Catalogue of Projects

What's the cyberwatching.eu Catalogue of Services?

Europe is the world leader for Cybersecurity Research and Innovation (R&I) activities. The Catalogue of Services collects together all this expertise in one place including cybersecurity & privacy R&I initiatives. The catalogue includes EC, national and regional funded projects. It is a single reference point where all projects can communicate their project objectives and disseminate results to a broad audience.

Who benefits?

SMEs, Investors, R&I projects, Cybersecurity experts.

How can you use the Catalogue of Services?

The Catalogue will serve as a comprehensive and organic view of all of the Research & Innovation (R&I) activities carried out in the EU and Associated Countries to face the growing cybersecurity & privacy challenges. By using the filters on the left you can search for initiatives by topic or vertical sector.

The Service is an opportunity to identify:

  • Relevant projects and initiatives for your business
  • Potential partners / collaborators
  • Potential investments
  • An exhaustive overview of what is going on in cybersecurity & privacy areas, Europe-wide and National-wide
  • Contact points for each project/initiative

We want your Cybersecurity and Privacy Service Offers!

If you are you an H2020 project, EU or National initiative then you need to be in this catalogue!
Complete this form to submit your initiative and showcase your excellence or contact us at info@cyberwatching.eu


 

SAINT - Systemic Analyser in Network Threats

The H2020 SAINT project examines the problem of failures in cyber security by using a multidisciplinary approach that goes beyond the purely IT technical viewpoint. 

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control

GHOST aims to deploy a highly usable and effective security framework for smart home residents. The project will apply behavioural design principles for the elaboration of a novel reference architecture for user-centric cyber security in smart home environments. This architecture will stimulate security-friendly user behaviour enforced by an unobtrusive and user-comprehensible solution.

KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services

KONFIDO is a H2020 project that aims to leverage proven tools and procedures, as well as novel approaches and cutting edge technology, in view of creating a scalable and holistic paradigm for secure inner- and cross-border exchange, storage and overall handling of healthcare data in a legal and ethical way both at national and European levels.

CIPSEC - Enhancing Critical Infrastructure Protection with innovative SECurity framework

The main aim of CIPSEC is to create a unified security framework that orchestrates state-of-the-art heterogeneous security products to offer high levels of protection in IT (information technology) and OT (operational technology) departments of CIs.

ReCRED - From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control

ReCRED will help in generating a tangible impact on the market since it will focus on demonstrating the viability of Device Centric Authentication as an aggregator for both account-based as well as attribute-based access control with associated very well specified business and exploitation plans.

SMESEC - Protecting Small and Medium-sized Enterprises digital technology through an innovative cyber-SECurity framework

Small and Medium-sized Enterprises (SMEs) are an important driver for innovation and growth in the EU. At the same time, SMEs also stand to gain the most from innovative technologies that promise convenient deployment and economical operation of ICT. Taking into account cyber-security, SMEs do not always understand all the risks and business consequences for the development of technologies without the adequate level of protection against cybercrime.

EUNITY - Cybersecurity and privacy dialogue between Europe and Japan

EUNITY project aims at fostering the cyber-security dialogue between Europe and Japan. It will study the research opportunities on cyber-security to elicit common topics of interest where joint research and development would be beneficial for both regions.

ANASTACIA - Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures

The main ANASTACIA objective is to provide security and trust on ICT systems by properly managing the constant and continuous discovery of vulnerabilities. ANASTACIA will adopt a holistic security framework addressing all the stages of the ICT systems development lifecycle. The ANASTACIA platform considers the evolution of ICT aspects such as information security, technologies and discovery of novel evolving cyber-attacks

CREDENTIAL - Secure Cloud Identity Wallet

The CREDENTIAL project addresses the need for a secure and privacy-preserving cloud-based identity management and data-sharing platform. The project puts users in full control of the data and attributes they want to share, while keeping their data hidden from the cloud provider, thus giving high authenticity guarantees to its data receivers.

COLA - Cloud Orchestration at the Level of Application

The overall objective of the COLA project is that by building on and extending current research results, it will define and provide a reference implementation of a generic and pluggable framework that supports the optimal and secure deployment and run-time orchestration of cloud applications. COLA will demonstrate the applicability and impact of the solution via large scale near operational level SME and public sector pilots and demonstrators, and will also define a clear pathway how the innovation can be delivered to the market.

Pages

Filter Catalogue

News

TYPES: helping users in the current quest for privacy & data protection

Types aims to safeguard the individual’s privacy and put them in control of how their data is handled by providers for commercial or advertising purposes. Types also allows users to verify in a simple way if their online rights are adequately safeguarded and if personal data is exchanged for useful reason, and namely to deliver added-value to the end-user.