The page lists 207 projects related to the topic "attacks".
| # | |||
|---|---|---|---|
| 1 | PredicTOOL | Nanomethods to understand what makes an endogenous protein immunogenic | 2015 | 
| 2 | RGGC | Random Graph Geometry and Convergence | 2015 | 
| 3 | FELICITY | Foundations of Efficient Lattice Cryptography | 2015 | 
| 4 | BASTION | Leveraging Binary Analysis to Secure the Internet of Things | 2015 | 
| 5 | CLARUS | A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD | 2015 | 
| 6 | HECTOR | HARDWARE ENABLED CRYPTO AND RANDOMNESS | 2015 | 
| 7 | SAFURE | SAFety and secURity by design for interconnected mixed-critical cyber-physical systems | 2015 | 
| 8 | SCISSOR | Security In trusted SCADA and smart-grids | 2015 | 
| 9 | SAFEcrypto | Secure Architectures of Future Emerging Cryptography | 2015 | 
| 10 | SERECA | Secure Enclaves for REactive Cloud Applications | 2015 | 
| 11 | PQCRYPTO | Post-quantum cryptography for long-term security | 2015 | 
| 12 | CAPTOR | cAPTor captures Advanced System Threats | 2014 | 
| 13 | DARWIN | Expecting the unexpected and know how to respond | 2015 | 
| 14 | TARGET | Training Augmented Reality Generalised Environment Toolkit | 2015 | 
| 15 | DOGANA | aDvanced sOcial enGineering And vulNerability Assesment Framework | 2015 | 
| 16 | KinCoop | Do plants cooperate in reproduction? The effect of sharing pollination services on plant reproductive strategies | 2015 | 
| 17 | CYBERNETS | Cybernetic Communication Networks: Fundamental Limits and Engineering Challenges | 2015 | 
| 18 | PBIGP | Plant-Bacillus Interaction: Gain of Function Project | 2016 | 
| 19 | PANOSTICS | The AA2-Ratio: A Novel Diagnostic Biomarker for Primary Aldosteronism | 2015 | 
| 20 | SELFNET | SELFNET - FRAMEWORK FOR SELF-ORGANIZED NETWORK MANAGEMENT IN VIRTUALIZED AND SOFTWARE DEFINED NETWORKS | 2015 | 
| 21 | CSC-IS | Development of a more effective and safer therapeutic antibody for cancer treatment with a dual mechanism of action to eliminate CSCs and reactivate the tumour’s immune system. | 2015 | 
| 22 | ACT4INFRA | Innovative Actuators for empowering smart pipeline infrastructures towards secure water, gas and heating supply | 2015 | 
| 23 | CYPRES | CYPRES the ICS and SCADA security companion | 2015 | 
| 24 | BREATHE | EasyFlow: New asthma monitor to enable the effective control of asthma | 2015 | 
| 25 | HDIV | HDIV: SELF-PROTECTED WEB APPLICATIONS | 2015 | 
| 26 | RENOIR | Reverse EngiNeering of sOcial Information pRocessing | 2016 | 
| 27 | SIREN | Securing Internet Routing from the Ground Up | 2016 | 
| 28 | STRIKE3 | Standardisation of GNSS Threat reporting and Receiver testing through International Knowledge Exchange, Experimentation and Exploitation | 2016 | 
| 29 | GPS-Bat | Foraging Decision Making in the Real World – revealed from a bat’s point of view by on-board miniature sensors | 2016 | 
| 30 | SOPHIA | Securing Software against Physical Attacks | 2016 | 
| 31 | LOGIMATIC | Tight integration of EGNSS and on-board sensors for port vehicle automation | 2016 | 
| 32 | CyberWiz | Cyber-Security Visualization and CAD-Tool for the Vulnerability Assessment of Critical Infrastructures | 2015 | 
| 33 | PROTASIS | Restoring Trust in the cyber space: a Systems Security Proposal | 2016 | 
| 34 | TOCNeT | Teaching Old Crypto New Tricks | 2016 | 
| 35 | CIRCUS | An end-to-end verification architecture for building Certified Implementations of Robust, Cryptographically Secure web applications | 2016 | 
| 36 | MUSLIM-NLNO | Muslims condemning violent extremism - An interdisciplinary analysis of public initiatives in the Netherlands and Norway 2001-2015 | 2016 | 
