A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | id | name | rcn | type | ending | title | teaser | quadrant | ring | TRL | MRL | Score | Median | Performance | Min | Max | cwurl | ||||||||||
2 | 1 | AARC2 | Dec 2464 | RIA | Apr 2019 | Authentication and Authorisation For Research and Collaboration | The goal of AARC2 is to design an AAI framework to develop interoperable AAI, to enable researchers to access the whole research and infrastructure service portfolio with one login. AARC2's objectives are:1. enable federated access in research communities participating in... | Secure Systems | Hold | https://cyberwatching.eu/projects/929/aarc-2 | |||||||||||||||||
3 | 4 | AEGIS | Jul 2475 | CSA | Apr 2019 | Accelerating EU-US DialoGue for Research and Innovation in CyberSecurity and Privacy | AEGIS aims to strengthen dialogues between Europe and the US, in order to facilitate exchange of views, policies and best practices to stimulate cooperation around cybersecurity and privacy R&I, and contribute in shaping the future global cybersecurity and privacy... | Cybersecurity Governance | Hold | https://cyberwatching.eu/projects/932/aegis | |||||||||||||||||
4 | 5 | ANASTACIA | Apr 2467 | RIA | Dec 2019 | Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures | The main objective of the ANASTACIA is to address the constant discovery of vulnerabilities in ICT components providing assurance that ICT systems are secure and trustworthy by design. To this end, ANASTACIA will research and develop a holistic security framework, which will... | Verification & Assurance | Adopt | 6 | 3 | 33 | 21 | 12 | -12 | 12 | https://cyberwatching.eu/projects/934/anastacia | ||||||||||
5 | 6 | ARIES | Nov 2454 | RIA | Feb 2019 | reliAble euRopean Identity EcoSystem | ARIES main goal is to deliver a comprehensive framework for reliable e-identity ecosystem comprising new technologies, processes and security features that ensure highest levels of quality in eID based on trustworthy security documents and biometrics for highly secure and... | Secure Systems | Hold | https://cyberwatching.eu/projects/935/aries | |||||||||||||||||
6 | 7 | ARMOUR | Jan 2445 | RIA | Jan 2018 | Large-Scale Experiments of IoT Security Trust | The Internet-of-Things (IoT) is rapidly heading for large scale meaning that all mechanisms and features for the future IoT need to be especially designed and duly tested/certified for large-scale conditions. Also, Security, Privacy and Trust are critical elements of the IoT... | Secure Systems | Drop | https://cyberwatching.eu/projects/937/armour | |||||||||||||||||
7 | 8 | ASAP | Jun 2188 | ERC-AG | Sep 2018 | Adaptive Security and Privacy | With the prevalence of mobile computing devices and the increasing availability of pervasive services, ubiquitous computing (Ubicomp) is a reality for many people. This reality is generating opportunities for people to interact socially in new and richer ways, and to work mor... | Human Aspects | Hold | ||||||||||||||||||
8 | 9 | ATENA | Dec 2454 | IA | Apr 2019 | Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures | Over recent years, Industrial and Automation Control Systems (IACS) adopted in Critical Infrastructures (CIs) have become more complex due to the increasing number of interconnected devices, and to the large amount of information exchanged among system components. With the... | Operational Risk | Hold | https://cyberwatching.eu/projects/939/atena | |||||||||||||||||
9 | 12 | C3ISP | Dec 2454 | IA | Sep 2019 | Collaborative and Confidential Information Sharing and Analysis for Cyber Protection | C3ISP mission is to define a collaborative and confidential information sharing, analysis and protection framework as a service for cyber security management. C3ISP innovation is the possibility to share information in a flexible and controllable manner inside a collaborative... | Operational Risk | Adopt | https://cyberwatching.eu/projects/942/c3isp | |||||||||||||||||
10 | 13 | CANVAS | Dec 2454 | CSA | Aug 2019 | Constructing an Alliance for Value-driven Cybersecurity | The growing complexity of the digital ecosystem in combination with increasing global risks entail the danger that enforcing cybersecurity may bypass other fundamental values like equality, fairness or privacy, whereas downplaying cybersecurity would undermine citizens’... | Cybersecurity Governance | Adopt | 9 | 3 | 39 | 49 | -10 | -10 | 14 | https://cyberwatching.eu/projects/1267/canvas | ||||||||||
11 | 14 | certMILS | Apr 2467 | IA | Dec 2020 | Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats | certMILS develops a security certification methodology for Cyber-physical systems (CPS). CPS are characterised by safety-critical nature, complexity, connectivity, and open technology. A common downside to CPS complexity and openness is a large attack surface and a high degree... | Cybersecurity Governance | Assess | https://cyberwatching.eu/projects/945/certmils | |||||||||||||||||
12 | 15 | CHOReVOLUTION | Aug 2431 | RIA | Dec 2017 | Automated Synthesis of Dynamic and Secured Choreographies for the Future internet | The Future Internet (FI) represents an age of unprecedented opportunities for social, economic, and business growth thanks to the global scale connectivity of the virtual as well as of the physical world. This indeed opens up a wealth of innovative and revolutionary real-life... | Secure Systems | Drop | https://cyberwatching.eu/projects/946/chorevolution | |||||||||||||||||
13 | 16 | CIPSEC | Dec 2454 | IA | Apr 2019 | Enhancing Critical Infrastructure Protection with innovative SECurity framework | In recent years, the majority of the world's Critical Infrastructures CIs evolved to become more flexible, cost efficient and able to offer better services and conditions for business opportunities. Towards this evolution, CIs and companies offering CI services had to adopt... | Secure Systems | Hold | https://cyberwatching.eu/projects/947/cipsec | |||||||||||||||||
