Last active
April 11, 2022 19:46
-
-
Save psiborg/0d025ad75e4bf6ba8ae9be0102f52384 to your computer and use it in GitHub Desktop.
Sample files for Thoughtworks' Tech Radar (https://www.thoughtworks.com/radar)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| id | name | rcn | type | ending | title | teaser | quadrant | ring | TRL | MRL | Score | Median | Performance | Min | Max | cwurl | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | AARC2 | 206338 | RIA | Apr 2019 | Authentication and Authorisation For Research and Collaboration | The goal of AARC2 is to design an AAI framework to develop interoperable AAI, to enable researchers to access the whole research and infrastructure service portfolio with one login. AARC2's objectives are:1. enable federated access in research communities participating in... | Secure Systems | Adopt | https://cyberwatching.eu/projects/929/aarc-2 | ||||||||
| 4 | AEGIS | 210218 | CSA | Apr 2019 | Accelerating EU-US DialoGue for Research and Innovation in CyberSecurity and Privacy | AEGIS aims to strengthen dialogues between Europe and the US, in order to facilitate exchange of views, policies and best practices to stimulate cooperation around cybersecurity and privacy R&I, and contribute in shaping the future global cybersecurity and privacy... | Cybersecurity Governance | Adopt | https://cyberwatching.eu/projects/932/aegis | ||||||||
| 5 | ANASTACIA | 207199 | RIA | Dec 2019 | Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures | The main objective of the ANASTACIA is to address the constant discovery of vulnerabilities in ICT components providing assurance that ICT systems are secure and trustworthy by design. To this end, ANASTACIA will research and develop a holistic security framework, which will... | Verification & Assurance | Assess | 6 | 3 | 33 | 33 | 0 | -24 | 16 | https://cyberwatching.eu/projects/934/anastacia | |
| 6 | ARIES | 202675 | RIA | Feb 2019 | reliAble euRopean Identity EcoSystem | ARIES main goal is to deliver a comprehensive framework for reliable e-identity ecosystem comprising new technologies, processes and security features that ensure highest levels of quality in eID based on trustworthy security documents and biometrics for highly secure and... | Secure Systems | Adopt | https://cyberwatching.eu/projects/935/aries | ||||||||
| 7 | ARMOUR | 199076 | RIA | Jan 2018 | Large-Scale Experiments of IoT Security Trust | The Internet-of-Things (IoT) is rapidly heading for large scale meaning that all mechanisms and features for the future IoT need to be especially designed and duly tested/certified for large-scale conditions. Also, Security, Privacy and Trust are critical elements of the IoT... | Secure Systems | Hold | https://cyberwatching.eu/projects/937/armour | ||||||||
| 8 | ASAP | 105356 | ERC-AG | Sep 2018 | Adaptive Security and Privacy | With the prevalence of mobile computing devices and the increasing availability of pervasive services, ubiquitous computing (Ubicomp) is a reality for many people. This reality is generating opportunities for people to interact socially in new and richer ways, and to work mor... | Human Aspects | Adopt | |||||||||
| 9 | ATENA | 202699 | IA | Apr 2019 | Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures | Over recent years, Industrial and Automation Control Systems (IACS) adopted in Critical Infrastructures (CIs) have become more complex due to the increasing number of interconnected devices, and to the large amount of information exchanged among system components. With the... | Operational Risk | Adopt | https://cyberwatching.eu/projects/939/atena | ||||||||
| 10 | BEACON | 194143 | RIA | Jul 2017 | Enabling Federated Cloud Networking | Cloud federation enables cloud providers to collaborate and share their resources to create a large virtual pool of resources at multiple network locations. Different types of federation architectures for clouds and datacenters have been proposed and implemented (e.g. cloud... | Operational Risk | Hold | https://cyberwatching.eu/projects/940/beacon | ||||||||
| 12 | C3ISP | 202687 | IA | Sep 2019 | Collaborative and Confidential Information Sharing and Analysis for Cyber Protection | C3ISP mission is to define a collaborative and confidential information sharing, analysis and protection framework as a service for cyber security management. C3ISP innovation is the possibility to share information in a flexible and controllable manner inside a collaborative... | Operational Risk | Trial | https://cyberwatching.eu/projects/942/c3isp | ||||||||
| 13 | CANVAS | 202697 | CSA | Aug 2019 | Constructing an Alliance for Value-driven Cybersecurity | The growing complexity of the digital ecosystem in combination with increasing global risks entail the danger that enforcing cybersecurity may bypass other fundamental values like equality, fairness or privacy, whereas downplaying cybersecurity would undermine citizens’... | Cybersecurity Governance | Trial | https://cyberwatching.eu/projects/1267/canvas | ||||||||
