The page lists 207 projects related to the topic "attacks".
# | |||
---|---|---|---|
1 | PredicTOOL | Nanomethods to understand what makes an endogenous protein immunogenic | 2015 |
2 | RGGC | Random Graph Geometry and Convergence | 2015 |
3 | FELICITY | Foundations of Efficient Lattice Cryptography | 2015 |
4 | BASTION | Leveraging Binary Analysis to Secure the Internet of Things | 2015 |
5 | CLARUS | A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD | 2015 |
6 | HECTOR | HARDWARE ENABLED CRYPTO AND RANDOMNESS | 2015 |
7 | SAFURE | SAFety and secURity by design for interconnected mixed-critical cyber-physical systems | 2015 |
8 | SCISSOR | Security In trusted SCADA and smart-grids | 2015 |
9 | SAFEcrypto | Secure Architectures of Future Emerging Cryptography | 2015 |
10 | SERECA | Secure Enclaves for REactive Cloud Applications | 2015 |
11 | PQCRYPTO | Post-quantum cryptography for long-term security | 2015 |
12 | CAPTOR | cAPTor captures Advanced System Threats | 2014 |
13 | DARWIN | Expecting the unexpected and know how to respond | 2015 |
14 | TARGET | Training Augmented Reality Generalised Environment Toolkit | 2015 |
15 | DOGANA | aDvanced sOcial enGineering And vulNerability Assesment Framework | 2015 |
16 | KinCoop | Do plants cooperate in reproduction? The effect of sharing pollination services on plant reproductive strategies | 2015 |
17 | CYBERNETS | Cybernetic Communication Networks: Fundamental Limits and Engineering Challenges | 2015 |
18 | PBIGP | Plant-Bacillus Interaction: Gain of Function Project | 2016 |
19 | PANOSTICS | The AA2-Ratio: A Novel Diagnostic Biomarker for Primary Aldosteronism | 2015 |
20 | SELFNET | SELFNET - FRAMEWORK FOR SELF-ORGANIZED NETWORK MANAGEMENT IN VIRTUALIZED AND SOFTWARE DEFINED NETWORKS | 2015 |
21 | CSC-IS | Development of a more effective and safer therapeutic antibody for cancer treatment with a dual mechanism of action to eliminate CSCs and reactivate the tumour’s immune system. | 2015 |
22 | ACT4INFRA | Innovative Actuators for empowering smart pipeline infrastructures towards secure water, gas and heating supply | 2015 |
23 | CYPRES | CYPRES the ICS and SCADA security companion | 2015 |
24 | BREATHE | EasyFlow: New asthma monitor to enable the effective control of asthma | 2015 |
25 | HDIV | HDIV: SELF-PROTECTED WEB APPLICATIONS | 2015 |
26 | RENOIR | Reverse EngiNeering of sOcial Information pRocessing | 2016 |
27 | SIREN | Securing Internet Routing from the Ground Up | 2016 |
28 | STRIKE3 | Standardisation of GNSS Threat reporting and Receiver testing through International Knowledge Exchange, Experimentation and Exploitation | 2016 |
29 | GPS-Bat | Foraging Decision Making in the Real World – revealed from a bat’s point of view by on-board miniature sensors | 2016 |
30 | SOPHIA | Securing Software against Physical Attacks | 2016 |
31 | LOGIMATIC | Tight integration of EGNSS and on-board sensors for port vehicle automation | 2016 |
32 | CyberWiz | Cyber-Security Visualization and CAD-Tool for the Vulnerability Assessment of Critical Infrastructures | 2015 |
33 | PROTASIS | Restoring Trust in the cyber space: a Systems Security Proposal | 2016 |
34 | TOCNeT | Teaching Old Crypto New Tricks | 2016 |
35 | CIRCUS | An end-to-end verification architecture for building Certified Implementations of Robust, Cryptographically Secure web applications | 2016 |
36 | MUSLIM-NLNO | Muslims condemning violent extremism - An interdisciplinary analysis of public initiatives in the Netherlands and Norway 2001-2015 | 2016 |
37 | EXTREMDRON | Unmanned Aerial Vehicle for protecting soft/critical urban infrastructures, and the general public in extreme environments. | 2016 |
38 | RETINAL | Retinal Imaging prevention and early detection of chronic diseases | 2016 |
39 | DAPS | Drone Alarm and Protection System | 2016 |
40 | PROTECTIVE | Proactive Risk Management through Improved Cyber Situational Awareness | 2016 |
41 | SHIELD | Securing against intruders and other threats through a NFV-enabled environment | 2016 |
42 | CIPSEC | Enhancing Critical Infrastructure Protection with innovative SECurity framework | 2016 |