14 | 17 | CITADEL | Dec 2454 | IA | May 2019 | Critical Infrastructure Protection using Adaptive MILS | Critical infrastructures (CI) rely on complex safety- and security-critical ICT systems placed into unpredictable environments and forced to cope with unexpected events and threats while exhibiting safe adaptive behavior. Recent security trends stress continuous adaptation to... | Secure Systems | Adopt | https://cyberwatching.eu/projects/948/citadel | |||||||||||||||||
15 | 18 | CLARUS | Jul 2431 | RIA | Dec 2017 | A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD | Although cloud computing offers many benefits, security issues such as confidentiality and privacy are still major concerns to those intending to migrate to the cloud. Traditional cloud security has been based on assurance to customers that cloud providers follow sound... | Secure Systems | Drop | https://cyberwatching.eu/projects/949/clarus | |||||||||||||||||
16 | 19 | CloudSocket | Oct 2431 | RIA | Dec 2017 | Business and IT-Cloud Alignment using a Smart Socket | Business and IT Alignment is important challenge, as we are facing a dramatic change in the way we rely, depend and interact with ICT that influences our everyday life. Although “digital natives” will soon enter the workforce, there is still a huge gap between the business... | Secure Systems | Drop | https://cyberwatching.eu/projects/950/cloudsocket | |||||||||||||||||
17 | 22 | COEMS | Oct 2463 | RIA | Oct 2019 | Continuous Observation of Embedded Multicore Systems | The ability to observe the internals of an execution of a computer-based system is a fundamental requirement for ultimately ensuring correctness and safe behaviour. Within COEMS (Continuous Observation of Embedded Multicore Systems) a novel observer platform with supporting... | Secure Systems | Adopt | https://cyberwatching.eu/projects/952/coems | |||||||||||||||||
18 | 24 | COMPACT | Jul 2475 | IA | Oct 2019 | COmpetitive Methods to protect local Public Administration from Cyber security Threats | Cyber threats are the most significant and growing risk for public administrations (PA). However, technological, organisational and structural issues hamper the ability, especially for local PAs (LPAs) to improve their cyber security level. Budget constraints and evolving... | Cybersecurity Governance | Adopt | 7 | 5 | 49 | 49 | 0 | -10 | 14 | https://cyberwatching.eu/projects/954/compact | ||||||||||
19 | 26 | CREDENTIAL | Jul 2433 | IA | Sep 2018 | Secure Cloud Identity Wallet | With increasing mobility and Internet usage, the demand for digital services increases and has reached critical and high assurance domains like e-Government, e-Health and e-Business. Those domains have high security and privacy requirements and hence will be harnessed with... | Identity & Privacy | Hold | https://cyberwatching.eu/projects/956/credential | |||||||||||||||||
20 | 28 | CryptoCloud | Aug 2407 | ERC-AG | May 2019 | Cryptography for the Cloud | Many companies have already started the migration to the Cloud and many individuals share their personal informations on social networks. Unfortunately, in the current access mode, the provider first authenticates the client, and grants him access, or not, according to his ri... | Identity & Privacy | Adopt | ||||||||||||||||||
21 | 29 | CS-AWARE | Jul 2475 | IA | Aug 2020 | A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis | Cybersecurity is one of today's most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes... | Cybersecurity Governance | Trial | 7 | 6 | 56 | 56 | 0 | 0 | 0 | https://cyberwatching.eu/projects/959/cs-aware | ||||||||||
22 | 30 | CYBECO | Aug 2475 | RIA | Apr 2019 | Supporting Cyberinsurance from a Behavioural Choice Perspective | CYBECO will research, develop, demonstrate, evaluate and exploit a new framework for managing cybersecurity risks, one that is focusing on cyberinsurance, as key risk management treatment. CYBECO integrates multidisciplinary research methods from Behavioural Economics... | Verification & Assurance | Hold | https://cyberwatching.eu/projects/960/cybeco | |||||||||||||||||
23 | 32 | CYCLONE | Nov 2431 | IA | Dec 2017 | Complete Dynamic Multi-cloud Application Management | Application service providers (ASPs) now develop, deploy, and maintain complex computing platforms within multiple cloud infrastructures to improve resilience, responsiveness and elasticity of their applications. The CYCLONE project targets the ASPs, providing them with... | Secure Systems | Drop | https://cyberwatching.eu/projects/977/cyclone | |||||||||||||||||
24 | 33 | CYRail | Jan 2464 | Shift2Rail-RIA | Sep 2018 | Cybersecurity in the RAILway sector | Railway infrastructures are moving towards more intelligent, connected, user-centric and collaborative systems. While it brings many advantages for the industry and users, it also poses new opportunities for cyber-criminals and terrorists. CYRail aims to deliver tailored... | Operational Risk | Hold | https://cyberwatching.eu/projects/1025/cyrail | |||||||||||||||||
25 | 34 | DAPPER | May 2408 | MC-CIG | Mar 2018 | "Doing Anonymization Practically, Privately, Effectively and Reusably" | "There is currently a tug-of-war going on surrounding data releases. On one side, there are many strong reasons pulling to release data to other parties: business factors, freedom of information rules, and scientific sharing agreements. On the other side, concerns about indiv... | Identity & Privacy | Drop | ||||||||||||||||||
26 | 35 | DECODE | Jan 2465 | RIA | Nov 2019 | Decentralised Citizens Owned Data Ecosystem | Today’s Internet is becoming increasingly centralised, slowing innovation and challenging its potential to revolutionise society and the economy in a pluralistic manner. DECODE will develop practical alternatives through the creation, evaluation and demonstration of a... | Human Aspects | Adopt | 6 | 4 | 40 | 44.5 | -4.5 | -31.5 | 11.5 | https://cyberwatching.eu/projects/1037/decode | ||||||||||
