G
- GCSCC Global Cyber Security Capacity Centre
P
S
- SCULI SCULI - Securing Convergent Ultra-large Scale Infrastructures
- SNbD Secure Networking by Design (SNbD)
A
- AA-SAFE AA-SAFE: Securing Against Actuator Facing Electromagnetic Attacks
- Analysing Cyber Value-at-Risk
- AppTRE
- Architectures for Trusted Utility Computing
C
- Cloud Internal Threat Detection Insider threat detection
- Corporate Insider Threat Detection Corporate Insider Threat Detection: Cyber Security Inside and Out
- CyberVis
E
- EnCoRe Ensuring Consent and Revocation
- EUSTACE Evaluating Usability, Security, and Trustworthiness of Ad-hoc Collaborative Environments
F
- Fly2Plan Fly2Plan: Enabling a new model aviation data system-of-systems
- Future Home Networks and Services
- FuturICT Unleashing the power of information for a sustainable future
G
- GREAT Governance for Responsible Innovation
H
- HiPerDNO High Performance Computing Technologies for Smart Distribution Network Operation
- HOTSPOT 2017 HOTSPOT 2017 workshop
I
- Identity Security in Cyberspace
- Industrial IoT security Cyber Security for the Industrial IoT
- InfoSec Information Security
- Integrated Mobile Security Kit
- Internet Science Network of Excellence in Internet Science
- ISBP Information Security Best Practice
M
- ManySecured ManySecured Router And Gateway Secure IOT Networking
- MetaVis Research and Development into METAVIS Bio and man-made environmental visual metaphors for insider threat detection in digital systems
- Models and technologies for assured, context-sensitive access control
- myTrustedCloud
N
- Network Security
- Non-Standard Authentication The foundations of non-standard authentication
- Noninterference and covert channel analysis
P
R
- Refinement-friendly bigraphs
- RESPONSIBILITY Global Model and Observatory for International Responsible Research and Innovation Coordination
- RicherPicture Automated network defence through business and threat-led machine learning
S
- SATURN Self-organizing Adaptive Technology underlying Resilient Networks
- Secure Networking by Design
- Secure Web Services Secure and Trustworthy Web Services
- Security of Electric Vehicle Charging Infrastructure
- Security of Satellite Communication Links
- Security Protocols for Ad Hoc Networks
- SmartSociety SmartSociety: hybrid and diversity-aware collective adaptive systems: where people meet machines to build a smarter society
- SOFA Service-Oriented Federated Authorization
- Sponstaneous Security Trustworthy Digital Systems
- Super Identity
T
- TCLOUDS Trustworthy Clouds - Privacy and Resilience for Internet-scale Critical Infrastructure
- TEASE TRUST ENABLING AUGMENTED-REALITY SUPPORT FOR INFORMATION-ENVIRONMENTS
- Trust Domains
- Trustworthy Logging for Distributed Virtual Organisations
W
- webinos Project webinos: Secure WebOS Application Delivery Environment
- WiFire Wireless firewall
- Wireless key generation