| 14 | certMILS | 207195 | IA | Dec 2020 | Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats | certMILS develops a security certification methodology for Cyber-physical systems (CPS). CPS are characterised by safety-critical nature, complexity, connectivity, and open technology. A common downside to CPS complexity and openness is a large attack surface and a high degree... | Cybersecurity Governance | Assess | https://cyberwatching.eu/projects/945/certmils | ||||||||
| 15 | CHOReVOLUTION | 194161 | RIA | Dec 2017 | Automated Synthesis of Dynamic and Secured Choreographies for the Future internet | The Future Internet (FI) represents an age of unprecedented opportunities for social, economic, and business growth thanks to the global scale connectivity of the virtual as well as of the physical world. This indeed opens up a wealth of innovative and revolutionary real-life... | Secure Systems | Hold | https://cyberwatching.eu/projects/946/chorevolution | ||||||||
| 16 | CIPSEC | 202692 | IA | Apr 2019 | Enhancing Critical Infrastructure Protection with innovative SECurity framework | In recent years, the majority of the world's Critical Infrastructures CIs evolved to become more flexible, cost efficient and able to offer better services and conditions for business opportunities. Towards this evolution, CIs and companies offering CI services had to adopt... | Secure Systems | Adopt | https://cyberwatching.eu/projects/947/cipsec | ||||||||
| 17 | CITADEL | 202704 | IA | May 2019 | Critical Infrastructure Protection using Adaptive MILS | Critical infrastructures (CI) rely on complex safety- and security-critical ICT systems placed into unpredictable environments and forced to cope with unexpected events and threats while exhibiting safe adaptive behavior. Recent security trends stress continuous adaptation to... | Secure Systems | Trial | https://cyberwatching.eu/projects/948/citadel | ||||||||
| 18 | CLARUS | 194136 | RIA | Dec 2017 | A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD | Although cloud computing offers many benefits, security issues such as confidentiality and privacy are still major concerns to those intending to migrate to the cloud. Traditional cloud security has been based on assurance to customers that cloud providers follow sound... | Secure Systems | Hold | https://cyberwatching.eu/projects/949/clarus | ||||||||
| 19 | CloudSocket | 194235 | RIA | Dec 2017 | Business and IT-Cloud Alignment using a Smart Socket | Business and IT Alignment is important challenge, as we are facing a dramatic change in the way we rely, depend and interact with ICT that influences our everyday life. Although “digital natives” will soon enter the workforce, there is still a huge gap between the business... | Secure Systems | Hold | https://cyberwatching.eu/projects/950/cloudsocket | ||||||||
| 22 | COEMS | 205937 | RIA | Oct 2019 | Continuous Observation of Embedded Multicore Systems | The ability to observe the internals of an execution of a computer-based system is a fundamental requirement for ultimately ensuring correctness and safe behaviour. Within COEMS (Continuous Observation of Embedded Multicore Systems) a novel observer platform with supporting... | Secure Systems | Trial | https://cyberwatching.eu/projects/952/coems | ||||||||
| 24 | COMPACT | 210223 | IA | Oct 2019 | COmpetitive Methods to protect local Public Administration from Cyber security Threats | Cyber threats are the most significant and growing risk for public administrations (PA). However, technological, organisational and structural issues hamper the ability, especially for local PAs (LPAs) to improve their cyber security level. Budget constraints and evolving... | Cybersecurity Governance | Trial | https://cyberwatching.eu/projects/954/compact | ||||||||
| 26 | CREDENTIAL | 194869 | IA | Sep 2018 | Secure Cloud Identity Wallet | With increasing mobility and Internet usage, the demand for digital services increases and has reached critical and high assurance domains like e-Government, e-Health and e-Business. Those domains have high security and privacy requirements and hence will be harnessed with... | Identity & Privacy | Adopt | https://cyberwatching.eu/projects/956/credential | ||||||||
| 28 | CryptoCloud | 185411 | ERC-AG | May 2019 | Cryptography for the Cloud | Many companies have already started the migration to the Cloud and many individuals share their personal informations on social networks. Unfortunately, in the current access mode, the provider first authenticates the client, and grants him access, or not, according to his ri... | Identity & Privacy | Trial | |||||||||
| 29 | CS-AWARE | 210224 | IA | Aug 2020 | A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis | Cybersecurity is one of today's most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes... | Cybersecurity Governance | Assess | https://cyberwatching.eu/projects/959/cs-aware | ||||||||
| 30 | CYBECO | 210232 | RIA | Apr 2019 | Supporting Cyberinsurance from a Behavioural Choice Perspective | CYBECO will research, develop, demonstrate, evaluate and exploit a new framework for managing cybersecurity risks, one that is focusing on cyberinsurance, as key risk management treatment. CYBECO integrates multidisciplinary research methods from Behavioural Economics... | Verification & Assurance | Adopt | https://cyberwatching.eu/projects/960/cybeco | ||||||||