27 | 36 | DEFENDER | Aug 2475 | IA | Apr 2020 | Defending the European Energy Infrastructures | Critical Energy infrastructures (CEI) protection and security are becoming of utmost importance in our everyday life. However, cyber and system-theoretic approaches fail to provide appropriate security levels to CEIs, since they are often used in isolation and build on... | Operational Risk | Adopt | ||||||||||||||||||
28 | 37 | DISCOVERY | Jun 2446 | CSA | Dec 2017 | Dialogues on ICT to Support COoperation Ventures and Europe-North AmeRica (Canada and USA) sYnergies | "DISCOVERY aims at supporting dialogues between Europe and North America (US and Canada); and fostering cooperation in collaborative ICT R&I, both under Horizon 2020 and under US and Canada funding programmes. With this purpose, DISCOVERY proposes a radically new approach to... | Cybersecurity Governance | Drop | ||||||||||||||||||
29 | 38 | DiSIEM | Dec 2454 | IA | Aug 2019 | Diversity Enhancements for SIEMs | Security Information and Event Management (SIEM) systems are a fundamental component of the ubiquitous ICT infrastructures that form the backbone of our digital society. These systems are mostly used to monitor infrastructures using many types of sensors and tools and... | Operational Risk | Adopt | https://cyberwatching.eu/projects/1040/disiem | |||||||||||||||||
30 | 40 | DOGANA | Jul 2433 | IA | Aug 2018 | aDvanced sOcial enGineering And vulNerability Assesment Framework | "The advent of Social Networks has made both companies and public bodies tremendously exposed to the so-called Social Engineering 2.0, and thus prone to targeted cyber-attacks. Unfortunately, there is currently no solution available on the market that allows neither the... | Human Aspects | Hold | 7 | 6 | 56 | 56 | 0 | 0 | 0 | https://cyberwatching.eu/projects/1042/dogana | ||||||||||
31 | 42 | e-Sides | Jun 2464 | CSA | Dec 2019 | Ethical and Societal Implications of Data Sciences | Data-driven innovation is deeply transforming society and the economy. Although there are potentially enormous economic and social benefits this innovation also brings new challenges for individual and collective privacy, security, as well as democracy and participation. The... | Identity & Privacy | Adopt | https://cyberwatching.eu/projects/1044/e-sides | |||||||||||||||||
32 | 43 | ECRYPT-CSA | Jan 2432 | CSA | Feb 2018 | European Coordination and Support Action in Cryptology | This CSA intends to strengthen European excellence in the area of cryptology and to achieve a durable integration and structuring of the European cryptography community, involving academia, industry, government stakeholders and defence agencies. The project will coordinate... | Verification & Assurance | Drop | https://www.cyberwatching.eu/projects/1045/ecrypt | |||||||||||||||||
33 | 45 | ENCASE | May 2444 | MSCA-RISE | Dec 2019 | EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors | ENCASE will leverage the latest advances in usable security and privacy to design and implement a browser-based architecture for the protection of minors from malicious actors in online social networks. The ENCASE user-centric architecture will consist of three distinct... | Secure Systems | Adopt | 6 | 2 | 26 | 47 | -21 | -25 | 2 | https://cyberwatching.eu/projects/1157/encase | ||||||||||
34 | 46 | EU-SEC | Dec 2467 | IA | Dec 2019 | The European Security Certification Framework | In recent years the ICT market has evolved toward a cloud-based approach. This shift together with the rapidly changing legal and regulatory landscape has heavily impacted security assurance, governance and compliance. The information security market players have tried to... | Cybersecurity Governance | Adopt | 7 | 5 | 49 | 49 | 0 | -10 | 14 | https://cyberwatching.eu/projects/1046/eu-sec | ||||||||||
35 | 47 | EUNITY | Jan 2475 | CSA | May 2019 | Cybersecurity and privacy dialogue between Europe and Japan | The EUNITY project addresses scope 2 (international dialogue with Japan) of objective DS-05-2016 of the H2020 work programme. This two years project aims at developing and encouraging the dialogue between Europe and Japan on cybersecurity and privacy topics. The partners... | Cybersecurity Governance | Adopt | https://cyberwatching.eu/projects/1047/eunity | |||||||||||||||||
36 | 50 | FutureTrust | Dec 2454 | IA | May 2019 | Future Trust Services for Trustworthy Global Transactions | Against the background of the regulation 2014/910/EU on electronic identification (eID) and trusted services for electronic transactions in the internal market (eIDAS), the FutureTrust project aims at supporting the practical implementation of the regulation in Europe and... | Secure Systems | Adopt | 6 | 5 | 47 | 47 | 0 | -25 | 2 | https://cyberwatching.eu/projects/1055/futuretrust | ||||||||||
37 | 51 | GenoPri | Dec 2455 | MSCA-IF-EF-ST - Standard EF | Apr 2018 | Quantifying and Protecting the Privacy of Genomic Data | Genomic data carries a lot of sensitive information about its owner such as his predispositions to sensitive diseases, ancestors, physical attributes, and genomic data of his relatives (leading to interdependent privacy risks). Individuals share vast amount of information on... | Identity & Privacy | Drop | ||||||||||||||||||
38 | 52 | GHOST | Aug 2475 | IA | Apr 2020 | Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control | To effectively respond to the multitude & complexity of cybersecurity challenges in smart-homes GHOST deploys a pioneering software-enabled ‘usable security’ solution. The project brings professional level security to the European citizens and to this end it: (a) increases... | Human Aspects | Adopt | 7 | 6 | 56 | 44.5 | 11.5 | -31.5 | 11.5 | https://cyberwatching.eu/projects/1056/ghost | ||||||||||