43 | iTRACK | Integrated system for real-time TRACKing and collective intelligence in civilian humanitarian missions | 2016 |
44 | SmartResilience | Smart Resilience Indicators for Smart Critical Infrastructures | 2016 |
45 | DiSIEM | Diversity Enhancements for SIEMs | 2016 |
46 | WORLDTIMING II | ULTRA ACCURATE WORLD TIMING SERVICES II | 2016 |
47 | ConnectProtect | A total cyber protection service to Small Businesses operating critical infrastructure and Residential customers | 2016 |
48 | EPoCH | Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks | 2016 |
49 | SURE | Safe Unmanned Robotic Ensembles | 2016 |
50 | NASUM | Innovative nanotech-based detection equipment in the area of homeland security | 2016 |
51 | WARMUSIC | The War on Music. Heritage, Islam and Peacekeeping in relation to the Islamist attacks in Mali | 2017 |
52 | ProBOS | Protection Beyond Operating System - Development of the next generation cyber security solution | 2016 |
53 | SecTrap | Critical urban infrastructure and soft target cyber attack protection. Users and application Behavioural Analysis supported by artificial intelligence to preempt security cyber attacks. | 2016 |
54 | Eye-O-T | Cyber security system with a high IoT network visibility and fast vulnerability detection for Smart Homes. | 2016 |
55 | Zoovel-UC | Inaudible SMART CROWDS SECURITY through existing loudspeakers” | 2016 |
56 | ThreatMark | Advanced Fraud Detection System - Protecting digital transactions against cyber attacks | 2016 |
57 | CYRail | Cybersecurity in the RAILway sector | 2016 |
58 | CVENT | Risk assessment of plaque rupture and future cardiovascular events (CVENT) by multi-spectral photoacoustic imaging | 2016 |
59 | X5 bitworker | X5 bitworker - The Copying System for the Internet of Things and Industry 4.0 | 2016 |
60 | SHiELD | European Security in Health Data Exchange | 2017 |
61 | KONFIDO | KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services | 2016 |
62 | HPHS | The History and Politics of Human Shields | 2018 |
63 | SECOMP | Efficient Formally Secure Compilers to a Tagged Architecture | 2017 |
64 | CSP | Cross-Layer Design of Securing Positioning | 2017 |
65 | OHS | On Human Shielding | 2017 |
66 | INSTET | Integral Security Trust Element for the Internet of Things | 2016 |
67 | QSave | QUAKE SAVER: Emergency System for Door opening in any critical condition. | 2017 |
68 | ACTING-NOW | Algorithmic Containment of Threats in Graphs, Networks or Webs | 2016 |
69 | SWORD | Security Without Obscurity for Reliable Devices | 2017 |
70 | BIRTHBRAZIL | Birthing Abolition: Reproduction and the Gradual End of Slavery in Brazil | 2017 |
71 | PREP-CRYPTO | Preparing Cryptography for Modern Applications | 2017 |
72 | EVACUATION | Testing communication strategies to save lives in emergency evacuation | 2018 |
73 | RESCUE | Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems Design | 2017 |
74 | BaskAtax | Modulation of Basket cell microcircuits in cerebellar cortex paroxysmal ataxia disorders | 2017 |
75 | SEAL | Sound and Early Assessment of Leakage for Embedded Software | 2017 |
76 | ENCIRCLE | European Cbrn Innovation for the maRket CLuster | 2017 |
77 | SAURON | Scalable multidimensionAl sitUation awaReness sOlution for protectiNg european ports | 2017 |
78 | HERMENEUT | Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks | 2017 |
79 | ENTRAP | Enhanced Neutralisation of explosive Threats Reaching Across the Plot | 2017 |
80 | eNOTICE | European Network Of CBRN TraIning CEnters | 2017 |
81 | DEFENDER | Defending the European Energy Infrastructures | 2017 |
82 | AF-Cyber | Logic-based Attribution and Forensics in Cyber Security | 2018 |
83 | CAT-FFLAP | Catastrophic Failure in Flexural Lattice Problems | 2017 |
84 | SMArtPlate | A ductile, high energy absorptive and rapid post-tensioning system for extending life of concrete structures | 2017 |
85 | CONNECT | Innovative smart components, modules and appliances for a truly connected, efficient and secure smart grid. | 2017 |
86 | PyroProf | Chemical Profiling of Inorganic and Pyrotechnic Explosives | 2017 |
87 | REALTA | Challenging Hypertension Through Novel Medical Device Development | 2017 |
