Search for European Projects

6 European Projects Found

Searched on 125080 European Projects

 FINISHED 
This project will identify current and future issues in the fight against Cyber crime and cyber terrorism in order to draw a roadmap for cyber security research. A detailed snapshot of the technological, social, economic, political, and legal scenario on which cyber crime and cyber terrorism do develop will be first provided. Then, cyber crime and cyber terrorism will be studied, in order to inde ...
Read Project

 22

 FINISHED 
Over the past decade we are witnessing an ever-increasing amount of cyberattacks on the Internet.Prolific, ingenious, and ranging in style from large-scale worms to "below the radar" phishing attempts, cyberattacks have evolved to unprecedented levels of sophistication. To counter these cyberattacks, defenders are (mostly) developing safeguards, after the attack was made. In the meantime, while de ...
Read Project

 10

 FINISHED 

XHUNTER: Tracking XSS on the Net (XHUNTER)

Start date: Nov 1, 2011, End date: Oct 31, 2014,

"Code-injection attacks through Cross-Site Scripting (XSS) in the web browserhave observed a significant increase over the previous years. According to aSeptember-2009 report published by the SANS Institute, attacks against webapplications constitute more than 60% of the total attack attempts observed onthe Internet. Web application vulnerabilities such as SQL injection andCross-Site Scripting fla ...
Read Project

 1

 FINISHED 

Automated Traffic Profiling of Internet Services (PRAWN) (PRAWN)

Start date: Aug 1, 2011, End date: Jul 31, 2013,

"Over the last few years, the proliferation of Internet services has lead to a dramatic increase of network applications. However, reliable mechanisms for effective traffic profiling of network applications, and classification of the traffic flows according to the applications that generate them remain elusive. This lack of mechanisms combined with the fact that most modern applications intentiona ...
Read Project

 1

 FINISHED 

MALCODE: Malicious Code Detection using Emulation (MALCODE)

Start date: Jul 1, 2010, End date: Jun 30, 2013,

"After many years of security research and engineering, code injection attacks remain one of the most common methods for malware propagation, exposing significant limitations in current state-of-the-art attack detection systems. For instance, the recent massive outbreak of the Conficker worm in the beginning of 2009 resulted to more than 10 million infected machines worldwide. Malicious web sites ...
Read Project

 1

 FINISHED 

Privacy Architectures for System Services (PASS)

Start date: Dec 1, 2008, End date: Nov 30, 2012,

"The proliferation of Internet services and, perhaps unavoidably, Internet crime, has left users more vulnerable than ever before. Taken in conjunction with the expanded deployment of wireless networks and the popularity of mobile devices, this trend is exerting tremendous pressure on user security. Due to the increased likelihood of communication monitoring, the issue of electronic privacy has of ...
Read Project

 1