39 | 54 | HECTOR | Jul 2431 | RIA | Feb 2018 | HARDWARE ENABLED CRYPTO AND RANDOMNESS | A single flipped bit or a weak random number generator can cause secure systems to fail. The main objective of this proposal is to close the gap between the mathematical heaven of cryptographic algorithms and their efficient, secure and robust hardware implementations. It... | Verification & Assurance | Drop | https://cyberwatching.eu/projects/1064/hector | |||||||||||||||||
40 | 55 | HERMENEUT | Jul 2475 | RIA | Apr 2019 | Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks | IT security and risk management often ignore or underestimate the human factor (psychological, behavioural, societal, organisational and economic aspects) in the identification of cyber-risks, their quantitative economic impact and the costs of countermeasures. Cyber-attacks... | Operational Risk | Hold | 6 | 5 | 47 | 47 | 0 | 0 | 0 | https://cyberwatching.eu/projects/1068/hermeneut | ||||||||||
41 | 56 | HIPS | Jul 2416 | ERC-CG | Sep 2019 | High-Performance Secure Computation with Applications to Privacy and Cloud Security | "Secure two-party and multiparty computation has long stood at the center of the foundations of theoretical cryptography. However, in the last five years there has been blistering progress on the question of efficient secure computation. We are close to the stage that secure ... | Secure Systems | Adopt | ||||||||||||||||||
42 | 57 | IMPACT | Apr 2427 | ERC-SyG | Jan 2021 | imPACT – Privacy, Accountability, Compliance, and Trust in Tomorrow’s Internet | The Internet has evolved from a mere communication network used by tens of millions of users two decades ago, to a global multimedia platform for communication, social networking, entertainment, education, trade and political activism used by more than two billion users. This... | Operational Risk | Assess | 1 | 0 | https://cyberwatching.eu/projects/1069/impact | |||||||||||||||
43 | 58 | KONFIDO | Apr 2467 | RIA | Oct 2019 | KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services | KONFIDO advances the state of the art of eHealth technology with respect to four key dimensions of digital security, namely: data preservation, data access and modification, data exchange, and interoperability and compliance. To address the challenges of secure storage and... | Secure Systems | Adopt | 4 | 2 | 22 | 47 | -25 | -25 | 2 | https://cyberwatching.eu/projects/1070/konfido | ||||||||||
44 | 60 | LIGHTest | Dec 2456 | IA | Aug 2019 | Lightweight Infrastructure for Global Heterogeneous Trust management in support of an open Ecosystem of Stakeholders and Trust schemes. | The objective of LIGHTest is to create a global cross-domain trust infrastructure that renders it transparent and easy for verifiers to evaluate electronic transactions. By querying different trust authorities world-wide and combining trust aspects related to identity... | Secure Systems | Adopt | 7 | 5 | 49 | 47 | 2 | -25 | 2 | https://cyberwatching.eu/projects/1072/lightest | ||||||||||
45 | 62 | MAMI | Apr 2445 | RIA | Jun 2018 | Measurement and Architecture for a Middleboxed Internet | Recent revelations about large-scale pervasive surveillance of Internet traffic have led to a rapidly expanding deployment of encryption in order to protect end-user privacy. At the same time, network operators and access providers rely on increasing use of in-network... | Human Aspects | Hold | https://www.cyberwatching.eu/projects/1074/mami | |||||||||||||||||
46 | 63 | MAPPING | Jun 2204 | CSA-SA | Feb 2018 | Managing Alternatives for Privacy, Property and INternet Governance | Building on the results of several EU FP7 projects including CONSENT (covering on-line consent and privacy in social networks), SMART and RESPECT (which cover smart and on-line surveillance, etc.) MAPPING’s goal is to create an all-round and “joined-up” understanding of the m... | Human Aspects | Drop | https://www.cyberwatching.eu/projects/1075/mapping | |||||||||||||||||
47 | 67 | mF2C | Jun 2464 | RIA | Dec 2019 | Towards an Open, Secure, Decentralized and Coordinated Fog-to-Cloud Management Ecosystem | Fog computing brings cloud computing capabilities closer to the end-device and users, while enabling location-dependent resource allocation, low latency services, and extending significantly the IoT services portfolio as well as market and business opportunities in the cloud... | Secure Systems | Adopt | 6 | 5 | 47 | 47 | 0 | -25 | 2 | https://www.cyberwatching.eu/projects/1078/mf2c | ||||||||||
48 | 68 | MH-MD | Jul 2464 | RIA | Oct 2019 | My Health - My Data | Issues of data subjects’ privacy and data security represent a crucial challenge in the biomedical sector more than in other industries. The current IT landscape in this field shows a myriad of isolated, locally hosted patient data repositories, managed by clinical centres... | Secure Systems | Adopt | 6 | 5 | 47 | 47 | 0 | -25 | 2 | https://www.cyberwatching.eu/projects/1079/mh-md | ||||||||||
49 | 69 | MIKELANGELO | Jan 2432 | RIA | Dec 2017 | MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and hpc systems | MIKELANGELO is a project, targeted to disrupt the core underlying technologies of Cloud computing, enabling even bigger uptake of Cloud computing, HPC in the Cloud and Big Data technologies under one umbrella. The vision of MIKELANGELO is to improve responsiveness, agility and... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/1080/mikelangelo | |||||||||||||||||
50 | 70 | MITIGATE | Aug 2442 | IA | Feb 2018 | Multidimensional, IntegraTed, rIsk assessment framework and dynamic, collaborative Risk ManaGement tools for critical information infrAstrucTurEs | Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime supply chains (SCs) for port operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/1081/mitigate | |||||||||||||||||
51 | 71 | MUSA | Sep 2431 | RIA | Dec 2017 | MUlti-cloud Secure Applications | The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the... | Secure Systems | Drop | 4 | 5 | 43 | 43 | 0 | 0 | 0 | https://www.cyberwatching.eu/projects/1082/musa | ||||||||||
52 | 73 | NeCS | Nov 2442 | MSCA-ITN-ETN | Aug 2019 | European Network for Cyber-security | The European Network for Cybersecurity (NECS) was formed in response to the increased need of highly qualified experts able to cope with all the aspects of the European cybersecurity strategy that is currently under implementation.There is indeed an evident need and... | Identity & Privacy | Adopt | https://www.cyberwatching.eu/projects/966/necs | |||||||||||||||||
53 | 74 | OCGN | Aug 2455 | MSCA-IF-EF-ST | Nov 2018 | Traditional Organised Crime and the Internet: The changing organization of illegal gambling networks | Transnational criminal networks utilise Information Communication Technology (ICT) to commit ‘old’ and ‘new’ types of crime. ICT assists in transnational crime (i.e., hacking) and also as a way to exchange information or plan new crimes. Empirical research has... | Operational Risk | Hold | ||||||||||||||||||
54 | 77 | OPERANDO | Aug 2433 | IA | Apr 2018 | Online Privacy Enforcement, Rights Assurance and Optimization | The goal of the OPERANDO project is to specify, implement, field-test, validate and exploit an innovative privacy enforcement platform that will enable the Privacy as a Service (PaS) business paradigm and the market for online privacy services.The OPERANDO project will... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/970/operando | |||||||||||||||||
55 | 79 | PaaSword | Oct 2431 | RIA | Dec 2017 | A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework Introducing Distributed Encrypted Persistence in Cloud-based Applications | The vision of PaaSword is to maximize and fortify the trust of individual, professional and corporate customers to Cloud -enabled services and applications, to safeguard both corporate and personal sensitive data stored on Cloud infrastructures and Cloud-based storage... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/973/paasword | |||||||||||||||||
56 | 81 | PANORAMIX | Jul 2433 | IA | Aug 2018 | Privacy and Accountability in Networks via Optimized Randomized Mix-nets | "The objective of the PANORAMIX project is the development of a multipurpose infrastructure for privacy-preserving communications based on ""mix-networks"" (mix-nets) and its integration into high-value applications that can be exploited by European businesses. Mix-nets... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/972/panoramix | |||||||||||||||||
57 | 86 | PQCRYPTO | Feb 2432 | RIA | Feb 2018 | Post-quantum cryptography for long-term security | Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures and establish secure... | Human Aspects | Drop | https://www.cyberwatching.eu/projects/1022/pqcrypto | |||||||||||||||||
58 | 91 | PrEstoCloud | Dec 2464 | RIA | Dec 2019 | PrEstoCloud - Proactive Cloud Resources Management at the Edge for Efficient Real-Time Big Data Processing | PrEstoCloud project will make substantial research contributions in the cloud computing and real-time data intensive applications domains, in order to provide a dynamic, distributed, self-adaptive and proactively configurable architecture for processing Big Data streams. In... | Human Aspects | Adopt | 7 | 5 | 49 | 44.5 | 4.5 | -31.5 | 11.5 | |||||||||||
59 | 96 | PRISMACLOUD | Nov 2431 | RIA | Jul 2018 | PRIvacy and Security MAintaining services in the CLOUD | With a current volume of over USD 100 billion and annual growth rates of over 10%, the world-wide market for cloud computing can be considered as the major growth area in ICT. However, big companies and public authorities are reluctant to entrust their most sensitive data to... | Operational Risk | Hold | https://www.cyberwatching.eu/projects/1029/prismacloud | |||||||||||||||||
60 | 98 | PRIVACY FLAG | Jul 2433 | IA | Apr 2018 | Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments | Privacy Flag combines crowd sourcing, ICT technology and legal expertise to protect citizen privacy when visiting websites, using smart-phone applications, or living in a smart city. It will enable citizens to monitor and control their privacy with a user friendly solution... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/1031/privacy-flag | |||||||||||||||||
61 | 99 | Privacy.Us | Dec 2442 | MSCA-ITN-ETN | Nov 2019 | Privacy and Usabiliy | With the rapid accumulation and processing of personal data by numerous organizations, it is of paramount importance to protect people from adverse uses of their data, while allowing them to enjoy the benefits the use of these data can possibly provide. This is the question of... | Human Aspects | Adopt | https://www.cyberwatching.eu/projects/1032/privacyus | |||||||||||||||||
62 | 100 | PRIVACY4FORENSICS | Sep 2409 | MC-IIF - International Incoming Fellowships (IIF) | Mar 2018 | A Formal Rule-Processing Engine for Privacy-Respecting Forensic Investigation | The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once the private data is exposed it is impossible to ‘undo’ its exposure effects should the suspect is found innocent! Ther... | Identity & Privacy | Drop | ||||||||||||||||||
63 | 101 | ProBOS | May 2463 | SME-2 | Sep 2018 | Protection Beyond Operating System - Development of the next generation cyber security solution | Cybercrime is on the rise in terms of scope and impact, which is facilitated by current environment: increasing use of mobile devices, social networking, mobile communications and cloud computing. Cyber attacks are made mostly against governments and corporates to gather... | Secure Systems | Hold | ||||||||||||||||||
64 | 102 | PROTECTIVE | Nov 2454 | IA | Aug 2019 | Proactive Risk Management through Improved Cyber Situational Awareness | PROTECTIVE is designed to improve an organisations ongoing awareness of the risk posed to its business by cyber security attacks. PROTECTIVE makes two key contributions to achieve this enhanced situational awareness. Firstly it increases the computer security incident response... | Cybersecurity Governance | Adopt | 7 | 7 | 63 | 49 | 14 | -10 | 14 | https://www.cyberwatching.eu/projects/1036/protective | ||||||||||
65 | 103 | Ps2Share | Mar 2464 | RIA | Dec 2017 | Participation, Privacy and Power in the Sharing Economy | In this project, we propose an in-depth empirical investigation of privacy in the sharing economy. We will investigate three challenges in particular: privacy, participation/exclusion and power. First, sharing services come with compounded privacy risks extending beyond the... | Identity & Privacy | Drop | https://www.cyberwatching.eu/projects/1038/ps2share | |||||||||||||||||
66 | 104 | RAPID | Aug 2431 | RIA | Dec 2017 | Heterogeneous Secure Multi-level Remote Acceleration Service for Low-Power Integrated Systems and Devices | Many low-power devices such as smartphones, tablets, notebooks as well as several other embedded systems can't always cope with the increased demand for processing power, memory and storage required by modern applications in gaming, vision, security, robotics, aerospace, etc... | Operational Risk | Drop | ||||||||||||||||||
67 | 105 | REASSURE | Apr 2467 | RIA | Dec 2019 | Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience | Implementing cryptography on embedded devices is an ongoing challenge: every year new implementation flaws are discovered and new attack paths are being used by real life adversaries. Whilst cryptography can guarantee many security properties, it crucially depends on the... | Cybersecurity Governance | Adopt | https://www.cyberwatching.eu/projects/1057/reassure | |||||||||||||||||
68 | 107 | REDSENTRY | Mar 2478 | SME-1 | Dec 2017 | Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry | REDSENTRY aims to provide a flexible, scalable and open solution to the ever-changing threat landscape faced by the financial services sector. The threats faced by the financial services industry are varied and constantly evolving and cybercrime is the 2nd most reported type... | Operational Risk | Drop | ||||||||||||||||||
69 | 110 | SafeCloud | Aug 2433 | IA | Aug 2018 | Secure and Resilient Cloud Architecture | Cloud infrastructures, despite all their advantages and importance to the competitiveness of modern economies, raise fundamental questions related to the privacy, integrity, and security of offsite data storage and processing tasks. These questions are currently not answered... | Secure Systems | Hold | 7 | 7 | 63 | 47 | 16 | -25 | 16 | https://www.cyberwatching.eu/projects/1060/safecloud | ||||||||||
70 | 111 | SAFEcrypto | Oct 2431 | RIA | Dec 2018 | Secure Architectures of Future Emerging Cryptography | SAFEcrypto will provide a new generation of practical, robust and physically secure post quantum cryptographic solutions that ensure long-term security for future ICT systems, services and applications. Novel public-key cryptographic schemes (digital signatures... | Verification & Assurance | Hold | https://www.cyberwatching.eu/projects/1062/safecrypto | |||||||||||||||||
71 | 112 | SAFERtec | Apr 2467 | RIA | Dec 2019 | Security Assurance FramEwoRk for neTworked vEhicular teChnology | The assurance of security, privacy, reliability and safety features is key-point to unlock the enormous potential that the connected vehicles systems paradigm i.e., the dynamic Cyberphysical system of highly-equipped infrastructure-connected vehicles with numerous third-party... | Secure Systems | Adopt | 2 | 3 | 25 | 47 | -22 | -25 | 2 | https://www.cyberwatching.eu/projects/1063/safertec | ||||||||||
72 | 113 | SAINT | Aug 2475 | RIA | Feb 2021 | SYSTEMIC ANALYZER IN NETWORK THREATS | SAINT proposes to analyse and identify incentives to improve levels of collaboration between cooperative and regulatory approaches to information sharing. Analysis of the ecosystems of cybercriminal activity, associated markets and revenues will drive the development of a... | Verification & Assurance | Assess | 7 | 5 | 49 | 42 | 7 | -8 | 7 | https://www.cyberwatching.eu/projects/1065/saint | ||||||||||
73 | 114 | SAURON | Jan 2475 | IA | Apr 2019 | Scalable multidimensionAl sitUation awaReness sOlution for protectiNg european ports | Nowadays coordinated and every time more complex terrorist attacks are shocking the world. Due to the progressive rely of industrial sector and many critical infrastructures (CI) (e.g. EU ports) in ICT systems, the impact of a coordinated physical attack, a deliberate... | Secure Systems | Hold | 4 | 2 | 22 | 47 | -25 | -25 | 16 | https://www.cyberwatching.eu/projects/1066/sauron | ||||||||||
74 | 115 | SCISSOR | Sep 2431 | RIA | Dec 2017 | Security In trusted SCADA and smart-grids | In traditional industrial control systems and critical infrastructures, security was implicitly assumed by the reliance on proprietary technologies (security by obscurity), physical access protection and disconnection from the Internet. The massive move, in the last decade... | Operational Risk | Drop | https://www.cyberwatching.eu/projects/1067/scissor | |||||||||||||||||
75 | 116 | SCOTT | Feb 2477 | IA | Jun 2020 | Secure COnnected Trustable Things | Creating trust in wireless solutions and increasing social acceptance are major challenges to achieve the full potential of the Internet of Things. SCOTT, with 57 key partners from 12 countries (EU + Brazil), will provide efficient solutions of wireless, end-to-end secure... | Secure Systems | Trial | 7 | 6 | 56 | 38 | 18 | -18 | 18 | https://www.cyberwatching.eu/projects/978/scott | ||||||||||
76 | 118 | SecIoT | Oct 2471 | CSA | Aug 2018 | Cybersecurity Threat Detection for Internet of Things Connected Devices | Secure Secure Ltd was founded in 2015 and headquartered in the UK. The founding team brings extensive experience inthe fields of cybersecurity, scalable software architecture, software company leadership and SME growth. Given theaccelerating growth and importance of... | Secure Systems | Hold | ||||||||||||||||||