88 | DNR | Blended Learning Course for Police Students: Death Notification with Responsibility | 2017 |
89 | REDSENTRY | Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry | 2017 |
90 | GO 4G | InvizBox Go 4G - Security and Privacy, Everywhere | 2017 |
91 | LBS-PROTECTION | NEW ECOLOGIC PRODUCT THAT INDUCE PLANT DEFENCE MECHANISMS TO INCREASE ORGANIC CROP PROTECTION AGAINST POWDERY MILDEW PEST | 2017 |
92 | SocialDiabetes | Hack your Diabetes Experience | 2017 |
93 | GeoViSense | GeoViSense: Towards a transdisciplinary human sensor science of human visuo-spatial decision making with geographic information displays | 2017 |
94 | COUNTERCRAFT | Intelligence campaigns in the digital realms | 2017 |
95 | KNOX | Cost advantageous and scalable drone alarm and protection system for urban contexts | 2017 |
96 | CURE | Constructing a ‘Eubiosis Reinstatement Therapy’ for Asthma | 2017 |
97 | TDX-ASSIST | Coordination of Transmission and Distribution data eXchanges for renewables integration in the European marketplace through Advanced, Scalable and Secure ICT Systems and Tools | 2017 |
98 | AV-SMP | Algorithmic Verification of String Manipulating Programs | 2017 |
99 | INSIKT | Novel Social Data Mining Platform to Detect and Defeat Violent Online Radicalization | 2017 |
100 | TFence | A patent pending solution/microchip for the IoT cybersecurity market requirements: no access toonline software updates, very small size, inexpensive hardware, low energy consumption. | 2017 |
101 | LightCrypt | New Directions in Lightweight Cryptanalysis | 2017 |
102 | EURO SHOCK | Testing the value of a novel strategic approach and its cost efficacy to improve the poor outcomes in Cardiogenic Shock | 2018 |
103 | DUST | Data Assimilation for Agent-Based Models: Applications to Civil Emergencies | 2018 |
104 | FutureTPM | Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module | 2018 |
105 | SerIoT | Secure and Safe Internet of Things | 2018 |
106 | PROMETHEUS | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | 2018 |
107 | PhytlSigns | Real-time plant monitoring based on bioelectrical signals | 2017 |
108 | Genomcore Identity | Genomcore Identity: databank proxy for DNA fingerprinting from whole exome/genome for biometric identifica-tion | 2018 |
109 | DeepSPIN | Deep Learning for Structured Prediction in Natural Language Processing | 2018 |
110 | JetDynamics | High precision multi-jet dynamics at the LHC | 2018 |
111 | TransSec | Autonomous emergency manoeuvring and movement monitoring for road transport security | 2018 |
112 | YAKSHA | Cybersecurity Awareness and Knowledge Systemic High-level Application | 2018 |
113 | Wardiam Perimeter | An innovative intruder detection hidden technology based on Controlled Magnetic Fields able to detect threats before happening | 2018 |
114 | Radiation detector | Novel radioactive radiation technology feasibility verification | 2018 |
115 | FINSEC | Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures | 2018 |
116 | RESISTO | RESIlience enhancement and risk control platform for communication infraSTructure Operators | 2018 |
117 | SAFECARE | SAFEguard of Critical heAlth infrastructure | 2018 |
118 | Browsec | Foundations and Tools for Client-Side Web Security | 2018 |
119 | REACT | REactively Defending against Advanced Cybersecurity Threats | 2018 |
120 | CYBER-TRUST | Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things | 2018 |
121 | SPEAR | SPEAR: Secure and PrivatE smArt gRid | 2018 |
122 | RESPONSE 5G | Resilient and Secure Multi-controller Communication Platform for 5G Networks | 2018 |
123 | PHILOS | PHILOS: Real-time Detection and Automated Mitigation of BGP Prefix Hijacking Attacks | 2019 |
124 | 4D STENT | 4D shape memory polymers via microstereolithography for production of thermally responsive stents | 2018 |
125 | VeSPA | Verification and Specification through Progress Abstractions | 2018 |
126 | WONT-HATE | Online Hate against European Women Leaders: a Corpus-Assisted Multimodal Critical Analysis | 2019 |
127 | IDPOQ | Evaluation and implementation of post-quantum cryptographic schemes | 2018 |
