Opendata, web and dolomites

H2020 projects about "attacks"

The page lists 207 projects related to the topic "attacks".

# achronym  title  year 
1 PredicTOOL Nanomethods to understand what makes an endogenous protein immunogenic 2015
2 RGGC Random Graph Geometry and Convergence 2015
3 FELICITY Foundations of Efficient Lattice Cryptography 2015
4 BASTION Leveraging Binary Analysis to Secure the Internet of Things 2015
5 CLARUS A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD 2015
6 HECTOR HARDWARE ENABLED CRYPTO AND RANDOMNESS 2015
7 SAFURE SAFety and secURity by design for interconnected mixed-critical cyber-physical systems 2015
8 SCISSOR Security In trusted SCADA and smart-grids 2015
9 SAFEcrypto Secure Architectures of Future Emerging Cryptography 2015
10 SERECA Secure Enclaves for REactive Cloud Applications 2015
11 PQCRYPTO Post-quantum cryptography for long-term security 2015
12 CAPTOR cAPTor captures Advanced System Threats 2014
13 DARWIN Expecting the unexpected and know how to respond 2015
14 TARGET Training Augmented Reality Generalised Environment Toolkit 2015
15 DOGANA aDvanced sOcial enGineering And vulNerability Assesment Framework 2015
16 KinCoop Do plants cooperate in reproduction? The effect of sharing pollination services on plant reproductive strategies 2015
17 CYBERNETS Cybernetic Communication Networks: Fundamental Limits and Engineering Challenges 2015
18 PBIGP Plant-Bacillus Interaction: Gain of Function Project 2016
19 PANOSTICS The AA2-Ratio: A Novel Diagnostic Biomarker for Primary Aldosteronism 2015
20 SELFNET SELFNET - FRAMEWORK FOR SELF-ORGANIZED NETWORK MANAGEMENT IN VIRTUALIZED AND SOFTWARE DEFINED NETWORKS 2015
21 CSC-IS Development of a more effective and safer therapeutic antibody for cancer treatment with a dual mechanism of action to eliminate CSCs and reactivate the tumour’s immune system. 2015
22 ACT4INFRA Innovative Actuators for empowering smart pipeline infrastructures towards secure water, gas and heating supply 2015
23 CYPRES CYPRES the ICS and SCADA security companion 2015
24 BREATHE EasyFlow: New asthma monitor to enable the effective control of asthma 2015
25 HDIV HDIV: SELF-PROTECTED WEB APPLICATIONS 2015
26 RENOIR Reverse EngiNeering of sOcial Information pRocessing 2016
27 SIREN Securing Internet Routing from the Ground Up 2016
28 STRIKE3 Standardisation of GNSS Threat reporting and Receiver testing through International Knowledge Exchange, Experimentation and Exploitation 2016
29 GPS-Bat Foraging Decision Making in the Real World – revealed from a bat’s point of view by on-board miniature sensors 2016
30 SOPHIA Securing Software against Physical Attacks 2016
31 LOGIMATIC Tight integration of EGNSS and on-board sensors for port vehicle automation 2016
32 CyberWiz Cyber-Security Visualization and CAD-Tool for the Vulnerability Assessment of Critical Infrastructures 2015
33 PROTASIS Restoring Trust in the cyber space: a Systems Security Proposal 2016
34 TOCNeT Teaching Old Crypto New Tricks 2016
35 CIRCUS An end-to-end verification architecture for building Certified Implementations of Robust, Cryptographically Secure web applications 2016
36 MUSLIM-NLNO Muslims condemning violent extremism - An interdisciplinary analysis of public initiatives in the Netherlands and Norway 2001-2015 2016
37 EXTREMDRON Unmanned Aerial Vehicle for protecting soft/critical urban infrastructures, and the general public in extreme environments. 2016
38 RETINAL Retinal Imaging prevention and early detection of chronic diseases 2016
39 DAPS Drone Alarm and Protection System 2016
40 PROTECTIVE Proactive Risk Management through Improved Cyber Situational Awareness 2016
41 SHIELD Securing against intruders and other threats through a NFV-enabled environment 2016
42 CIPSEC Enhancing Critical Infrastructure Protection with innovative SECurity framework 2016
43 iTRACK Integrated system for real-time TRACKing and collective intelligence in civilian humanitarian missions 2016
44 SmartResilience Smart Resilience Indicators for Smart Critical Infrastructures 2016
45 DiSIEM Diversity Enhancements for SIEMs 2016
46 WORLDTIMING II ULTRA ACCURATE WORLD TIMING SERVICES II 2016
47 ConnectProtect A total cyber protection service to Small Businesses operating critical infrastructure and Residential customers 2016
48 EPoCH Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks 2016
49 SURE Safe Unmanned Robotic Ensembles 2016
50 NASUM Innovative nanotech-based detection equipment in the area of homeland security 2016
51 WARMUSIC The War on Music. Heritage, Islam and Peacekeeping in relation to the Islamist attacks in Mali 2017
52 ProBOS Protection Beyond Operating System - Development of the next generation cyber security solution 2016
53 SecTrap Critical urban infrastructure and soft target cyber attack protection. Users and application Behavioural Analysis supported by artificial intelligence to preempt security cyber attacks. 2016
54 Eye-O-T Cyber security system with a high IoT network visibility and fast vulnerability detection for Smart Homes. 2016
55 Zoovel-UC Inaudible SMART CROWDS SECURITY through existing loudspeakers” 2016
56 ThreatMark Advanced Fraud Detection System - Protecting digital transactions against cyber attacks 2016
57 CYRail Cybersecurity in the RAILway sector 2016
58 CVENT Risk assessment of plaque rupture and future cardiovascular events (CVENT) by multi-spectral photoacoustic imaging 2016
59 X5 bitworker X5 bitworker - The Copying System for the Internet of Things and Industry 4.0 2016
60 SHiELD European Security in Health Data Exchange 2017
61 KONFIDO KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services 2016
62 HPHS The History and Politics of Human Shields 2018
63 SECOMP Efficient Formally Secure Compilers to a Tagged Architecture 2017
64 CSP Cross-Layer Design of Securing Positioning 2017
65 OHS On Human Shielding 2017
66 INSTET Integral Security Trust Element for the Internet of Things 2016
67 QSave QUAKE SAVER: Emergency System for Door opening in any critical condition. 2017
68 ACTING-NOW Algorithmic Containment of Threats in Graphs, Networks or Webs 2016
69 SWORD Security Without Obscurity for Reliable Devices 2017
70 BIRTHBRAZIL Birthing Abolition: Reproduction and the Gradual End of Slavery in Brazil 2017
71 PREP-CRYPTO Preparing Cryptography for Modern Applications 2017
72 EVACUATION Testing communication strategies to save lives in emergency evacuation 2018
73 RESCUE Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems Design 2017
74 BaskAtax Modulation of Basket cell microcircuits in cerebellar cortex paroxysmal ataxia disorders 2017
75 SEAL Sound and Early Assessment of Leakage for Embedded Software 2017
76 ENCIRCLE European Cbrn Innovation for the maRket CLuster 2017
77 SAURON Scalable multidimensionAl sitUation awaReness sOlution for protectiNg european ports 2017
78 HERMENEUT Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks 2017
79 ENTRAP Enhanced Neutralisation of explosive Threats Reaching Across the Plot 2017
80 eNOTICE European Network Of CBRN TraIning CEnters 2017
81 DEFENDER Defending the European Energy Infrastructures 2017
82 AF-Cyber Logic-based Attribution and Forensics in Cyber Security 2018
83 CAT-FFLAP Catastrophic Failure in Flexural Lattice Problems 2017
84 SMArtPlate A ductile, high energy absorptive and rapid post-tensioning system for extending life of concrete structures 2017
85 CONNECT Innovative smart components, modules and appliances for a truly connected, efficient and secure smart grid. 2017
86 PyroProf Chemical Profiling of Inorganic and Pyrotechnic Explosives 2017
87 REALTA Challenging Hypertension Through Novel Medical Device Development 2017
88 DNR Blended Learning Course for Police Students: Death Notification with Responsibility 2017
89 REDSENTRY Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry 2017
90 GO 4G InvizBox Go 4G - Security and Privacy, Everywhere 2017
91 LBS-PROTECTION NEW ECOLOGIC PRODUCT THAT INDUCE PLANT DEFENCE MECHANISMS TO INCREASE ORGANIC CROP PROTECTION AGAINST POWDERY MILDEW PEST 2017
92 SocialDiabetes Hack your Diabetes Experience 2017
93 GeoViSense GeoViSense: Towards a transdisciplinary human sensor science of human visuo-spatial decision making with geographic information displays 2017
94 COUNTERCRAFT Intelligence campaigns in the digital realms 2017
95 KNOX Cost advantageous and scalable drone alarm and protection system for urban contexts 2017
96 CURE Constructing a ‘Eubiosis Reinstatement Therapy’ for Asthma 2017
97 TDX-ASSIST Coordination of Transmission and Distribution data eXchanges for renewables integration in the European marketplace through Advanced, Scalable and Secure ICT Systems and Tools 2017
98 AV-SMP Algorithmic Verification of String Manipulating Programs 2017
99 INSIKT Novel Social Data Mining Platform to Detect and Defeat Violent Online Radicalization 2017
100 TFence A patent pending solution/microchip for the IoT cybersecurity market requirements: no access toonline software updates, very small size, inexpensive hardware, low energy consumption. 2017
101 LightCrypt New Directions in Lightweight Cryptanalysis 2017
102 EURO SHOCK Testing the value of a novel strategic approach and its cost efficacy to improve the poor outcomes in Cardiogenic Shock 2018
103 DUST Data Assimilation for Agent-Based Models: Applications to Civil Emergencies 2018
104 FutureTPM Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module 2018
105 SerIoT Secure and Safe Internet of Things 2018
106 PROMETHEUS PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS 2018
107 PhytlSigns Real-time plant monitoring based on bioelectrical signals 2017
108 Genomcore Identity Genomcore Identity: databank proxy for DNA fingerprinting from whole exome/genome for biometric identifica-tion 2018
109 DeepSPIN Deep Learning for Structured Prediction in Natural Language Processing 2018
110 JetDynamics High precision multi-jet dynamics at the LHC 2018
111 TransSec Autonomous emergency manoeuvring and movement monitoring for road transport security 2018
112 YAKSHA Cybersecurity Awareness and Knowledge Systemic High-level Application 2018
113 Wardiam Perimeter An innovative intruder detection hidden technology based on Controlled Magnetic Fields able to detect threats before happening 2018
114 Radiation detector Novel radioactive radiation technology feasibility verification 2018
115 FINSEC Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures 2018
116 RESISTO RESIlience enhancement and risk control platform for communication infraSTructure Operators 2018
117 SAFECARE SAFEguard of Critical heAlth infrastructure 2018
118 Browsec Foundations and Tools for Client-Side Web Security 2018
119 REACT REactively Defending against Advanced Cybersecurity Threats 2018
120 CYBER-TRUST Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things 2018
121 SPEAR SPEAR: Secure and PrivatE smArt gRid 2018
122 RESPONSE 5G Resilient and Secure Multi-controller Communication Platform for 5G Networks 2018
123 PHILOS PHILOS: Real-time Detection and Automated Mitigation of BGP Prefix Hijacking Attacks 2019
124 4D STENT 4D shape memory polymers via microstereolithography for production of thermally responsive stents 2018
125 VeSPA Verification and Specification through Progress Abstractions 2018
126 WONT-HATE Online Hate against European Women Leaders: a Corpus-Assisted Multimodal Critical Analysis 2019
127 IDPOQ Evaluation and implementation of post-quantum cryptographic schemes 2018
128 3DPRINT-VASCU-CHIP 3D Printed Vascular Model-on-Chip Platform with Automated Customization 2018
129 LIAE Laughing in an Emergency: Humour, Cultural Resilience and Contemporary Art 2018
130 SafeMobile Monitor the attacks, not the children - an innovative cloud platform designed to effectively identify and combat cyberbullying events while protecting children’s privacy. 2018
131 RESIST RESilient transport InfraSTructure to extreme events 2018
132 ESCADA Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis 2018
133 ELVER Engineering with Logic and Verification: Mathematically Rigorous Engineering for Safe and Secure Computer Systems 2018
134 DDoS Analyser Revolutionary Non-Disruptive DDoS Testing Technology that significantly strengthens resistance to DDoS attacks and provides ongoing visibility on identified DDoS mitigation vulnerabilities. 2018
135 MeshFlow Distributed core mobile network in a software for highly resilient telecommunications 2018
136 EyeCode A frictionless two-factor authentication software for secure transactions 2018
137 INSTET Securing the Internet of Things with a unique microchip fingerprinting technology 2018
138 THREAT-ARREST THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training 2018
139 SafeZone Fully integrated CBRN incident management system for public safety and private venues with large crowds 2018
140 AQUA4D AQUA4D - For an efficient use of irrigation water 2018
141 ELIoT Pro KEEPING YOUR CONNECTED SMART DEVICES PROTECTED AGAINST HACKERS AND CYBER ATTACKS 2018
142 AirBrush A fast non-intrusive vapour detection system that rapidly identifies explosives in public areas 2018
143 SIGAGuard Cybersecurity anomaly detection solution for critical infrastructures 2018
144 Probe.ly PROBE.LY - Web Application Vulnerability Scanning Suite for Agile Teams 2018
145 IDT The IntelliDogTrainer, a new high throughput training device to train high level security dogs 2018
146 Ammune Mitigating botnet DDoS attacks with an artificial intelligence powered solution 2018
147 TrueProactive ROMAD TrueProactive - a next generation cyber defence software for European SMEs 2018
148 COSMIC CBRNE Detection in Containers 2018
149 MiRTLE Next generation, high performance, long range, standoff, concealed threat detection system to protect European citizens and critical infrastructure 2018
150 SECONDO a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era 2019
151 EPOQUE Engineering post-quantum cryptography 2018
152 OFF-WEGO OFF-network Wireless communications for Emergencies and General Operations 2018
153 NanoMed-CKD Feasibility of mCura1: A kidney-targeted nanomedicine that promotes self-healing of Chronic Kidney Disease with messenger RNA. 2018
154 SecureHospitals.eu Raising Awareness on Cybersecurity in Hospitals across Europe and Boosting Training Initiatives Driven by an Online Information Hub 2018
155 HOPE automatic detection and localization of High frequency Oscillation in Paediatric Epilepsy 2019
156 ASCLEPIOS Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare 2018
157 ProTego Data-protection toolkit reducing risks in hospitals and care centers 2019
158 PdbU Securing Continuous Operations of Mission Critical IoT Endpoints 2019
159 PASS Program Analysis for Safe and Secure Software Evolution 2019
160 SCARE Side-Channel Aware Engineering 2018
161 MPP JIHAD OR RE-INTEGRATION: PATHWAYS OF FOREIGN FIGHTERS AFTER WAR 2019
162 BiowatchID A secure wearable for payments, ticketing, access control and ID management 2019
163 ADVERSARY Digital platform for hands-on cybersecurity training 2018
164 BAnDIT Blockchain Attack and Defense Techniques 2019
165 BitBox BitBox Enterprise - Enterprise-grade Solution for Digital Assets Custody 2019
166 UniSDyn Building up a Unified Theory of Stellar Dynamos 2019
