User Tools

Site Tools


projects

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
projects [2021/11/04 07:28] zannonenprojects [2022/01/05 10:17] (current) ggankhuyag
Line 6: Line 6:
 ^ Funding Agency ^ Acronym ^ Full title ^ End date ^ Contact person ^ Additional info ^ ^ Funding Agency ^ Acronym ^ Full title ^ End date ^ Contact person ^ Additional info ^
 |EDA | WINLAS | WIreless sensor Networks for urban Local Areas Surveillance | November 2024 | Nicola Zannone | | |EDA | WINLAS | WIreless sensor Networks for urban Local Areas Surveillance | November 2024 | Nicola Zannone | |
-|NWO (Chist-Era) | ID_IOT | IDentification for the Internet of Things | January 2021 | Boris Skoric | [[ID_IOT|Read more]] | 
-|NWO and DHS | IDEA ICS | IN-DEPTH DEFENSE OF SCADA AND INDUSTRIAL CONTROL SYSTEMS| September 2018 | Sandro Etalle | [[IdeaIcs|Read more]] |  
-|NWO and NSF | BRIDGE | Bridging the Gap between Theory and Practice in Data Privacy | June 2021 | Boris Skoric | [[Bridge|Read more]] | 
 |NWO and DHS | DEPICT | Deep packet intelligence for industrial control systems | 2022 | Sandro Etalle | [[DEPICT|Read more]] |  |NWO and DHS | DEPICT | Deep packet intelligence for industrial control systems | 2022 | Sandro Etalle | [[DEPICT|Read more]] | 
 |EU/Penta | SUNRISE| Shared IOT Security| August 2022| Jerry den Hartog| | |EU/Penta | SUNRISE| Shared IOT Security| August 2022| Jerry den Hartog| |
-|ITEA 3| DEFRADify| Detect Fraudulent Activities in dark web and clear web to protect your business| | Luca Allodi | |+|ITEA 3| DEFRAUDIfy| Detect Fraudulent Activities in dark web and clear web to protect your business| | Luca Allodi | |
 |ITEA 3| DAYTIME| Digital Lifecycle Twins for predictive maintenance| August 2021 | Milan Petkovic| | |ITEA 3| DAYTIME| Digital Lifecycle Twins for predictive maintenance| August 2021 | Milan Petkovic| |
 |ITN| Phil Humans| Personal Health Interfaces Leveraging HUman-MAchine Natural interactionS| Dec 2022 | Milan Petkovic  | | |ITN| Phil Humans| Personal Health Interfaces Leveraging HUman-MAchine Natural interactionS| Dec 2022 | Milan Petkovic  | |
Line 19: Line 16:
 ^ Funding Agency ^ Acronym ^ Full title ^ End date ^ Contact person ^ Additional info ^ ^ Funding Agency ^ Acronym ^ Full title ^ End date ^ Contact person ^ Additional info ^
 | STW (HTSM) | COWBOIS | Certification Of White-BOx Implementation Security | September 2020 | Wil Michiels | [[Cowbois|Read more]] |  | STW (HTSM) | COWBOIS | Certification Of White-BOx Implementation Security | September 2020 | Wil Michiels | [[Cowbois|Read more]] | 
-|NWO/Cyber Security| [[http://security1.win.tue.nl/spyspot/index.html|SpySpot]] | Visualization and deep protocol analysis to detect cyber espionage and targeted malware| Sept 2018 | J.I. den Hartog | [[spyspot|Read more]]| 
 |Philips| | Skin Analytics| September 2021| Milan Petkovic | [[skinanalytics|Read more]]| |Philips| | Skin Analytics| September 2021| Milan Petkovic | [[skinanalytics|Read more]]|
 |NWO/Cyber Securtity | FORWARDT | FORensic WAtermarking with Robust Dynamic Tracing| July 2024| Boris Skoric| |NWO/Cyber Securtity | FORWARDT | FORensic WAtermarking with Robust Dynamic Tracing| July 2024| Boris Skoric|
Line 29: Line 25:
 =====Past Projects===== =====Past Projects=====
 ^ Type ^ Funding Agency ^ Acronym ^ Full title ^ End date ^ Contact person ^ Additional info ^ ^ Type ^ Funding Agency ^ Acronym ^ Full title ^ End date ^ Contact person ^ Additional info ^
 +|National|NWO (Chist-Era) | ID_IOT | IDentification for the Internet of Things | January 2021 | Boris Skoric | [[ID_IOT|Read more]] |
 +|National|NWO and NSF | BRIDGE | Bridging the Gap between Theory and Practice in Data Privacy | June 2021 | Boris Skoric | [[Bridge|Read more]] |
 |European |ECSEL | [[https://www.ecsel.eu/projects/secredas|SECREDAS]] | Product Security for Cross Domain Reliable Dependable Automated Systems | October 2021 | Nicola Zannone | [[SECREDAS|Read more]]| |European |ECSEL | [[https://www.ecsel.eu/projects/secredas|SECREDAS]] | Product Security for Cross Domain Reliable Dependable Automated Systems | October 2021 | Nicola Zannone | [[SECREDAS|Read more]]|
 |European | ITEA3 | [[https://itea3.org/project/appstacle.html|APPSTACLE]] | open standard APplication Platform for carS and TrAnsportation vehiCLEs | December 2019 | Nicola Zannone | [[AppStacle|Read more]]| |European | ITEA3 | [[https://itea3.org/project/appstacle.html|APPSTACLE]] | open standard APplication Platform for carS and TrAnsportation vehiCLEs | December 2019 | Nicola Zannone | [[AppStacle|Read more]]|
Line 53: Line 51:
 |National | STW/Sentinel | S-Mobile | Security of Software and Services for Mobile Systems | January 2011 | Sandro Etalle | [[smobile|Read more]]| |National | STW/Sentinel | S-Mobile | Security of Software and Services for Mobile Systems | January 2011 | Sandro Etalle | [[smobile|Read more]]|
 |National | STW/Sentinels | PINPASJC | Program Inferred Power Analysis in Software -- JavaCard | December 2008 | Sandro Etalle/Jerry den Hartog |[[pinpasjc|Read more]]| |National | STW/Sentinels | PINPASJC | Program Inferred Power Analysis in Software -- JavaCard | December 2008 | Sandro Etalle/Jerry den Hartog |[[pinpasjc|Read more]]|
 +|European|NWO and DHS | IDEA ICS | IN-DEPTH DEFENSE OF SCADA AND INDUSTRIAL CONTROL SYSTEMS| September 2018 | Sandro Etalle | [[IdeaIcs|Read more]] |
 +|National |NWO/Cyber Security| [[http://security1.win.tue.nl/spyspot/index.html|SpySpot]] | Visualization and deep protocol analysis to detect cyber espionage and targeted malware| Sept 2018 | J.I. den Hartog | [[spyspot|Read more]]|
  
projects.1636007288.txt.gz · Last modified: 2021/11/04 07:28 by zannonen