Search for European Projects

13 European Projects Found

Searched on 125080 European Projects

 FINISHED 
The assurance of security, privacy, reliability and safety features is key-point to unlock the enormous potential that the connected vehicles systems paradigm i.e., the dynamic Cyberphysical system of highly-equipped infrastructure-connected vehicles with numerous third-party components, can offer towards safer transportation. The emerging systems expose a variety of wireless-communication and har ...
Read Project

 9

 FINISHED 

Cybersecurity in the RAILway sector (CYRail)

Start date: Oct 1, 2016, End date: Sep 30, 2018,

Railway infrastructures are moving towards more intelligent, connected, user-centric and collaborative systems. While it brings many advantages for the industry and users, it also poses new opportunities for cyber-criminals and terrorists. CYRail aims to deliver tailored specifications and recommendations for secure modern rail systems design and operation.The challenges are multiple: wide and dis ...
Read Project

 6

 FINISHED 

Global ATM security management (GAMMA)

Start date: Sep 1, 2013, End date: Aug 31, 2017,

The GAMMA project stems from the recognition that while the SESAR initiative is effectively addressing some security issues in the new global ATM scenarios, there is a need to extend this scope to ensure a comprehensive assessment of the full set of security threats and vulnerabilities affecting ATM, considered as a system of systems and covering operational as well as technological aspects. In ad ...
Read Project

 23

 FINISHED 
...n energy, telecom and security fields, to leverage the critical dimensions of energy, ICT, security and business. Nine project partners are CEA, Utility Partnership Limited, R2M Solutions , GDF Suez, Cassidian CyberSecurity, Telecom Italia, Cardiff University, Waterford Institute of Technology and Laborelec, from five European countries: France, United Kingdom, Italy, Ireland, Belgium.
Read Project

 9

 FINISHED 

European Control System Security Incident Analysis Network (ECOSSIAN)

Start date: Jun 1, 2014, End date: May 31, 2017,

The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of individual CI, across CIs which are depending on each other, and across borders. An approach is required which really integrates functionalities across all these levels. Cooperation of privately operated CIs and public bodies (governments and EU) is difficult b ...
Read Project

 22

 FINISHED 

Secure idenTity acrOss boRders linKed 2.0 (STORK 2.0)

Start date: Apr 1, 2012, End date: Sep 30, 2015,

"Secure idenTity acrOss boRders linKed 2.0" builds on the success and results of STORK by taking further steps to decisively push the lines for wider uptake of eID in Europe, aiming at realising a single European electronic identification & authentication area. Its highly innovative focus lies on the convergence of private and public sectors in an operational framework and infrastructure encompass ...
Read Project

 65

 FINISHED 

Holistic Approaches for Integrity of ICT-Systems (HINT)

Start date: Oct 1, 2012, End date: Sep 30, 2015,

The security of modern ICT (Information and Communication Technologies) systems relies fundamentally on the integrity of hardware components. This is the case for user identification and authentication as in smartcards, e-Id, e-Passports, e-health devices or for the integrity checking of computers and mobile systems as in trusted computing and TPMs. But it is also the case for telecommunication i ...
Read Project

 9

 FINISHED 

Advanced Cyber Defence Centre (ACDC)

Start date: Feb 1, 2013, End date: Jul 31, 2015,

In ACDC, we bring together partners from 14 European countries, including public administrations, private sector organizations and academia, in order to achieve a sustainable victory over a powerful cyber threat commonly known as botnet. We integrate the matured knowledge of our consortium into an integrated strategy ranging from adoption to governance, supported by a full service offer for contro ...
Read Project

 28

 FINISHED 

European CYber Security Protection Alliance (CYSPA)

Start date: Oct 1, 2012, End date: Mar 31, 2015,

The goal of CYSPA is to address trustworthy ICT through a European strategy to protect cyberspace, with target audiences ranging from research communities and industry to public authorities and infrastructure operators.This goal builds on the analysis that the entire cyberspace which embodies our connected society has been created by technology but evolving towards trustworthy ICT requires taking ...
Read Project

 21

 FINISHED 
PEOPLE aims at speeding up the uptake of smart cities through the rapid implementation, deployment and uptake of innovative internet-based services in order to allow facing the main challenges of developed cities at present and towards their future quality of life. This will be enabled by designing and implementing citizen-driven open innovation methodologies and processes.For these purposes, duri ...
Read Project

 9

 FINISHED 
The promise of a truly mobile experience is to have the freedom to roam around anywhere and not be bound to a single location. However, the energy required to keep mobile devices connected to the network over extended periods of time quickly dissipates. In fact, the operational time, has been identified as the number one criteria by the majority of the consumers purchasing a mobile device. Moreove ...
Read Project

 11

 FINISHED 

Secure Identity Across Borders Linked (STORK)

Start date: Jun 1, 2008, End date: Dec 31, 2011,

Description eID - easier access to public services across the EUSeveral barriers to free movement of workers still exist in the EU: for example, it is not easy to access public services while working or living in another country. The European Commission has launched a pilot project to remedy this situation with an EU-wide system for the r ...
Read Project

 35

 FINISHED 

Trusted Embedded Computing (TECOM)

Start date: Jan 1, 2008, End date: Mar 31, 2011,

Trusted Computing (TC) has become meanwhile an established technology for verification and implementation of integrity and security at personal computers. Similar requirements are also needed for embedded computing platforms which have alike trust and security problems due to the increasing complexity and therefore instability of Os and applications as well as connection to the Internet with its s ...
Read Project

 11