77 | 119 | SERECA | Nov 2431 | RIA | Feb 2018 | Secure Enclaves for REactive Cloud Applications | Cloud security is of immediate concern to organisations that must comply with strict confidentiality and integrity policies. More broadly, security has emerged as a commercial imperative for cloud computing across a wide range of markets. The lack of adequate security... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/980/sereca | |||||||||||||||||
78 | 120 | SHARCS | Sep 2431 | RIA | Dec 2017 | Secure Hardware-Software Architectures for Robust Computing Systems | Developing new security paradigms, architectures, and software, for more secure and trustworthy ICT systems and services has clear social, scientific, and market motivation. This motivation is becoming stronger due to the changing threat landscape; over the past decade we are... | Verification & Assurance | Drop | https://www.cyberwatching.eu/projects/982/sharcs | |||||||||||||||||
79 | 121 | SHiELD (Health) | Apr 2467 | RIA | Dec 2019 | European Security in Health Data Exchange | SHiELD will unlock the value of health data to European citizens and businesses by overcoming security and regulatory challenges that today prevent this data being exchanged with those who need it. This will make it possible to provide better health care to mobile citizens... | Identity & Privacy | Adopt | https://www.cyberwatching.eu/projects/983/shield | |||||||||||||||||
80 | 122 | SHIELD | Dec 2454 | IA | Feb 2019 | Securing against intruders and other threats through a NFV-enabled environment | Nowadays, cybercrime is one of the most relevant and critical threats to both the economy and society in Europe. Establishing efficient and effective ways to protect services and infrastructures from ever-evolving cyber threats is crucial for sustaining business integrity and... | Secure Systems | Hold | 6 | 5 | 47 | 47 | 0 | -25 | 16 | https://cyberwatching.eu/projects/983/shield | ||||||||||
81 | 123 | SISSDEN | Nov 2454 | IA | Apr 2019 | Secure Information Sharing Sensor Delivery event Network | SISSDEN is a project aimed at improving the cybersecurity posture of EU entities and end users through development of situational awareness and sharing of actionable information. It builds on the experience of Shadowserver, a non-profit organization well known in the security... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/984/sissden | |||||||||||||||||
82 | 124 | SMESEC | Feb 2477 | IA | May 2020 | Protecting Small and Medium-sized Enterprises digital technology through an innovative cyber-SECurity framework | Small and Medium size Enterprises (SMEs) are an important driver for innovation and growth in the EU. SMEs also stand to gain the most from innovative technology, because it is complicated and costly for them to set-up and run ICT in the traditional way. Taking into account... | Operational Risk | Trial | 8 | 6 | 58 | 58 | 0 | 0 | 0 | https://www.cyberwatching.eu/projects/986/smooth | ||||||||||
83 | 126 | SODA | Oct 2463 | RIA | Dec 2019 | Scalable Oblivious Data Analytics | More and more data is being generated, and analyzing this data drives knowledge and value creation across society. Unlocking this potential requires sharing of (often personal) data between organizations, but this meets unwillingness from data subjects and data controllers... | Secure Systems | Adopt | 7 | 4 | 42 | 47 | -5 | -25 | 2 | https://www.cyberwatching.eu/projects/987/soda | ||||||||||
84 | 127 | SPECIAL | Dec 2464 | RIA | Dec 2019 | Scalable Policy-awarE linked data arChitecture for prIvacy, trAnsparency and compLiance | The SPECIAL project will address the contradiction between Big Data innovation and privacy-aware data protection by proposing a technical solution that makes both of these goals realistic. We will develop technology that: (i) supports the acquisition of user consent at... | Human Aspects | Adopt | 3 | 1 | 13 | 44.5 | -31.5 | -31.5 | 11.5 | https://www.cyberwatching.eu/projects/989/special | ||||||||||
85 | 128 | SpeechXRays | Jul 2433 | IA | Apr 2018 | Multi-channel biometrics combining acoustic and machine vision analysis of speech, lip movement and face | The SpeechXRays project will develop and test in real-life environments a user recognition platform based on voice acoustics analysis and audio-visual identity verification. SpeechXRays will outperform state-of-the-art solutions in the following areas:· Security: high... | Identity & Privacy | Drop | https://www.cyberwatching.eu/projects/990/speechxrays | |||||||||||||||||
86 | 129 | SPOOC | Mar 2432 | ERC-COG | Aug 2020 | Automated Security Proofs of Cryptographic Protocols: Privacy, Untrusted Platforms and Applications to E-voting Protocols | The rise of the Internet and the ubiquity of electronic devices has deeply changed our way of life. Many face to face and paper transactions have nowadays digital counterparts: home banking, e- commerce, e-voting, etc. The security of such transactions is ensured by the means... | Identity & Privacy | Trial | ||||||||||||||||||
87 | 131 | STOP-IT | Jul 2475 | IA | May 2021 | Strategic, Tactical, Operational Protection of water Infrastructure against cyber-physical Threats | Water critical infrastructures (CIs) are essential for human society, life and health and they can be endangered by physical/cyber threats with severe societal consequences. To address this, STOP-IT assembles a team of major Water Utilities, industrial technology developers... | Operational Risk | Assess | 7 | 7 | 63 | 33 | 30 | -8 | 30 | https://www.cyberwatching.eu/projects/991/stop-it | ||||||||||
88 | 132 | STORM | Feb 2478 | RIA | Aug 2018 | The first cybersecurity management system providing evidence based metrics for cyber risk at the business asset level in real-time | InnoSec’s main product, STORM, is the only Cyber Risk Management application that provides evidence based metrics defining cyber risk at the business asset level in real-time, using a flexible risk modeling method, while improving the overall user experience. STORM allows... | Operational Risk | Hold | ||||||||||||||||||