167 Os-X High quality real time broadcasting technology that provides reliable and resilient signal. 2019
168 inCREASE Coding for Security and DNA Storage 2019
169 CAR-OAC Carotid-artery-on-a-chip device to model thromboembolisms induced by vascular lesions and perform drug screenings 2020
170 PHOENIX Electrical Power System’s Shield against complex incidents and extensive cyber and privacy attacks 2019
171 SecureGas Securing The European Gas Network 2019
172 SIMARGL Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware 2019
173 PREVENT PRocurEments of innoVativE, advaNced systems to support security in public Transport 2019
174 FORESIGHT Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments 2019
175 nIoVe A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles 2019
176 SOTER cyberSecurity Optimization and Training for Enhanced Resilience in finance 2019
177 TSS The definitive solution to prevent fuel theft in road goods transport 2019
178 CO-DEfENDENCE Bacteriophages, phage-host interactions and evolution of defence mechanisms in beneficial bacterium Propionibacterium freudenreichii 2020
179 ABOPEN FIRST INSTANT, OFF-THE-LAB AND USER-FRIENDLY BLOOD GROUPING TEST 2019
180 XSPERINSE X-ray SPEctral detectors for Reliable, Intelligent and INnovative SEcurity 2019
181 DIGIACT Digital Authoritarian Practices: Internet Surveillance and Repression against Transnational Activist Networks 2019
182 SPIDER a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services 2019
183 D-FENCE D-FENCE: Deceptive Monitored Environments for Cybersecurity in Enterprises 2019
184 EnergyShield Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures 2019
185 VIEW World first self-responsive emergency call system 2019
186 DIMMs Durable Infrastructure Materials Modified by self-assembled hollow nanostructured materials 2020
187 ODIX 2.0 A revolutionary cybersecurity SaaS helping small-medium business (SMEs) to protect their networks like large corporates do! 2019
188 ALICE Armored Liftable anti-Intrusion Control Equipment 2019
189 UPTEKO First Fully Integrated Drone System for Maritime Operations 2019
190 SOCCRATES SOC & Csirt Response to Attacks & Threats based on attack defence graphs Evaluation Systems 2019
191 CyberSANE Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures 2019
192 AWARE Advanced Face Recognition and CroWd Behavior Analysis for Next GeneRation VidEo Surveillance 2019
193 ESDCI KOBRA encrypted storage device for classified information KOBRA Drive / KOBRA Stick 2019
194 CodeSan Code Sanitization for Vulnerability Pruning and Exploitation Mitigation 2020
195 vACCINE AeronautiCal Cyber INtrusion dEtection mechanism 2019
196 LIP-ATG The missing link: how do membrane lipids interplay with ATG proteins to instruct plant autophagy 2020
197 RAVEN Routing Attack Vulnerability Evaluation for Networks 2020
198 Yodiwo FEMP An eco-friendly, Integrated Facility and Energy Management Platform for continuous reduction of infrastructure operating cost, driven by AI. 2019
199 ADMORPH Towards Adaptively Morphing Embedded Systems 2020
200 UrbTerr Urban Terrorism in Europe (2004-2019): Remembering, Imagining, and Anticipating Violence 2019
201 AERAS A CybEr range tRaining platform for medicAl organisations and systems Security 2019
202 PSOTI Privacy-preserving Services On The Internet 2020
203 DAN High-performance, kiosk-solution for forensic darknet analysis to gain cyber threat intelligence for companies and greatly enhance efficiency and capabilities of European investigation authorities 2019
204 AimingT6SS Mechanisms of dynamic localization of the bacterial Type 6 secretion system assembly 2020
205 TNT Truth-not-Trust 2020
206 SWEET JAZ Tackling plant growth-defense trade-offs by characterizing the role of PRL1 in Jasmonate responses 2020
207 CAESAR Integrating Safety and Cybersecurity through Stochastic Model Checking 2020