| 37 | EXTREMDRON | Unmanned Aerial Vehicle for protecting soft/critical urban infrastructures, and the general public in extreme environments. | 2016 | 
| 38 | RETINAL | Retinal Imaging prevention and early detection of chronic diseases | 2016 | 
| 39 | DAPS | Drone Alarm and Protection System | 2016 | 
| 40 | PROTECTIVE | Proactive Risk Management through Improved Cyber Situational Awareness | 2016 | 
| 41 | SHIELD | Securing against intruders and other threats through a NFV-enabled environment | 2016 | 
| 42 | CIPSEC | Enhancing Critical Infrastructure Protection with innovative SECurity framework | 2016 | 
| 43 | iTRACK | Integrated system for real-time TRACKing and collective intelligence in civilian humanitarian missions | 2016 | 
| 44 | SmartResilience | Smart Resilience Indicators for Smart Critical Infrastructures | 2016 | 
| 45 | DiSIEM | Diversity Enhancements for SIEMs | 2016 | 
| 46 | WORLDTIMING II | ULTRA ACCURATE WORLD TIMING SERVICES II | 2016 | 
| 47 | ConnectProtect | A total cyber protection service to Small Businesses operating critical infrastructure and Residential customers | 2016 | 
| 48 | EPoCH | Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks | 2016 | 
| 49 | SURE | Safe Unmanned Robotic Ensembles | 2016 | 
| 50 | NASUM | Innovative nanotech-based detection equipment in the area of homeland security | 2016 | 
| 51 | WARMUSIC | The War on Music. Heritage, Islam and Peacekeeping in relation to the Islamist attacks in Mali | 2017 | 
| 52 | ProBOS | Protection Beyond Operating System - Development of the next generation cyber security solution | 2016 | 
| 53 | SecTrap | Critical urban infrastructure and soft target cyber attack protection. Users and application Behavioural Analysis supported by artificial intelligence to preempt security cyber attacks. | 2016 | 
| 54 | Eye-O-T | Cyber security system with a high IoT network visibility and fast vulnerability detection for Smart Homes. | 2016 | 
| 55 | Zoovel-UC | Inaudible SMART CROWDS SECURITY through existing loudspeakers” | 2016 | 
| 56 | ThreatMark | Advanced Fraud Detection System - Protecting digital transactions against cyber attacks | 2016 | 
| 57 | CYRail | Cybersecurity in the RAILway sector | 2016 | 
| 58 | CVENT | Risk assessment of plaque rupture and future cardiovascular events (CVENT) by multi-spectral photoacoustic imaging | 2016 | 
| 59 | X5 bitworker | X5 bitworker - The Copying System for the Internet of Things and Industry 4.0 | 2016 | 
| 60 | SHiELD | European Security in Health Data Exchange | 2017 | 
| 61 | KONFIDO | KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services | 2016 | 
| 62 | HPHS | The History and Politics of Human Shields | 2018 | 
| 63 | SECOMP | Efficient Formally Secure Compilers to a Tagged Architecture | 2017 | 
| 64 | CSP | Cross-Layer Design of Securing Positioning | 2017 | 
| 65 | OHS | On Human Shielding | 2017 | 
| 66 | INSTET | Integral Security Trust Element for the Internet of Things | 2016 | 
| 67 | QSave | QUAKE SAVER: Emergency System for Door opening in any critical condition. | 2017 | 
| 68 | ACTING-NOW | Algorithmic Containment of Threats in Graphs, Networks or Webs | 2016 | 
| 69 | SWORD | Security Without Obscurity for Reliable Devices | 2017 | 
| 70 | BIRTHBRAZIL | Birthing Abolition: Reproduction and the Gradual End of Slavery in Brazil | 2017 | 
| 71 | PREP-CRYPTO | Preparing Cryptography for Modern Applications | 2017 | 
| 72 | EVACUATION | Testing communication strategies to save lives in emergency evacuation | 2018 | 