89 | 133 | SUNFISH | Oct 2431 | RIA | Dec 2017 | SecUre iNFormation SHaring in federated heterogeneous private clouds | Today the European Public Sector Players lack the necessary infrastructure and technology to allow them to integrate their computing clouds. Furthermore, legislative barriers often make it difficult to use available commercial technological solutions. The SUNFISH project aims... | Operational Risk | Drop | 6 | 4 | 40 | 40 | 0 | 0 | 0 | https://www.cyberwatching.eu/projects/992/sunfish | ||||||||||
90 | 134 | SUPERCLOUD | Jun 2431 | RIA | Jan 2018 | USER-CENTRIC MANAGEMENT OF SECURITY AND DEPENDABILITY IN CLOUDS OF CLOUDS | Today, despite its unravelling business benefits, distributed cloud computing raises many security and dependability concerns. Root causes include increase in complexity and lack of interoperability between heterogeneous, often proprietary infrastructure technologies... | Verification & Assurance | Drop | https://www.cyberwatching.eu/projects/993/supercloud | |||||||||||||||||
91 | 137 | TOREADOR | Apr 2448 | RIA | Dec 2018 | TrustwOrthy model-awaRE Analytics Data platfORm | The TOREADOR project is aimed at overcoming some major hurdles that until now have prevented many European companies from reaping the full benefits of Big Data analytics (BDA). Companies and organisations in Europe have become aware of the potential competitive advantage they... | Human Aspects | Hold | https://www.cyberwatching.eu/projects/997/toreador | |||||||||||||||||
92 | 138 | TREDISEC | Sep 2431 | RIA | Mar 2018 | Trust-aware, REliable and Distributed Information SEcurity in the Cloud. | "The current trend for data placement shows a steady shift towards ""the cloud"". The advent of cloud storage and computation services however comes at the expense of data security and user privacy. To remedy this, customers nowadays call for end-to-end security whereby only... | Cybersecurity Governance | Drop | https://www.cyberwatching.eu/projects/998/tredisec | |||||||||||||||||
93 | 142 | UNICORN | Dec 2464 | IA | Dec 2019 | A NOVEL FRAMEWORK FOR MULTI-CLOUD SERVICES DEVELOPMENT, ORCHESTRATION, DEPLOYMENT AND CONTINUOUS MANAGEMENT FOSTERING CLOUD TECHNOLOGIES UPTAKE FROM DIGITAL SMES AND STARTUPS | Unicorn aims to simplify the design, deployment and management of secure and elastic –by design- multi-cloud services. This will be achieved by a) development and design libraries that will provide security enforcement mechanisms, data privacy restrictions, monitoring metric... | Secure Systems | Adopt | 6 | 5 | 47 | 47 | 0 | -25 | 2 | https://www.cyberwatching.eu/projects/1002/unicorn | ||||||||||
94 | 143 | VESSEDIA | Apr 2467 | RIA | Dec 2019 | VERIFICATION ENGINEERING OF SAFETY AND SECURITY CRITICAL DYNAMIC INDUSTRIAL APPLICATIONS | The VESSEDIA project will bring safety and security to many new software applications and devices. In the fast evolving world we live in, the Internet has brought many benefits to individuals, organisations and industries. With the capabilities offered now (such as IPv6) to... | Secure Systems | Adopt | https://www.cyberwatching.eu/projects/1003/vessedia | |||||||||||||||||
95 | 144 | VIRT-EU | Dec 2463 | RIA | Dec 2019 | Values and ethics in Innovation for Responsible Technology in EUrope | The networked future promises new relationships between people and artifacts, the private and the public, the individual and the collective. The increased networking capabilities of pervasive technologies mean that of personal data are being produced, analyzed, monetized and... | Identity & Privacy | Adopt | https://www.cyberwatching.eu/projects/1004/virt-eu | |||||||||||||||||
96 | 147 | WITDOM | Sep 2431 | RIA | Dec 2017 | empoWering prIvacy and securiTy in non-trusteD envirOnMents | The advent of the Future Internet prompts fundamental transformations in whole ICT ecosystems, while bringing new opportunities to stakeholders in the availability and rational use of physical resources with large-scale savings in IT investments. It will also pose new security... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/1006/witdom | |||||||||||||||||
97 | 148 | FENTEC | Jun 2483 | RIA | Dec 2020 | Functional Encryption Technologies | Functional encryption (FE), has been recently been introduced as a new paradigm of encryption systems to overcome all-or-nothing limitations of classical encryption. In an FE system the decryptor deciphers a function over the message plaintext: such functional decryptability... | Operational Risk | Assess | 3 | 4 | 34 | 33 | 1 | -8 | 30 | https://cyberwatching.eu/projects/1268/fentec | ||||||||||
98 | 150 | PROMETHEUS | Aug 2483 | RIA | Dec 2019 | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | Privacy-preserving cryptographic protocols allow users to take common daily life actions online (e.g, purchases, reservations or voting) without leaking sensitive personal information. They typically combine various tools such as digital signatures, homomorphic encryption or... | Verification & Assurance | Adopt | 1 | 1 | 9 | 21 | -12 | -12 | 12 | https://www.cyberwatching.eu/projects/1034/prometheus | ||||||||||
99 | 151 | REACT | Mar 2488 | RIA | May 2021 | REactively Defending against Advanced Cybersecurity Threats | Security is a vital property for every operational system and network. As systems become more powerful and, in many aspects, more complex, advanced cyber-attacks impose new threats for important operations of our society. Computer systems assist core functions of hospitals... | Secure Systems | Assess | 1 | 1 | 9 | 27 | -18 | -18 | 29 | https://www.cyberwatching.eu/projects/1053/react | ||||||||||
100 | 152 | SerIoT | Jun 2483 | RIA | Dec 2020 | Secure and Safe Internet of Things | The IoT is coming upon us faster than we think, catapulting EU industry, homes and society into the huge arena of security risks that accompany an untested yet already universal technology that directly manages our cyber-physical reality on a daily, and indeed second by... | Secure Systems | Assess | 6 | 1 | 19 | 27 | -8 | -18 | 29 | https://www.cyberwatching.eu/projects/981/seriot |