| 31 | CyberWiz | 200381 | SME-2 | Aug 2017 | Cyber-Security Visualization and CAD-Tool for the Vulnerability Assessment of Critical Infrastructures | The ICT environments of critical infrastructures (such as energy distribution systems) are composed of a large number of systems connected to form a complex system of systems. Recent initiatives to upgrade power systems into smart grids target an even tighter integration with... | Secure Systems | Hold | https://cyberwatching.eu/projects/964/cyberwiz | ||||||||
| 32 | CYCLONE | 194262 | IA | Dec 2017 | Complete Dynamic Multi-cloud Application Management | Application service providers (ASPs) now develop, deploy, and maintain complex computing platforms within multiple cloud infrastructures to improve resilience, responsiveness and elasticity of their applications. The CYCLONE project targets the ASPs, providing them with... | Secure Systems | Hold | https://cyberwatching.eu/projects/977/cyclone | ||||||||
| 33 | CYRail | 206014 | Shift2Rail-RIA | Sep 2018 | Cybersecurity in the RAILway sector | Railway infrastructures are moving towards more intelligent, connected, user-centric and collaborative systems. While it brings many advantages for the industry and users, it also poses new opportunities for cyber-criminals and terrorists. CYRail aims to deliver tailored... | Operational Risk | Adopt | https://cyberwatching.eu/projects/1025/cyrail | ||||||||
| 34 | DAPPER | 185683 | MC-CIG | Mar 2018 | "Doing Anonymization Practically, Privately, Effectively and Reusably" | "There is currently a tug-of-war going on surrounding data releases. On one side, there are many strong reasons pulling to release data to other parties: business factors, freedom of information rules, and scientific sharing agreements. On the other side, concerns about indiv... | Identity & Privacy | Hold | |||||||||
| 35 | DECODE | 206387 | RIA | Nov 2019 | Decentralised Citizens Owned Data Ecosystem | Today’s Internet is becoming increasingly centralised, slowing innovation and challenging its potential to revolutionise society and the economy in a pluralistic manner. DECODE will develop practical alternatives through the creation, evaluation and demonstration of a... | Human Aspects | Assess | 6 | 4 | 40 | 26.5 | 13.5 | -13.5 | 13.5 | https://cyberwatching.eu/projects/1037/decode | |
| 36 | DEFENDER | 210231 | IA | Apr 2020 | Defending the European Energy Infrastructures | Critical Energy infrastructures (CEI) protection and security are becoming of utmost importance in our everyday life. However, cyber and system-theoretic approaches fail to provide appropriate security levels to CEIs, since they are often used in isolation and build on... | Operational Risk | Assess | |||||||||
| 37 | DISCOVERY | 199580 | CSA | Dec 2017 | Dialogues on ICT to Support COoperation Ventures and Europe-North AmeRica (Canada and USA) sYnergies | "DISCOVERY aims at supporting dialogues between Europe and North America (US and Canada); and fostering cooperation in collaborative ICT R&I, both under Horizon 2020 and under US and Canada funding programmes. With this purpose, DISCOVERY proposes a radically new approach to... | Cybersecurity Governance | Hold | |||||||||
| 38 | DiSIEM | 202707 | IA | Aug 2019 | Diversity Enhancements for SIEMs | Security Information and Event Management (SIEM) systems are a fundamental component of the ubiquitous ICT infrastructures that form the backbone of our digital society. These systems are mostly used to monitor infrastructures using many types of sensors and tools and... | Operational Risk | Trial | https://cyberwatching.eu/projects/1040/disiem | ||||||||
| 40 | DOGANA | 194877 | IA | Aug 2018 | aDvanced sOcial enGineering And vulNerability Assesment Framework | "The advent of Social Networks has made both companies and public bodies tremendously exposed to the so-called Social Engineering 2.0, and thus prone to targeted cyber-attacks. Unfortunately, there is currently no solution available on the market that allows neither the... | Human Aspects | Adopt | 7 | 6 | 56 | 56 | 0 | 0 | 0 | https://cyberwatching.eu/projects/1042/dogana | |
| 42 | e-Sides | 206175 | CSA | Dec 2019 | Ethical and Societal Implications of Data Sciences | Data-driven innovation is deeply transforming society and the economy. Although there are potentially enormous economic and social benefits this innovation also brings new challenges for individual and collective privacy, security, as well as democracy and participation. The... | Identity & Privacy | Assess | https://cyberwatching.eu/projects/1044/e-sides | ||||||||
| 43 | ECRYPT-CSA | 194321 | CSA | Feb 2018 | European Coordination and Support Action in Cryptology | This CSA intends to strengthen European excellence in the area of cryptology and to achieve a durable integration and structuring of the European cryptography community, involving academia, industry, government stakeholders and defence agencies. The project will coordinate... | Verification & Assurance | Hold | https://www.cyberwatching.eu/projects/1045/ecrypt | ||||||||