| 73 | RESCUE | Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems Design | 2017 | 
| 74 | BaskAtax | Modulation of Basket cell microcircuits in cerebellar cortex paroxysmal ataxia disorders | 2017 | 
| 75 | SEAL | Sound and Early Assessment of Leakage for Embedded Software | 2017 | 
| 76 | ENCIRCLE | European Cbrn Innovation for the maRket CLuster | 2017 | 
| 77 | SAURON | Scalable multidimensionAl sitUation awaReness sOlution for protectiNg european ports | 2017 | 
| 78 | HERMENEUT | Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks | 2017 | 
| 79 | ENTRAP | Enhanced Neutralisation of explosive Threats Reaching Across the Plot | 2017 | 
| 80 | eNOTICE | European Network Of CBRN TraIning CEnters | 2017 | 
| 81 | DEFENDER | Defending the European Energy Infrastructures | 2017 | 
| 82 | AF-Cyber | Logic-based Attribution and Forensics in Cyber Security | 2018 | 
| 83 | CAT-FFLAP | Catastrophic Failure in Flexural Lattice Problems | 2017 | 
| 84 | SMArtPlate | A ductile, high energy absorptive and rapid post-tensioning system for extending life of concrete structures | 2017 | 
| 85 | CONNECT | Innovative smart components, modules and appliances for a truly connected, efficient and secure smart grid. | 2017 | 
| 86 | PyroProf | Chemical Profiling of Inorganic and Pyrotechnic Explosives | 2017 | 
| 87 | REALTA | Challenging Hypertension Through Novel Medical Device Development | 2017 | 
| 88 | DNR | Blended Learning Course for Police Students: Death Notification with Responsibility | 2017 | 
| 89 | REDSENTRY | Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry | 2017 | 
| 90 | GO 4G | InvizBox Go 4G - Security and Privacy, Everywhere | 2017 | 
| 91 | LBS-PROTECTION | NEW ECOLOGIC PRODUCT THAT INDUCE PLANT DEFENCE MECHANISMS TO INCREASE ORGANIC CROP PROTECTION AGAINST POWDERY MILDEW PEST | 2017 | 
| 92 | SocialDiabetes | Hack your Diabetes Experience | 2017 | 
| 93 | GeoViSense | GeoViSense: Towards a transdisciplinary human sensor science of human visuo-spatial decision making with geographic information displays | 2017 | 
| 94 | COUNTERCRAFT | Intelligence campaigns in the digital realms | 2017 | 
| 95 | KNOX | Cost advantageous and scalable drone alarm and protection system for urban contexts | 2017 | 
| 96 | CURE | Constructing a ‘Eubiosis Reinstatement Therapy’ for Asthma | 2017 | 
| 97 | TDX-ASSIST | Coordination of Transmission and Distribution data eXchanges for renewables integration in the European marketplace through Advanced, Scalable and Secure ICT Systems and Tools | 2017 | 
| 98 | AV-SMP | Algorithmic Verification of String Manipulating Programs | 2017 | 
| 99 | INSIKT | Novel Social Data Mining Platform to Detect and Defeat Violent Online Radicalization | 2017 | 
| 100 | TFence | A patent pending solution/microchip for the IoT cybersecurity market requirements: no access toonline software updates, very small size, inexpensive hardware, low energy consumption. | 2017 | 
| 101 | LightCrypt | New Directions in Lightweight Cryptanalysis | 2017 | 
| 102 | EURO SHOCK | Testing the value of a novel strategic approach and its cost efficacy to improve the poor outcomes in Cardiogenic Shock | 2018 | 
| 103 | DUST | Data Assimilation for Agent-Based Models: Applications to Civil Emergencies | 2018 | 
| 104 | FutureTPM | Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module | 2018 | 
| 105 | SerIoT | Secure and Safe Internet of Things | 2018 | 
| 106 | PROMETHEUS | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | 2018 | 
| 107 | PhytlSigns | Real-time plant monitoring based on bioelectrical signals | 2017 | 
| 108 | Genomcore Identity | Genomcore Identity: databank proxy for DNA fingerprinting from whole exome/genome for biometric identifica-tion | 2018 | 
| 109 | DeepSPIN | Deep Learning for Structured Prediction in Natural Language Processing | 2018 | 
| 110 | JetDynamics | High precision multi-jet dynamics at the LHC | 2018 | 
| 111 | TransSec | Autonomous emergency manoeuvring and movement monitoring for road transport security | 2018 | 
| 112 | YAKSHA | Cybersecurity Awareness and Knowledge Systemic High-level Application | 2018 | 
| 113 | Wardiam Perimeter | An innovative intruder detection hidden technology based on Controlled Magnetic Fields able to detect threats before happening | 2018 | 
| 114 | Radiation detector | Novel radioactive radiation technology feasibility verification | 2018 | 
| 115 | FINSEC | Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures | 2018 | 
| 116 | RESISTO | RESIlience enhancement and risk control platform for communication infraSTructure Operators | 2018 | 
| 117 | SAFECARE | SAFEguard of Critical heAlth infrastructure | 2018 | 
| 118 | Browsec | Foundations and Tools for Client-Side Web Security | 2018 | 
| 119 | REACT | REactively Defending against Advanced Cybersecurity Threats | 2018 | 
| 120 | CYBER-TRUST | Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things | 2018 | 
| 121 | SPEAR | SPEAR: Secure and PrivatE smArt gRid | 2018 | 
| 122 | RESPONSE 5G | Resilient and Secure Multi-controller Communication Platform for 5G Networks | 2018 | 
| 123 | PHILOS | PHILOS: Real-time Detection and Automated Mitigation of BGP Prefix Hijacking Attacks | 2019 | 
| 124 | 4D STENT | 4D shape memory polymers via microstereolithography for production of thermally responsive stents | 2018 | 
| 125 | VeSPA | Verification and Specification through Progress Abstractions | 2018 | 
| 126 | WONT-HATE | Online Hate against European Women Leaders: a Corpus-Assisted Multimodal Critical Analysis | 2019 | 
| 127 | IDPOQ | Evaluation and implementation of post-quantum cryptographic schemes | 2018 | 
| 128 | 3DPRINT-VASCU-CHIP | 3D Printed Vascular Model-on-Chip Platform with Automated Customization | 2018 | 
| 129 | LIAE | Laughing in an Emergency: Humour, Cultural Resilience and Contemporary Art | 2018 | 
| 130 | SafeMobile | Monitor the attacks, not the children - an innovative cloud platform designed to effectively identify and combat cyberbullying events while protecting children’s privacy. | 2018 | 
| 131 | RESIST | RESilient transport InfraSTructure to extreme events | 2018 | 
| 132 | ESCADA | Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis | 2018 | 
| 133 | ELVER | Engineering with Logic and Verification: Mathematically Rigorous Engineering for Safe and Secure Computer Systems | 2018 | 
| 134 | DDoS Analyser | Revolutionary Non-Disruptive DDoS Testing Technology that significantly strengthens resistance to DDoS attacks and provides ongoing visibility on identified DDoS mitigation vulnerabilities. | 2018 | 
| 135 | MeshFlow | Distributed core mobile network in a software for highly resilient telecommunications | 2018 | 
| 136 | EyeCode | A frictionless two-factor authentication software for secure transactions | 2018 | 
| 137 | INSTET | Securing the Internet of Things with a unique microchip fingerprinting technology | 2018 | 
| 138 | THREAT-ARREST | THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training | 2018 | 
