The page lists 45 projects related to the topic "malicious".
# | |||
---|---|---|---|
1 | DCM | Distributed Cryptography Module | 2014 |
2 | SERECA | Secure Enclaves for REactive Cloud Applications | 2015 |
3 | CYBERNETS | Cybernetic Communication Networks: Fundamental Limits and Engineering Challenges | 2015 |
4 | REVEN-X1 | REVEN-X1: Automatic Vulnerability Detection in Binary | 2015 |
5 | ACCORD | Algorithms for Complex Collective Decisions on Structured Domains | 2015 |
6 | WATERGUARD | Safeguarding Water Distribution Systems from Contamination Threats using the SmartTap Platform | 2015 |
7 | ENCASE | EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors | 2016 |
8 | CITADEL | Critical Infrastructure Protection using Adaptive MILS | 2016 |
9 | POWVER | Power to the People. Verified. | 2016 |
10 | EPoCH | Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks | 2016 |
11 | SURE | Safe Unmanned Robotic Ensembles | 2016 |
12 | SecTrap | Critical urban infrastructure and soft target cyber attack protection. Users and application Behavioural Analysis supported by artificial intelligence to preempt security cyber attacks. | 2016 |
13 | Eye-O-T | Cyber security system with a high IoT network visibility and fast vulnerability detection for Smart Homes. | 2016 |
14 | HoloCyt | A rapid, low-cost, cervical cancer screening platform | 2017 |
15 | KEEPERS | Keepers: The Key to your Child’s Safety | 2017 |
16 | GICA | Geolocalisation of Individuals in Critical Areas | 2017 |
17 | DeciTrustNET | Trust based Decision Support Systems for Social Networks with Uncertain Knowledge | 2017 |
18 | BOXMATE | Mining Sandboxes for Automatic App Protection | 2017 |
19 | GHOST | Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control | 2017 |
20 | REDSENTRY | Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry | 2017 |
21 | COUNTERCRAFT | Intelligence campaigns in the digital realms | 2017 |
22 | NTSC | New Techniques for Secure Computation | 2017 |
23 | AV-SMP | Algorithmic Verification of String Manipulating Programs | 2017 |
24 | TFence | A patent pending solution/microchip for the IoT cybersecurity market requirements: no access toonline software updates, very small size, inexpensive hardware, low energy consumption. | 2017 |
25 | CHARIOT | Cognitive Heterogeneous Architecture for Industrial IoT | 2018 |
26 | SealedGRID | Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID | 2018 |
27 | Browsec | Foundations and Tools for Client-Side Web Security | 2018 |
28 | CYBER-TRUST | Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things | 2018 |
29 | PHILOS | PHILOS: Real-time Detection and Automated Mitigation of BGP Prefix Hijacking Attacks | 2019 |
30 | ELVER | Engineering with Logic and Verification: Mathematically Rigorous Engineering for Safe and Secure Computer Systems | 2018 |
31 | Intigriti | The Ethical Hacking Platform - Sharing Economy for Security Testing | 2018 |
32 | Ammune | Mitigating botnet DDoS attacks with an artificial intelligence powered solution | 2018 |
33 | PRISENODE | PRISENODE: Privacy- and secuRity-aware solutIons in SoftwarE-defiNed fOg Data cEnter | 2020 |
34 | C4IIoT | Cyber security 4.0: protecting the Industrial Internet Of Things | 2019 |
35 | COMP4DRONES | Framework of key enabling technologies for safe and autonomous drones’ applications | 2019 |
36 | e-DNA BotStop | e-DNA BotStop | 2019 |
37 | SOCCRATES | SOC & Csirt Response to Attacks & Threats based on attack defence graphs Evaluation Systems | 2019 |
38 | CyberSANE | Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures | 2019 |
39 | AT2 | Asynchronous Trustworthy Transactions | 2019 |
40 | CARAMEL | Artificial Intelligence based cybersecurity for connected and automated vehicles | 2019 |
41 | RAVEN | Routing Attack Vulnerability Evaluation for Networks | 2020 |
42 | Ngrave | The World’s Most Secure Cryptocurrency Safeguarding Solution | 2019 |
43 | CIPHRA | CIPHRA | 2020 |
44 | TNT | Truth-not-Trust | 2020 |
45 | CAESAR | Integrating Safety and Cybersecurity through Stochastic Model Checking | 2020 |