Projects overview

Sort by


Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments A Security Architecture for Digital Manufacturing Platforms ICT performance characteristics Cybersecurity Specific security standard(s) addressed and impact on implementation ICT performance characteristics
 Knowledge Representation of Cyber-physical Systems for Monitoring Purpose Result title Knowledge Representation of Cyber-physical Systems for Monitoring Purpose
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
 Risks addressed by security Taxon title Risks addressed by security
 A Security Architecture for Digital Manufacturing Platforms Taxon description To avoid physical harm, collateral damage other safety or cybersecurity issues, having a Security Architecture supporting the Digital Manufacturing Platforms should allow developers and companies at least

iDev40 | Integrated Development 4.0

01-05-2018

-

31-10-2021

Show more information
Description To cope with the exceptional complexity it becomes even more crucial to be competitive leaders in developing virtual representations of real physical implementation.
Organisation GIESECKE+DEVRIENT MOBILE SECURITY GMBH (GD)
 D2.1.4.3 Base Architectures for Virtual/Physical Computing (UC9) Result title D2.1.4.3 Base Architectures for Virtual/Physical Computing (UC9)
 The Sound of Silence - Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects Result description search via the search engines listed on this page.Authors: Ralf Ramsauer, Lukas Bulwahn, Daniel Lohmann, Wolfgang MauererJournal title: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security
Show more information
Description This will result in more job security and direct and indirect job creation in the European manufacturing sector. It will also impact on the employability opportunities.
 Data Security Result title Data Security Result description The security module communicates with multiple detection systems, triggering appropriate responses in the physical and digital world if needed. _____ Data Security or Cyber Security is a subject Result acronym Data Security
Show more information
Description Security and sovereignity of information are guaranteed by IDSA (Industrial Data Space Association)-based solutions for on-demand and controlled sharing of data among organisations, regulated by smart
 Pilot - Batteries Result description Unavoidable chemical and physical degradation of the cells forces battery packs to a performance fade over time.
Show more information
 A decade of research on patterns and architectures for IoT security Result title A decade of research on patterns and architectures for IoT security
 A Systematic Review of Secure IoT Data Sharing Result description Nguyen Gencer ErdoganJournal title: n Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023)Journal publisher: SCITEPRESS – Science and Technology PublicationsPublished
Show more information
 Interoperability standards for circular manufacturing in cyber-physical ecosystems: a survey Result title Interoperability standards for circular manufacturing in cyber-physical ecosystems: a survey
 Aerospace Pilot – Additive manufacturing technology for aerospace – aircraft part customization systems (KANFIT3D) Result description The first step in the process is the use of FEA (Finite Element Analysis), i.e. the simulation of a physical phenomenon using a numerical mathematic technique, for thermal simulation of the printing process
Show more information
Comments Information and communication technologies SOA-EDA Secure IT for Manufacturing Intelligence symbiotically solves the SOA-EDA technical tussle, by defining three main topics to be studied and developed (privacy-security-trust
 Privacy, Security and Data Protection in product-service design Final Result title Privacy, Security and Data Protection in product-service design Final Result description Privacy, Security and Data Protection in product-service design
 Privacy, Security and Data Protection in product-service design First Result description Privacy, Security and Data Protection in product-service design
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description The 5G-ENSURE project will also initiate a 5G Security testbed vision and initial set-up in which the security enablers will be made available.
Comments Business models Potential for new business models Data acquisition Technologies and enablers Data collection, storage, analytics, processing and AI Information and communication technologies Cyper Physical
 5G Security Architecture Result title 5G Security Architecture Result description Therefore the concept of domain has been revised to distinguish between infrastructure domains, related to physical network aspects, and tenant domains, reflecting the logical network aspects. Result acronym 5G Security Architecture
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description engineering and management, adapted to: existing automation and digitalisation engineering methodologies and tools new IoT and SoS automation and digitalisation engineering and management tools security
 A Model for Signatories in Cyber-Physical Systems Result title A Model for Signatories in Cyber-Physical Systems
 A Model for Signatories in Cyber-Physical Systems Result title A Model for Signatories in Cyber-Physical Systems
 A Model for Signatories in Cyber-Physical Systems Result title A Model for Signatories in Cyber-Physical Systems
 Bringing Clouds Down to Earth: Modeling Arrowhead Deployments via Eclipse Vorto Result description ,Sven Erik Jeroschewski (Bosch.IO GmbH), Kevin Olotu (Bosch.IO GmbH), Johannes Kristan (Bosch.IO GmbH)Journal title: Proceedings of the 1st Eclipse Research International Conference on Security, Artificial
Show more information
Description System (DQM) that gathers and organizes data from a Distributed Multi-sensor Network, which, when combined with a DQM Toolkit and Modeling and Simulation Layer, and further integrated with existing Cyber-Physical
 A decade of research on patterns and architectures for IoT security Result title A decade of research on patterns and architectures for IoT security
 Software Engineering and AI for Data Quality in Cyber- Physical Systems - SEA4DQ'21 Workshop Report Result description Nguyen; Sagar Sen; Nicolas Jourdan; Beatriz Cassoli; Per Myrseth; Mikel Armendia; Odd MyklebustJournal title: Software Engineering and AI for Data Quality in Cyber- Physical Systems - SEA4DQ'21 Workshop
Show more information
Description Manufacturing operators are untrained to the manipulation of vulnerable cyber-physical assets.
 Security Through Transparency and Openness in Computer Design Result title Security Through Transparency and Openness in Computer Design
 Secure Manufacturing IoT (Aerospace Manufacturing UC) Result description The presented use case aims at integrating Industrial IoT for flexible management and optimization of cyber physical systems across Tablada, San Pablo Sur & CBC factories.
Show more information
Comments The Security Framework will implement the security core mechanisms aiming to ensure the security, confidentiality, integrity and availability of the managed information for all authorised COMPOSITION stakeholders
 Viability of WSN as ICT overlay for physical security detection Result title Viability of WSN as ICT overlay for physical security detection Result description A public report, led by TNI-UCC, documenting the Viability of WSN as ICT overlay for physical security detection
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Digital manufacturing platforms - data platforms Comments The Security Framework will implement the security core mechanisms aiming to ensure the security, confidentiality, integrity and availability of the managed information for all authorised COMPOSITION stakeholders
Show more information
Comments Virtual Factory Devices Drivers and Open APIs, a set of modules that provide interfaces to physical assets (eg, Sensors) and virtual assets (eg, ERP systems and data) and ease their use in vf-OS Integration
 Management of IoT Devices in a Physical Network Result title Management of IoT Devices in a Physical Network
 vfOS - ID4.2a - Devices Drivers(M24) Result description Device Drivers will typically create gateways to physical peripheral resources (eg machines, controllers, etc.).
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems