SUCHE
Inhaltstyp
Kategorien
-
Foresight on Demand
- /themen/societal-futures/projects/foresight-on-demand
Interaction Process (Client: EEA) Support to the Mission Board on 'Adaption to Climate Change including Societal Transformation in Horizon Europe ' (Client: DG RTD) Support to the Mission Board on 'Climate Neutral [...] Smart Cities of Horizon Europe ' (Client: DG RTD) Support to the Mission Board on 'Fighting Cancer in Horizon Europe ' (Client: DG RTD) Support to the Mission Board on 'Healthy Oceans, Seas, Coastal and [...] and Inland Waters of Horizon Europe ' (Client: DG RTD) Support to the Mission Board on 'Soil Health and Food of Horizon Europe ' (Client: DG RTD) Support and moderate workshops of the European Commission’s
-
SUNRISE
- /themen/cyber-security/projects/sunrise
provides a unique opportunity to jointly ‘build back better’ with the focus on sustainability and green recovery . SUNRISE will facilitate active collaboration of CIs across Europe to share best practices and [...] points exposed by the current pandemic. (4) Promote our approach across Europe to ensure a united front and resilience of CIs to pandemics. We will carefully consider legal, ethical, societal, economic, and [...] COVID-19 pandemic has highlighted the importance of the continuity of vital services, has shown the need to work together for the common good. It has proven that a pandemic is not only a health crisis and that
-
DISCRETION
- /themen/cyber-security/projects/discretion
Programme, Development of next generation and upgrade of current armoured platforms , including those able to operate in extreme climates and geographical environments Projektlaufzeit: 12/2021-05/2025 × Kontakt
-
QUARTER
- /themen/cyber-security/projects/quarter
QUARTER QUARTER Enabling Quantum Communication Technologies to secure European critical data The main objective of QUARTER is to increase the maturity level of quantum communication (QC) technologies, [...] EU-made QKD systems to TRL8 and start their industrialization, with special focus on physical module security and interfaces for seamless network integration. - Increasing maturity level to TRL8 and start [...] technology for QKD network integration and encryption, this including a key management system with end-to-end security by post-quantum cryptography, software defined network interfaces, modelling tools for
-
QSNP
- /themen/cyber-security/projects/qsnp
order to achieve the specific objectives within each pillar and ensure that know-how transfer and synergy between them are coherent and effective, QSNP has established ST activities corresponding to the [...] (ICT) sectors. QSNP will contribute to the European sovereignty in quantum technology for cybersecurity . Additionally, it will generate significant economic benefits to the whole society, including training [...] gathers the knowhow and expertise from all technology development phases, ranging from innovative designs to development of prototypes for field trials. QSNP is structured around three main Science and Technology
-
QSCAN
- /themen/cyber-security/projects/qscan
QSCAN QSCAN Quantum space surveillance tracking To solve the privacy issues related to usage of third - party data and taking advantage of access to telescopes that allow getting observational data , a [...] will replace the need for sharing agreements and allow to securely computing a probability of collision between space objects without disclosing to other party its own inputs. The implementation of the
-
MUPOL
- /themen/cyber-security/projects/mupol
has increased from 31% to 45% between 2010 and 2019 [3], suggesting a substantial potential for optimisation and carbon-savings. A key approach to improving the situation is to establish a sharing economy [...] with regard to resource utilisation, increasing digitalisation also offers the opportunity to carry out cross-company optimisations and resource allocation. Such optimisations would allow to increase the [...] t needs to reveal any sensitive business information to any other participant in the system, including any third parties or brokers, thereby immediately overcoming the companies’ reluctance to participate
-
HARMONIC
- /themen/cyber-security/projects/harmonic
Management Areas (TMA) and the Airspace Users (AU), to supply networkwide solutions that respect constraints and priorities as far as possible; -to further integrate the Dynamic Airspace Configuration [...] areas -Dynamic Airspace Configuration, covering the third It is a goal for this project to provide mature evolutions to the forementioned concepts, with some elements becoming candidates for early deployment [...] ts would make the implementation of the operational concept more efficient. The core focus being: -to provide automatic support for spot analysis and particularly resolution, using what-if simulations
-
MITIGATE
- /themen/cyber-security/projects/mitigate
process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure , enables optimal security measures to be developed, uses social media to uncover new [...] cyber security resources and supply chain processes. The overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in [...] of the MTITGATE methodology suits the purposes to assess the cyber risks for all business partners involved in a maritime supply chain service (SCS) and to build the basis for the creation of the MITIGATE
-
SAURON
- /themen/cyber-security/projects/sauron
ities and risks in order to assess and adapt their results to the ports current protection systems O2. To produce a multidimensional and scalable SA platform : To develop (to TRL7) and test a multidimensional [...] SAURON is to provide a multidimensional yet installation-specific Situational Awareness (SA) platform to help port operators anticipate and withstand potential cyber, physical or combined threats to their [...] application in order to prevent, detect, respond and mitigate any physical, cyber or combined threat. O3. To fuse the physical environment, including external events and the cyberspace in order to achieve a hybrid
-
PRECINCT
- /themen/cyber-security/projects/precinct