| 139 | SafeZone | Fully integrated CBRN incident management system for public safety and private venues with large crowds | 2018 | 
| 140 | AQUA4D | AQUA4D - For an efficient use of irrigation water | 2018 | 
| 141 | ELIoT Pro | KEEPING YOUR CONNECTED SMART DEVICES PROTECTED AGAINST HACKERS AND CYBER ATTACKS | 2018 | 
| 142 | AirBrush | A fast non-intrusive vapour detection system that rapidly identifies explosives in public areas | 2018 | 
| 143 | SIGAGuard | Cybersecurity anomaly detection solution for critical infrastructures | 2018 | 
| 144 | Probe.ly | PROBE.LY - Web Application Vulnerability Scanning Suite for Agile Teams | 2018 | 
| 145 | IDT | The IntelliDogTrainer, a new high throughput training device to train high level security dogs | 2018 | 
| 146 | Ammune | Mitigating botnet DDoS attacks with an artificial intelligence powered solution | 2018 | 
| 147 | TrueProactive | ROMAD TrueProactive - a next generation cyber defence software for European SMEs | 2018 | 
| 148 | COSMIC | CBRNE Detection in Containers | 2018 | 
| 149 | MiRTLE | Next generation, high performance, long range, standoff, concealed threat detection system to protect European citizens and critical infrastructure | 2018 | 
| 150 | SECONDO | a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era | 2019 | 
| 151 | EPOQUE | Engineering post-quantum cryptography | 2018 | 
| 152 | OFF-WEGO | OFF-network Wireless communications for Emergencies and General Operations | 2018 | 
| 153 | NanoMed-CKD | Feasibility of mCura1: A kidney-targeted nanomedicine that promotes self-healing of Chronic Kidney Disease with messenger RNA. | 2018 | 
| 154 | SecureHospitals.eu | Raising Awareness on Cybersecurity in Hospitals across Europe and Boosting Training Initiatives Driven by an Online Information Hub | 2018 | 
| 155 | HOPE | automatic detection and localization of High frequency Oscillation in Paediatric Epilepsy | 2019 | 
| 156 | ASCLEPIOS | Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare | 2018 | 
| 157 | ProTego | Data-protection toolkit reducing risks in hospitals and care centers | 2019 | 
| 158 | PdbU | Securing Continuous Operations of Mission Critical IoT Endpoints | 2019 | 
| 159 | PASS | Program Analysis for Safe and Secure Software Evolution | 2019 | 
| 160 | SCARE | Side-Channel Aware Engineering | 2018 | 
| 161 | MPP | JIHAD OR RE-INTEGRATION: PATHWAYS OF FOREIGN FIGHTERS AFTER WAR | 2019 | 
| 162 | BiowatchID | A secure wearable for payments, ticketing, access control and ID management | 2019 | 
| 163 | ADVERSARY | Digital platform for hands-on cybersecurity training | 2018 | 
| 164 | BAnDIT | Blockchain Attack and Defense Techniques | 2019 | 
| 165 | BitBox | BitBox Enterprise - Enterprise-grade Solution for Digital Assets Custody | 2019 | 
| 166 | UniSDyn | Building up a Unified Theory of Stellar Dynamos | 2019 | 
| 167 | Os-X | High quality real time broadcasting technology that provides reliable and resilient signal. | 2019 | 
| 168 | inCREASE | Coding for Security and DNA Storage | 2019 | 
| 169 | CAR-OAC | Carotid-artery-on-a-chip device to model thromboembolisms induced by vascular lesions and perform drug screenings | 2020 | 
| 170 | PHOENIX | Electrical Power System’s Shield against complex incidents and extensive cyber and privacy attacks | 2019 | 
| 171 | SecureGas | Securing The European Gas Network | 2019 | 
| 172 | SIMARGL | Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware | 2019 | 
| 173 | PREVENT | PRocurEments of innoVativE, advaNced systems to support security in public Transport | 2019 | 
| 174 | FORESIGHT | Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments | 2019 | 