| 45 | ENCASE | 198839 | MSCA-RISE | Dec 2019 | EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors | ENCASE will leverage the latest advances in usable security and privacy to design and implement a browser-based architecture for the protection of minors from malicious actors in online social networks. The ENCASE user-centric architecture will consist of three distinct... | Secure Systems | Assess | 4 | 2 | 22 | 21 | 1 | -12 | 26 | https://cyberwatching.eu/projects/1157/encase | |
| 46 | EU-SEC | 207439 | IA | Dec 2019 | The European Security Certification Framework | In recent years the ICT market has evolved toward a cloud-based approach. This shift together with the rapidly changing legal and regulatory landscape has heavily impacted security assurance, governance and compliance. The information security market players have tried to... | Cybersecurity Governance | Assess | 7 | 5 | 49 | 28.5 | 20.5 | -5.5 | 20.5 | https://cyberwatching.eu/projects/1046/eu-sec | |
| 47 | EUNITY | 210046 | CSA | May 2019 | Cybersecurity and privacy dialogue between Europe and Japan | The EUNITY project addresses scope 2 (international dialogue with Japan) of objective DS-05-2016 of the H2020 work programme. This two years project aims at developing and encouraging the dialogue between Europe and Japan on cybersecurity and privacy topics. The partners... | Cybersecurity Governance | Trial | https://cyberwatching.eu/projects/1047/eunity | ||||||||
| 50 | FutureTrust | 202698 | IA | May 2019 | Future Trust Services for Trustworthy Global Transactions | Against the background of the regulation 2014/910/EU on electronic identification (eID) and trusted services for electronic transactions in the internal market (eIDAS), the FutureTrust project aims at supporting the practical implementation of the regulation in Europe and... | Secure Systems | Trial | 6 | 5 | 47 | 47 | 0 | -25 | 2 | https://cyberwatching.eu/projects/1055/futuretrust | |
| 51 | GenoPri | 203068 | MSCA-IF-EF-ST - Standard EF | Apr 2018 | Quantifying and Protecting the Privacy of Genomic Data | Genomic data carries a lot of sensitive information about its owner such as his predispositions to sensitive diseases, ancestors, physical attributes, and genomic data of his relatives (leading to interdependent privacy risks). Individuals share vast amount of information on... | Identity & Privacy | Hold | |||||||||
| 52 | GHOST | 210233 | IA | Apr 2020 | Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control | To effectively respond to the multitude & complexity of cybersecurity challenges in smart-homes GHOST deploys a pioneering software-enabled ‘usable security’ solution. The project brings professional level security to the European citizens and to this end it: (a) increases... | Human Aspects | Assess | https://cyberwatching.eu/projects/1056/ghost | ||||||||
| 53 | HEAT | 194171 | RIA | Dec 2017 | Homomorphic Encryption Applications and Technology | Homomorphic cryptography offers the tantalizing goal of being able to process sensitive information in encrypted form, without needing to compromise on the privacy and security of the citizens and organizations that provide the input data.The HEAT proposal brings together... | Secure Systems | Hold | https://cyberwatching.eu/projects/1061/heat | ||||||||
| 54 | HECTOR | 194145 | RIA | Feb 2018 | HARDWARE ENABLED CRYPTO AND RANDOMNESS | A single flipped bit or a weak random number generator can cause secure systems to fail. The main objective of this proposal is to close the gap between the mathematical heaven of cryptographic algorithms and their efficient, secure and robust hardware implementations. It... | Verification & Assurance | Hold | https://cyberwatching.eu/projects/1064/hector | ||||||||
| 55 | HERMENEUT | 210209 | RIA | Apr 2019 | Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks | IT security and risk management often ignore or underestimate the human factor (psychological, behavioural, societal, organisational and economic aspects) in the identification of cyber-risks, their quantitative economic impact and the costs of countermeasures. Cyber-attacks... | Operational Risk | Adopt | 6 | 5 | 47 | 47 | 0 | 0 | 0 | https://cyberwatching.eu/projects/1068/hermeneut | |
| 56 | HIPS | 188662 | ERC-CG | Sep 2019 | High-Performance Secure Computation with Applications to Privacy and Cloud Security | "Secure two-party and multiparty computation has long stood at the center of the foundations of theoretical cryptography. However, in the last five years there has been blistering progress on the question of efficient secure computation. We are close to the stage that secure ... | Secure Systems | Trial | |||||||||
| 57 | IMPACT | 192598 | ERC-SyG | Jan 2021 | imPACT – Privacy, Accountability, Compliance, and Trust in Tomorrow’s Internet | The Internet has evolved from a mere communication network used by tens of millions of users two decades ago, to a global multimedia platform for communication, social networking, entertainment, education, trade and political activism used by more than two billion users. This... | Operational Risk | Assess | https://cyberwatching.eu/projects/1069/impact | ||||||||