communities to create AI-enabled PRECINCT Ecosystems and enhanced resilience support services. 3. A vulnerability assessment tool that uses Serious Games to identify potential vulnerabilities to cascading [...] effects and to quantify resilience enhancement measures. 4. PRECINCT’s Digital Twins to represent the CIs network topology and metadata profiles, applying closed - loop Machine Learning techniques to detect [...] is becoming more pertinent and highly challenging. PRECINCT aims to connect private and public CI stakeholders in a geographical area to a common cyber-physical security management approach which will yield
-
HyRiM
- /themen/cyber-security/projects/hyrim
network types might be insufficient – referred to as interconnected utility infrastructures in this description. The main objective of this project is to identify and evaluate ‘Hybrid Risk Metrics’ for [...] infrastructures as operated by utility providers. Despite the existence of numerous risk assessment tools to support the utility providers in estimating the nature and impact of possible incidents, risk management [...] assessing and categorizing security risks in interconnected utility infrastructure networks in order to provide foundations for novel protection and prevention mechanisms . The project will provide utility
-
Nobel Grid
- /themen/cyber-security/projects/nobel-grid
services to the DSO, the SLAM provides new energy services to all the actors of smart grid value chain, monitoring and control of advanced smart grid parameters and detecting anomalous values in order to give [...] expected to have significant effect on individual market actors and consumers. DSOs will become more cost effective and obtain a higher Internal Rate of Return (IRR) of up to 8%, compared to the Business [...] from Demand Response campaigns, which can reach up to bill savings of up to 8.5%. The latter type of consumers will also have a significant incentive to become prosumers, as electrification of transportation
-
LABYRINTH
- /themen/cyber-security/projects/labyrinth
, security issues make impossible to fly drones in most situations, due to drone guidance and control-related technologies have not reached enough readiness level to guarantee safe operations in most of [...] technology to avoid drones presence in restricted places, it is not prepared to face the future proliferation of drones in areas such as cities, where drone swarm applications will lead to an increasing [...] in contrast to EU strategy, are one of the NASA’s main research priorities, whose objective is to create flight control centres for auto-piloted drones. Aligned with this, LABYRINTH aims to use this new
-
SIREN
- /themen/cyber-security/projects/siren
are required that enable situational awareness and effective remedial strategies to be executed. These technologies need to operated in a manner that integrates with existing safety systems and processes [...] that can be used to analyse the relationship between human performance , in the context of organisational policies and reactive security technologies, and overall system resilience. To support the development [...] components that use open and standard communication protocols. Consequently, they are suspectible to cyber-attacks, including Advanced Persistent Threats (APTs). In this setting, classical defensive security
-
IDEV40
- /themen/cyber-security/projects/idev40
4.0 Companies aiming to benefit of digitization will have to solve the digitalization challenge by radically thinking on how they can increase their level of digital maturity to integrate their production [...] need-to-know-paradigm, as well as a semantically-enriched data adopting Deep Learning and AI system. • To facilitate the virtualization of the ECS value chain, providing humans and machines access to data [...] of digital culture, leadership, skill-sets of the human workforce to implement the digital change. iDev40 covers the whole value chain to provide sustainable, digital and industrial solutions for integrated
-
PRAETORIAN
- /themen/cyber-security/projects/cyberunity
strategic goal is to increase the security and resilience of European CIs, facilitating the coordinated protection of interrelated CI against combined physical and cyber threats. To that end, the project [...] of Critical Infrastructures (CI) in their decision making to anticipate and withstand potential cyber, physical or combined security threats to their own infrastructures and other interrelated CIs that [...] in a specific CI can jeopardise the normal operation of other neighbouring/interrelated CIs, and how to make all of them more resilient, by predicting cascading effects and proposing a unified response among
-
KITT
- /themen/cyber-security/projects/kitt
Gleichzeitig werden durch die Entwicklungen im Bereich Mobilität 4.0, im speziellen durch die Car-to- Infrastructure Kommunikation (C2I) auch in Tunneln zusätzliche Daten wie bspw. Informationen zur
-
SPARKS
- /themen/cyber-security/projects/sparks
Against Cyber Attacks The first aim that SPARKS will target is to promote awareness of existing and emerging smart grid cyber- security risks to stakeholders, including energy network operators, industry and [...] cases. In addition, the project will investigate privacy issues related to smart grid development , especially in the areas related to customers like smart metering, taking into account existing legislation [...] raise awareness amongst industry leaders, present convincing information to stakeholders, lead the debate and draw through action to improve the cyber readiness of European network operators. Partner: AIT
-
SOCCRATES
- /themen/cyber-security/projects/soccrates
qualified cybersecurity experts. There is a great need to drastically reduce the time to detect and respond to cyber-attacks, and to enable organisations to structurally stay ahead of the threat. SOCCRATES will [...] SOCCRATES SOCCRATES SOC & CSIRT Response to Attacks & Threats based on ADG Evaluation Systems Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks [...] Teams (CSIRTs), that will significantly improve an organisation’s capability to quickly and effectively detect and respond to new cyber threats and ongoing attacks. The SOCCRATES Platform consists of an