| 175 | nIoVe | A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles | 2019 | 
| 176 | SOTER | cyberSecurity Optimization and Training for Enhanced Resilience in finance | 2019 | 
| 177 | TSS | The definitive solution to prevent fuel theft in road goods transport | 2019 | 
| 178 | CO-DEfENDENCE | Bacteriophages, phage-host interactions and evolution of defence mechanisms in beneficial bacterium Propionibacterium freudenreichii | 2020 | 
| 179 | ABOPEN | FIRST INSTANT, OFF-THE-LAB AND USER-FRIENDLY BLOOD GROUPING TEST | 2019 | 
| 180 | XSPERINSE | X-ray SPEctral detectors for Reliable, Intelligent and INnovative SEcurity | 2019 | 
| 181 | DIGIACT | Digital Authoritarian Practices: Internet Surveillance and Repression against Transnational Activist Networks | 2019 | 
| 182 | SPIDER | a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services | 2019 | 
| 183 | D-FENCE | D-FENCE: Deceptive Monitored Environments for Cybersecurity in Enterprises | 2019 | 
| 184 | EnergyShield | Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures | 2019 | 
| 185 | VIEW | World first self-responsive emergency call system | 2019 | 
| 186 | DIMMs | Durable Infrastructure Materials Modified by self-assembled hollow nanostructured materials | 2020 | 
| 187 | ODIX 2.0 | A revolutionary cybersecurity SaaS helping small-medium business (SMEs) to protect their networks like large corporates do! | 2019 | 
| 188 | ALICE | Armored Liftable anti-Intrusion Control Equipment | 2019 | 
| 189 | UPTEKO | First Fully Integrated Drone System for Maritime Operations | 2019 | 
| 190 | SOCCRATES | SOC & Csirt Response to Attacks & Threats based on attack defence graphs Evaluation Systems | 2019 | 
| 191 | CyberSANE | Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures | 2019 | 
| 192 | AWARE | Advanced Face Recognition and CroWd Behavior Analysis for Next GeneRation VidEo Surveillance | 2019 | 
| 193 | ESDCI KOBRA | encrypted storage device for classified information KOBRA Drive / KOBRA Stick | 2019 | 
| 194 | CodeSan | Code Sanitization for Vulnerability Pruning and Exploitation Mitigation | 2020 | 
| 195 | vACCINE | AeronautiCal Cyber INtrusion dEtection mechanism | 2019 | 
| 196 | LIP-ATG | The missing link: how do membrane lipids interplay with ATG proteins to instruct plant autophagy | 2020 | 
| 197 | RAVEN | Routing Attack Vulnerability Evaluation for Networks | 2020 | 
| 198 | Yodiwo FEMP | An eco-friendly, Integrated Facility and Energy Management Platform for continuous reduction of infrastructure operating cost, driven by AI. | 2019 | 
| 199 | ADMORPH | Towards Adaptively Morphing Embedded Systems | 2020 | 
| 200 | UrbTerr | Urban Terrorism in Europe (2004-2019): Remembering, Imagining, and Anticipating Violence | 2019 | 
| 201 | AERAS | A CybEr range tRaining platform for medicAl organisations and systems Security | 2019 | 
| 202 | PSOTI | Privacy-preserving Services On The Internet | 2020 | 
| 203 | DAN | High-performance, kiosk-solution for forensic darknet analysis to gain cyber threat intelligence for companies and greatly enhance efficiency and capabilities of European investigation authorities | 2019 | 
| 204 | AimingT6SS | Mechanisms of dynamic localization of the bacterial Type 6 secretion system assembly | 2020 | 
| 205 | TNT | Truth-not-Trust | 2020 | 
| 206 | SWEET JAZ | Tackling plant growth-defense trade-offs by characterizing the role of PRL1 in Jasmonate responses | 2020 | 
| 207 | CAESAR | Integrating Safety and Cybersecurity through Stochastic Model Checking | 2020 |