| 58 | KONFIDO | 207188 | RIA | Oct 2019 | KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services | KONFIDO advances the state of the art of eHealth technology with respect to four key dimensions of digital security, namely: data preservation, data access and modification, data exchange, and interoperability and compliance. To address the challenges of secure storage and... | Secure Systems | Trial | 4 | 2 | 22 | 47 | -25 | -25 | 2 | https://cyberwatching.eu/projects/1070/konfido | |
| 60 | LIGHTest | 203437 | IA | Aug 2019 | Lightweight Infrastructure for Global Heterogeneous Trust management in support of an open Ecosystem of Stakeholders and Trust schemes. | The objective of LIGHTest is to create a global cross-domain trust infrastructure that renders it transparent and easy for verifiers to evaluate electronic transactions. By querying different trust authorities world-wide and combining trust aspects related to identity... | Secure Systems | Trial | 7 | 5 | 49 | 47 | 2 | -25 | 2 | https://cyberwatching.eu/projects/1072/lightest | |
| 61 | LV-Pri20 | 196089 | MSCA-IF-EF-CAR | Jun 2017 | Logic-based Verification of Privacy-Preservation in Europe's 2020 ICT | In line with the EU 2020 Flagship Initiative on a Digital Agenda for Europe and the upcoming EU Cybersecurity Strategy, the goal of the LV-Pri20 project is to aid our ICT-driven lives, by “safeguarding the human right of privacy in the digital society”. Concretely, the... | Identity & Privacy | Hold | |||||||||
| 62 | MAMI | 199159 | RIA | Jun 2018 | Measurement and Architecture for a Middleboxed Internet | Recent revelations about large-scale pervasive surveillance of Internet traffic have led to a rapidly expanding deployment of encryption in order to protect end-user privacy. At the same time, network operators and access providers rely on increasing use of in-network... | Human Aspects | Adopt | https://www.cyberwatching.eu/projects/1074/mami | ||||||||
| 63 | MAPPING | 111214 | CSA-SA | Feb 2018 | Managing Alternatives for Privacy, Property and INternet Governance | Building on the results of several EU FP7 projects including CONSENT (covering on-line consent and privacy in social networks), SMART and RESPECT (which cover smart and on-line surveillance, etc.) MAPPING’s goal is to create an all-round and “joined-up” understanding of the m... | Human Aspects | Hold | https://www.cyberwatching.eu/projects/1075/mapping | ||||||||
| 64 | MAS2TERING | 192066 | CP | Aug 2017 | Multi-Agent Systems and Secured coupling of Telecom and EnErgy gRIds for Next Generation smartgrid services | The success of the European vision of a low carbon electricity grid that minimises greenhouse gas emissions; and enhances security, quality and reliability of supply depends on how smart infrastructures, combining energy and telecom, are developed and implemented for the wide... | Secure Systems | Hold | |||||||||
| 65 | MATTHEW | 110220 | CP | Oct 2016 | Multi-entity-security using active Transmission Technology for improved Handling of Exportable security credentials Without privacy restrictions | With the increasing pervasion of our society by mobile devices like smart phones and tablets and many users running several security relevant applications on multiple mobile devices at the same time, security and privacy challenges outranging those on personal computers arise... | Secure Systems | Drop | https://www.cyberwatching.eu/projects/1076/matthew | ||||||||
| 67 | mF2C | 206164 | RIA | Dec 2019 | Towards an Open, Secure, Decentralized and Coordinated Fog-to-Cloud Management Ecosystem | Fog computing brings cloud computing capabilities closer to the end-device and users, while enabling location-dependent resource allocation, low latency services, and extending significantly the IoT services portfolio as well as market and business opportunities in the cloud... | Secure Systems | Assess | https://www.cyberwatching.eu/projects/1078/mf2c | ||||||||
| 68 | MH-MD | 206202 | RIA | Oct 2019 | My Health - My Data | Issues of data subjects’ privacy and data security represent a crucial challenge in the biomedical sector more than in other industries. The current IT landscape in this field shows a myriad of isolated, locally hosted patient data repositories, managed by clinical centres... | Secure Systems | Trial | 6 | 5 | 47 | 47 | 0 | -25 | 2 | https://www.cyberwatching.eu/projects/1079/mh-md | |
| 69 | MIKELANGELO | 194319 | RIA | Dec 2017 | MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and hpc systems | MIKELANGELO is a project, targeted to disrupt the core underlying technologies of Cloud computing, enabling even bigger uptake of Cloud computing, HPC in the Cloud and Big Data technologies under one umbrella. The vision of MIKELANGELO is to improve responsiveness, agility and... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/1080/mikelangelo | ||||||||
| 70 | MITIGATE | 198194 | IA | Feb 2018 | Multidimensional, IntegraTed, rIsk assessment framework and dynamic, collaborative Risk ManaGement tools for critical information infrAstrucTurEs | Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime supply chains (SCs) for port operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/1081/mitigate | ||||||||