128 | 3DPRINT-VASCU-CHIP | 3D Printed Vascular Model-on-Chip Platform with Automated Customization | 2018 |
129 | LIAE | Laughing in an Emergency: Humour, Cultural Resilience and Contemporary Art | 2018 |
130 | SafeMobile | Monitor the attacks, not the children - an innovative cloud platform designed to effectively identify and combat cyberbullying events while protecting children’s privacy. | 2018 |
131 | RESIST | RESilient transport InfraSTructure to extreme events | 2018 |
132 | ESCADA | Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis | 2018 |
133 | ELVER | Engineering with Logic and Verification: Mathematically Rigorous Engineering for Safe and Secure Computer Systems | 2018 |
134 | DDoS Analyser | Revolutionary Non-Disruptive DDoS Testing Technology that significantly strengthens resistance to DDoS attacks and provides ongoing visibility on identified DDoS mitigation vulnerabilities. | 2018 |
135 | MeshFlow | Distributed core mobile network in a software for highly resilient telecommunications | 2018 |
136 | EyeCode | A frictionless two-factor authentication software for secure transactions | 2018 |
137 | INSTET | Securing the Internet of Things with a unique microchip fingerprinting technology | 2018 |
138 | THREAT-ARREST | THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training | 2018 |
139 | SafeZone | Fully integrated CBRN incident management system for public safety and private venues with large crowds | 2018 |
140 | AQUA4D | AQUA4D - For an efficient use of irrigation water | 2018 |
141 | ELIoT Pro | KEEPING YOUR CONNECTED SMART DEVICES PROTECTED AGAINST HACKERS AND CYBER ATTACKS | 2018 |
142 | AirBrush | A fast non-intrusive vapour detection system that rapidly identifies explosives in public areas | 2018 |
143 | SIGAGuard | Cybersecurity anomaly detection solution for critical infrastructures | 2018 |
144 | Probe.ly | PROBE.LY - Web Application Vulnerability Scanning Suite for Agile Teams | 2018 |
145 | IDT | The IntelliDogTrainer, a new high throughput training device to train high level security dogs | 2018 |
146 | Ammune | Mitigating botnet DDoS attacks with an artificial intelligence powered solution | 2018 |
147 | TrueProactive | ROMAD TrueProactive - a next generation cyber defence software for European SMEs | 2018 |
148 | COSMIC | CBRNE Detection in Containers | 2018 |
149 | MiRTLE | Next generation, high performance, long range, standoff, concealed threat detection system to protect European citizens and critical infrastructure | 2018 |
150 | SECONDO | a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era | 2019 |
151 | EPOQUE | Engineering post-quantum cryptography | 2018 |
152 | OFF-WEGO | OFF-network Wireless communications for Emergencies and General Operations | 2018 |
153 | NanoMed-CKD | Feasibility of mCura1: A kidney-targeted nanomedicine that promotes self-healing of Chronic Kidney Disease with messenger RNA. | 2018 |
154 | SecureHospitals.eu | Raising Awareness on Cybersecurity in Hospitals across Europe and Boosting Training Initiatives Driven by an Online Information Hub | 2018 |
155 | HOPE | automatic detection and localization of High frequency Oscillation in Paediatric Epilepsy | 2019 |
156 | ASCLEPIOS | Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare | 2018 |
157 | ProTego | Data-protection toolkit reducing risks in hospitals and care centers | 2019 |
158 | PdbU | Securing Continuous Operations of Mission Critical IoT Endpoints | 2019 |
159 | PASS | Program Analysis for Safe and Secure Software Evolution | 2019 |
160 | SCARE | Side-Channel Aware Engineering | 2018 |
161 | MPP | JIHAD OR RE-INTEGRATION: PATHWAYS OF FOREIGN FIGHTERS AFTER WAR | 2019 |
162 | BiowatchID | A secure wearable for payments, ticketing, access control and ID management | 2019 |
163 | ADVERSARY | Digital platform for hands-on cybersecurity training | 2018 |
164 | BAnDIT | Blockchain Attack and Defense Techniques | 2019 |
165 | BitBox | BitBox Enterprise - Enterprise-grade Solution for Digital Assets Custody | 2019 |
166 | UniSDyn | Building up a Unified Theory of Stellar Dynamos | 2019 |
167 | Os-X | High quality real time broadcasting technology that provides reliable and resilient signal. | 2019 |
