Concertation meeting is included in this deliverable.

One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.