| 71 | MUSA | 194208 | RIA | Dec 2017 | MUlti-cloud Secure Applications | The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/1082/musa | ||||||||
| 73 | NeCS | 198283 | MSCA-ITN-ETN | Aug 2019 | European Network for Cyber-security | The European Network for Cybersecurity (NECS) was formed in response to the increased need of highly qualified experts able to cope with all the aspects of the European cybersecurity strategy that is currently under implementation.There is indeed an evident need and... | Identity & Privacy | Trial | https://www.cyberwatching.eu/projects/966/necs | ||||||||
| 74 | OCGN | 202926 | MSCA-IF-EF-ST | Nov 2018 | Traditional Organised Crime and the Internet: The changing organization of illegal gambling networks | Transnational criminal networks utilise Information Communication Technology (ICT) to commit ‘old’ and ‘new’ types of crime. ICT assists in transnational crime (i.e., hacking) and also as a way to exchange information or plan new crimes. Empirical research has... | Operational Risk | Adopt | |||||||||
| 75 | OCTAVE | 194511 | IA | Jul 2017 | Objective Control for TAlker VErification | Industry needs alternatives to textual passwords for access control. While tokens can still be stolen or transferred to other persons, biometrics technology can provide reliable, cost-effective and user-friendly solutions.The proliferation of smart services calls for... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/968/octave | ||||||||
| 77 | OPERANDO | 194891 | IA | Apr 2018 | Online Privacy Enforcement, Rights Assurance and Optimization | The goal of the OPERANDO project is to specify, implement, field-test, validate and exploit an innovative privacy enforcement platform that will enable the Privacy as a Service (PaS) business paradigm and the market for online privacy services.The OPERANDO project will... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/970/operando | ||||||||
| 79 | PaaSword | 194247 | RIA | Dec 2017 | A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework Introducing Distributed Encrypted Persistence in Cloud-based Applications | The vision of PaaSword is to maximize and fortify the trust of individual, professional and corporate customers to Cloud -enabled services and applications, to safeguard both corporate and personal sensitive data stored on Cloud infrastructures and Cloud-based storage... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/973/paasword | ||||||||
| 81 | PANORAMIX | 194872 | IA | Aug 2018 | Privacy and Accountability in Networks via Optimized Randomized Mix-nets | "The objective of the PANORAMIX project is the development of a multipurpose infrastructure for privacy-preserving communications based on ""mix-networks"" (mix-nets) and its integration into high-value applications that can be exploited by European businesses. Mix-nets... | Secure Systems | Adopt | https://www.cyberwatching.eu/projects/972/panoramix | ||||||||
| 86 | PQCRYPTO | 194347 | RIA | Feb 2018 | Post-quantum cryptography for long-term security | Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures and establish secure... | Human Aspects | Hold | https://www.cyberwatching.eu/projects/1022/pqcrypto | ||||||||
| 91 | PrEstoCloud | 206360 | RIA | Dec 2019 | PrEstoCloud - Proactive Cloud Resources Management at the Edge for Efficient Real-Time Big Data Processing | PrEstoCloud project will make substantial research contributions in the cloud computing and real-time data intensive applications domains, in order to provide a dynamic, distributed, self-adaptive and proactively configurable architecture for processing Big Data streams. In... | Human Aspects | Assess | |||||||||
| 95 | PRISM CODE | 105448 | MC-CIG | Oct 2016 | Privacy and Security for Mobile Cooperative Devices | We propose PRISM CODE project (PRIvacy and Security for Mobile COoperative DEvices). The aim of this project is to design some of the fundamental tools for privacy and security of the upcoming distributed services, which are built upon the cooperation of mobile personal devic... | Secure Systems | Drop | |||||||||
| 96 | PRISMACLOUD | 194266 | RIA | Jul 2018 | PRIvacy and Security MAintaining services in the CLOUD | With a current volume of over USD 100 billion and annual growth rates of over 10%, the world-wide market for cloud computing can be considered as the major growth area in ICT. However, big companies and public authorities are reluctant to entrust their most sensitive data to... | Operational Risk | Adopt | https://www.cyberwatching.eu/projects/1029/prismacloud | ||||||||
| 98 | PRIVACY FLAG | 194864 | IA | Apr 2018 | Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments | Privacy Flag combines crowd sourcing, ICT technology and legal expertise to protect citizen privacy when visiting websites, using smart-phone applications, or living in a smart city. It will enable citizens to monitor and control their privacy with a user friendly solution... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/1031/privacy-flag | ||||||||