168 | inCREASE | Coding for Security and DNA Storage | 2019 |
169 | CAR-OAC | Carotid-artery-on-a-chip device to model thromboembolisms induced by vascular lesions and perform drug screenings | 2020 |
170 | PHOENIX | Electrical Power System’s Shield against complex incidents and extensive cyber and privacy attacks | 2019 |
171 | SecureGas | Securing The European Gas Network | 2019 |
172 | SIMARGL | Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware | 2019 |
173 | PREVENT | PRocurEments of innoVativE, advaNced systems to support security in public Transport | 2019 |
174 | FORESIGHT | Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments | 2019 |
175 | nIoVe | A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles | 2019 |
176 | SOTER | cyberSecurity Optimization and Training for Enhanced Resilience in finance | 2019 |
177 | TSS | The definitive solution to prevent fuel theft in road goods transport | 2019 |
178 | CO-DEfENDENCE | Bacteriophages, phage-host interactions and evolution of defence mechanisms in beneficial bacterium Propionibacterium freudenreichii | 2020 |
179 | ABOPEN | FIRST INSTANT, OFF-THE-LAB AND USER-FRIENDLY BLOOD GROUPING TEST | 2019 |
180 | XSPERINSE | X-ray SPEctral detectors for Reliable, Intelligent and INnovative SEcurity | 2019 |
181 | DIGIACT | Digital Authoritarian Practices: Internet Surveillance and Repression against Transnational Activist Networks | 2019 |
182 | SPIDER | a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services | 2019 |
183 | D-FENCE | D-FENCE: Deceptive Monitored Environments for Cybersecurity in Enterprises | 2019 |
184 | EnergyShield | Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures | 2019 |
185 | VIEW | World first self-responsive emergency call system | 2019 |
186 | DIMMs | Durable Infrastructure Materials Modified by self-assembled hollow nanostructured materials | 2020 |
187 | ODIX 2.0 | A revolutionary cybersecurity SaaS helping small-medium business (SMEs) to protect their networks like large corporates do! | 2019 |
188 | ALICE | Armored Liftable anti-Intrusion Control Equipment | 2019 |
189 | UPTEKO | First Fully Integrated Drone System for Maritime Operations | 2019 |
190 | SOCCRATES | SOC & Csirt Response to Attacks & Threats based on attack defence graphs Evaluation Systems | 2019 |
191 | CyberSANE | Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures | 2019 |
192 | AWARE | Advanced Face Recognition and CroWd Behavior Analysis for Next GeneRation VidEo Surveillance | 2019 |
193 | ESDCI KOBRA | encrypted storage device for classified information KOBRA Drive / KOBRA Stick | 2019 |
194 | CodeSan | Code Sanitization for Vulnerability Pruning and Exploitation Mitigation | 2020 |
195 | vACCINE | AeronautiCal Cyber INtrusion dEtection mechanism | 2019 |
196 | LIP-ATG | The missing link: how do membrane lipids interplay with ATG proteins to instruct plant autophagy | 2020 |
197 | RAVEN | Routing Attack Vulnerability Evaluation for Networks | 2020 |
198 | Yodiwo FEMP | An eco-friendly, Integrated Facility and Energy Management Platform for continuous reduction of infrastructure operating cost, driven by AI. | 2019 |
199 | ADMORPH | Towards Adaptively Morphing Embedded Systems | 2020 |
200 | UrbTerr | Urban Terrorism in Europe (2004-2019): Remembering, Imagining, and Anticipating Violence | 2019 |
201 | AERAS | A CybEr range tRaining platform for medicAl organisations and systems Security | 2019 |
202 | PSOTI | Privacy-preserving Services On The Internet | 2020 |
203 | DAN | High-performance, kiosk-solution for forensic darknet analysis to gain cyber threat intelligence for companies and greatly enhance efficiency and capabilities of European investigation authorities | 2019 |
204 | AimingT6SS | Mechanisms of dynamic localization of the bacterial Type 6 secretion system assembly | 2020 |
205 | TNT | Truth-not-Trust | 2020 |
206 | SWEET JAZ | Tackling plant growth-defense trade-offs by characterizing the role of PRL1 in Jasmonate responses | 2020 |
207 | CAESAR | Integrating Safety and Cybersecurity through Stochastic Model Checking | 2020 |