Projects overview

Sort by


Show more information
Comments and AI Information and communication technologies Data collection, storage, analytics, processing and AI Technologies and enablers Information and communication technologies Cognitive and artificial
 Cognitive and artificial intelligence (AI) technologies - machine learning Taxon title Cognitive and artificial intelligence (AI) technologies - machine learning
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description the introduction of digital technologies in their product and service offerings.
 Cybersecurity in connected medical devices Result title Cybersecurity in connected medical devices
 Periodic Reporting for period 1 - DigiFed (Digital Innovation Hubs (DIH) federation for large scale adoption of digital technologies by European SMEs) Result description introduction of digital technologies in their product and service...
Show more information
Organisation Pumacy Technologies AG
Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
 Data-driven FMECA Mechanisms Result title Data-driven FMECA Mechanisms
 Information Processing for Generating Recommendations Ahead of Time in an IoT-Based Environment Result description engines listed on this page.Authors: Alexandros Bousdekis, Nikos Papageorgiou, Babis Magoutas, Dimitris Apostolou, Gregoris MentzasJournal title: International Journal of Monitoring and Surveillance Technologies
 Information and communication technologies Taxon title Information and communication technologies
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls. Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
Show more information
Description technologies to support the introduction of advanced robotic systems in the production processes.
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 Evaluation of cyber security in agile manufacturing: Maturity of Technologies and Applications Result title Evaluation of cyber security in agile manufacturing: Maturity of Technologies and Applications
 Design and development of training material and delivery mechanisms Result description The means to deliver the required education and training knowledge will be specified by employing the latest of industrial technology and knowledge transfer mechanisms.
Show more information
Organisation BOC INFORMATION TECHNOLOGIES CONSULTING SP. Z.O.O.
Comments Cybersecurity ICT performance characteristics Data Analytics and Complex Event Processing will deal with semantic interoperability and security at lower data acquisition layers Scalability ICT performance
 D1.2: Manufacturing cases elucidation and market analysis Result description The main objective of D1.2 is to establish the industrial and commercial backdrop against which the DISRUPT technologies will be developed in order to meet business expectations for both end-user industries
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description ConnectedFactories II CSA focuses on the following targets and activities: Supporting a common and structured understanding of key enablers and cross-cutting factors with regard to the deployment of digital technologies
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result title CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result acronym CF_Final_Event_Cybersecurity
 Knowledge delivery mechanisms towards a knowledge-intensive industrial workforce Result description A report on the identification of appropriate novel knowledge delivery mechanisms in accordance with the new job requirements
Show more information
Comments of the IEC-61499 technology with specific security-related mechanisms Scalability ICT performance characteristics The whole concept of “orchestrated distributed automation” enabled by IEC-61499 has been
 Periodic Reporting for period 2 - Daedalus (Distributed control and simulAtion platform to support an Ecosystem of DigitAL aUtomation developerS) Result description industry at European level"The future of Europe’s industry must be digital, as clearly highlighted by Commissioner Oettinger EU-wide strategy to “ensure that all industrial sectors make the best use of new technologies
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Organisation ENEA - Italian National Agency for New Technologies, Energy and Sustainable Economic Development
Comments Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 Governance Mechanisms for Federated Digital Platform Ecosystems Result title Governance Mechanisms for Federated Digital Platform Ecosystems
 Design of an Open API for the NIMBLE Platform Result description A report on 3rd party mechanisms
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Programming Frameworks – Software Development Kits (SDKs) Comments Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
Show more information
Comments Information and communication technologies Technologies and enablers ICT solutions for next generation data storage and information mining Technologies and enablers Data storage Data collection, storage
 The impact of IoT technologies on product-oriented PSS: The “home delivery” service case Result title The impact of IoT technologies on product-oriented PSS: The “home delivery” service case
 Cooperative knowledge mechanisms in product-service value chains Final Result description Cooperative knowledge mechanisms in product-service value chains
 Cooperative knowledge mechanisms in product-service value chains First Result description Cooperative knowledge mechanisms in product-service value chains
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments The Security Framework will implement the security core mechanisms aiming to ensure the security, confidentiality, integrity and availability of the managed information for all authorised COMPOSITION stakeholders
 Design of the Security Framework II Result title Design of the Security Framework II Result description A public report, led by ATOS, documenting the Design of the Security Framework; this updates D4.1
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Digital manufacturing platforms - data platforms Comments The Security Framework will implement the security core mechanisms aiming to ensure the security, confidentiality, integrity and availability of the managed information for all authorised COMPOSITION stakeholders
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments Cybersecurity ICT performance characteristics DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level
 Collaborative Technologies in Automotive and Aerospace Industries towards Industry 4.0. Result title Collaborative Technologies in Automotive and Aerospace Industries towards Industry 4.0.
 D6.2: Knowledge Protection Specification Result description A survey on protection mechanisms in the aviation industry shows how  the  implementation  is  seen  in  practice.
 Cybersecurity Taxon title Cybersecurity
 APIs and Integration Protocols Taxon description mechanisms.
Show more information
Description Interaction by providing a set of safe, easy to use, intuitive, personalized and context aware multimodal human-automation interaction mechanisms.
Comments Cybersecurity ICT performance characteristics Security and privacy risk assessment to identify countermeasures to be included in the A4BLUE framework.
 Landing gear retraction actuator assembly: Manual deburring operation | Assembly process (CESA) Result description contrary, assembly information is fragmented through different platforms, complex assembly instructions are not adapted to technicians’ profiles, training is long and complex and feedback gathering mechanisms
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description Moreover, it will research technologies that enable AI systems to confront sophisticated adversaries and to remain robust against security attacks.
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 Cyber-Defence Mechanisms against Poisoning and Evasion Attacks-Initial version Result title Cyber-Defence Mechanisms against Poisoning and Evasion Attacks-Initial version Result description Prototype implementation and detailed report on the cyberdefence mechanisms of tasks T32 and T33 M15 Initial version
Show more information
Description To do that we have brought together a total of thirteen (13) EU-based partners, representing both industry and academia, having ample experience in cutting-edge technologies and active presence in the
Comments Distributed ledger technology ICT performance characteristics Security mechanisms and technologies Cybersecurity Z-Fact0r system is a distributed system by desing.
 Report on standards (a) used and (b) generated in Z-Fact0r Result description In the first step, already existing standards will be evaluated (as exposed above) in term of their applicability to Z-Factor technologies.
 Security mechanisms and technologies Taxon title Security mechanisms and technologies
 APIs and Integration Protocols Taxon description mechanisms.
Show more information
Description Nearly 50 reusable technical building blocks will be developed and utilized, proving cross-domain sharing of trustable wireless technologies and services.
Comments Security mechanisms and technologies ICT performance characteristics Cybersecurity Distributed ledger technology ICT performance characteristics Security mechanisms and technologies Cybersecurity Real-time
 Trust technologies advances Result title Trust technologies advances
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
 Security mechanisms and technologies Taxon title Security mechanisms and technologies
 APIs and Integration Protocols Taxon description mechanisms.