| 99 | Privacy.Us | 198304 | MSCA-ITN-ETN | Nov 2019 | Privacy and Usabiliy | With the rapid accumulation and processing of personal data by numerous organizations, it is of paramount importance to protect people from adverse uses of their data, while allowing them to enjoy the benefits the use of these data can possibly provide. This is the question of... | Human Aspects | Assess | https://www.cyberwatching.eu/projects/1032/privacyus | ||||||||
| 100 | PRIVACY4FORENSICS | 186180 | MC-IIF - International Incoming Fellowships (IIF) | Mar 2018 | A Formal Rule-Processing Engine for Privacy-Respecting Forensic Investigation | The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once the private data is exposed it is impossible to ‘undo’ its exposure effects should the suspect is found innocent! Ther... | Identity & Privacy | Hold | |||||||||
| 101 | ProBOS | 205768 | SME-2 | Sep 2018 | Protection Beyond Operating System - Development of the next generation cyber security solution | Cybercrime is on the rise in terms of scope and impact, which is facilitated by current environment: increasing use of mobile devices, social networking, mobile communications and cloud computing. Cyber attacks are made mostly against governments and corporates to gather... | Secure Systems | Adopt | |||||||||
| 102 | PROTECTIVE | 202674 | IA | Aug 2019 | Proactive Risk Management through Improved Cyber Situational Awareness | PROTECTIVE is designed to improve an organisations ongoing awareness of the risk posed to its business by cyber security attacks. PROTECTIVE makes two key contributions to achieve this enhanced situational awareness. Firstly it increases the computer security incident response... | Cybersecurity Governance | Trial | https://www.cyberwatching.eu/projects/1036/protective | ||||||||
| 103 | Ps2Share | 206080 | RIA | Dec 2017 | Participation, Privacy and Power in the Sharing Economy | In this project, we propose an in-depth empirical investigation of privacy in the sharing economy. We will investigate three challenges in particular: privacy, participation/exclusion and power. First, sharing services come with compounded privacy risks extending beyond the... | Identity & Privacy | Hold | https://www.cyberwatching.eu/projects/1038/ps2share | ||||||||
| 104 | RAPID | 194186 | RIA | Dec 2017 | Heterogeneous Secure Multi-level Remote Acceleration Service for Low-Power Integrated Systems and Devices | Many low-power devices such as smartphones, tablets, notebooks as well as several other embedded systems can't always cope with the increased demand for processing power, memory and storage required by modern applications in gaming, vision, security, robotics, aerospace, etc... | Operational Risk | Hold | |||||||||
| 105 | REASSURE | 207201 | RIA | Dec 2019 | Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience | Implementing cryptography on embedded devices is an ongoing challenge: every year new implementation flaws are discovered and new attack paths are being used by real life adversaries. Whilst cryptography can guarantee many security properties, it crucially depends on the... | Cybersecurity Governance | Assess | https://www.cyberwatching.eu/projects/1057/reassure | ||||||||
| 107 | REDSENTRY | 211179 | SME-1 | Dec 2017 | Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry | REDSENTRY aims to provide a flexible, scalable and open solution to the ever-changing threat landscape faced by the financial services sector. The threats faced by the financial services industry are varied and constantly evolving and cybercrime is the 2nd most reported type... | Operational Risk | Hold | |||||||||
| 110 | SafeCloud | 194907 | IA | Aug 2018 | Secure and Resilient Cloud Architecture | Cloud infrastructures, despite all their advantages and importance to the competitiveness of modern economies, raise fundamental questions related to the privacy, integrity, and security of offsite data storage and processing tasks. These questions are currently not answered... | Secure Systems | Adopt | https://www.cyberwatching.eu/projects/1060/safecloud | ||||||||
| 111 | SAFEcrypto | 194240 | RIA | Dec 2018 | Secure Architectures of Future Emerging Cryptography | SAFEcrypto will provide a new generation of practical, robust and physically secure post quantum cryptographic solutions that ensure long-term security for future ICT systems, services and applications. Novel public-key cryptographic schemes (digital signatures... | Verification & Assurance | Adopt | https://www.cyberwatching.eu/projects/1062/safecrypto | ||||||||
| 112 | SAFERtec | 207209 | RIA | Dec 2019 | Security Assurance FramEwoRk for neTworked vEhicular teChnology | The assurance of security, privacy, reliability and safety features is key-point to unlock the enormous potential that the connected vehicles systems paradigm i.e., the dynamic Cyberphysical system of highly-equipped infrastructure-connected vehicles with numerous third-party... | Secure Systems | Assess | 2 | 3 | 25 | 21 | 4 | -12 | 26 | https://www.cyberwatching.eu/projects/1063/safertec | |
| 113 | SAINT | 210229 | RIA | Feb 2021 | SYSTEMIC ANALYZER IN NETWORK THREATS | SAINT proposes to analyse and identify incentives to improve levels of collaboration between cooperative and regulatory approaches to information sharing. Analysis of the ecosystems of cybercriminal activity, associated markets and revenues will drive the development of a... | Verification & Assurance | Assess | 7 | 5 | 49 | 33 | 16 | -24 | 16 | https://www.cyberwatching.eu/projects/1065/saint | |
| 114 | SAURON | 210044 | IA | Apr 2019 | Scalable multidimensionAl sitUation awaReness sOlution for protectiNg european ports | Nowadays coordinated and every time more complex terrorist attacks are shocking the world. Due to the progressive rely of industrial sector and many critical infrastructures (CI) (e.g. EU ports) in ICT systems, the impact of a coordinated physical attack, a deliberate... | Secure Systems | Adopt | https://www.cyberwatching.eu/projects/1066/sauron | ||||||||
| 115 | SCISSOR | 194207 | RIA | Dec 2017 | Security In trusted SCADA and smart-grids | In traditional industrial control systems and critical infrastructures, security was implicitly assumed by the reliance on proprietary technologies (security by obscurity), physical access protection and disconnection from the Internet. The massive move, in the last decade... | Operational Risk | Hold | https://www.cyberwatching.eu/projects/1067/scissor | ||||||||
| 116 | SCOTT | 210798 | IA | Jun 2020 | Secure COnnected Trustable Things | Creating trust in wireless solutions and increasing social acceptance are major challenges to achieve the full potential of the Internet of Things. SCOTT, with 57 key partners from 12 countries (EU + Brazil), will provide efficient solutions of wireless, end-to-end secure... | Secure Systems | Assess | https://www.cyberwatching.eu/projects/978/scott | ||||||||
| 117 | SCR | 205788 | SME-1 | Dec 2016 | Disruptive Cybersecurity SaaS for SMEs and freelance developers | After obtaining the Seal of Excellence from the EU (Attached), this is an improved version of the proposal.Given the accelerating growth and importance of cybersecurity across many sectors of the economy and society, we have detected and aim to solve the lack of effective... | Verification & Assurance | Drop | |||||||||
| 118 | SecIoT | 208832 | CSA | Aug 2018 | Cybersecurity Threat Detection for Internet of Things Connected Devices | Secure Secure Ltd was founded in 2015 and headquartered in the UK. The founding team brings extensive experience inthe fields of cybersecurity, scalable software architecture, software company leadership and SME growth. Given theaccelerating growth and importance of... | Secure Systems | Adopt | |||||||||
| 119 | SERECA | 194271 | RIA | Feb 2018 | Secure Enclaves for REactive Cloud Applications | Cloud security is of immediate concern to organisations that must comply with strict confidentiality and integrity policies. More broadly, security has emerged as a commercial imperative for cloud computing across a wide range of markets. The lack of adequate security... | Secure Systems | Hold | https://www.cyberwatching.eu/projects/980/sereca | ||||||||
| 120 | SHARCS | 194217 | RIA | Dec 2017 | Secure Hardware-Software Architectures for Robust Computing Systems | Developing new security paradigms, architectures, and software, for more secure and trustworthy ICT systems and services has clear social, scientific, and market motivation. This motivation is becoming stronger due to the changing threat landscape; over the past decade we are... | Verification & Assurance | Hold | https://www.cyberwatching.eu/projects/982/sharcs | ||||||||
| 121 | SHiELD (Health) | 207185 | RIA | Dec 2019 | European Security in Health Data Exchange | SHiELD will unlock the value of health data to European citizens and businesses by overcoming security and regulatory challenges that today prevent this data being exchanged with those who need it. This will make it possible to provide better health care to mobile citizens... | Identity & Privacy | Assess | https://www.cyberwatching.eu/projects/983/shield | ||||||||
| 122 | SHIELD | 202684 | IA | Feb 2019 | Securing against intruders and other threats through a NFV-enabled environment | Nowadays, cybercrime is one of the most relevant and critical threats to both the economy and society in Europe. Establishing efficient and effective ways to protect services and infrastructures from ever-evolving cyber threats is crucial for sustaining business integrity and... | Secure Systems | Adopt | |||||||||
| 123 | SISSDEN | 202679 | IA | Apr 2019 | Secure Information Sharing Sensor Delivery event Network | SISSDEN is a project aimed at improving the cybersecurity posture of EU entities and end users through development of situational awareness and sharing of actionable information. It builds on the experience of Shadowserver, a non-profit organization well known in the security... | Secure Systems | Adopt | https://www.cyberwatching.eu/projects/984/sissden | ||||||||
| 124 | SMESEC | 210805 | IA | May 2020 | Protecting Small and Medium-sized Enterprises digital technology through an innovative cyber-SECurity framework | Small and Medium size Enterprises (SMEs) are an important driver for innovation and growth in the EU. SMEs also stand to gain the most from innovative technology, because it is complicated and costly for them to set-up and run ICT in the traditional way. Taking into account... | Operational Risk | Assess | 8 | 6 | 58 | 42.5 | 15.5 | -15.5 | 15.5 |