aditess

Cyber security Week at The Hague, The Netherlands

On the first of October, our partners from CGI together HSD (The Hague Security Delta) participated in the event in the innovation room introducing Cyber-Trust among other CGI security and safety solutions and services in Netherlands. Also Highlights of the Cyber-Trust project were briefly presented.

0
Read More

MEDIA4SEC – Innovative Market Solutions Workshop was held in Brussels, Belgium

MEDIA4SEC – Innovative Market Solutions Workshop was held in Brussels, Belgium. Our partners from Aditess participated on 27th of September 2018, in the attended workshop focused on the impact of social media platforms and information revealed by such platforms. Within the workshop a number of innovative solutions related to the investigation of cybercrime and cybersecurity were presented. Cyber-Trust gained a lot of interest from LEAs participating to the event. The audience was very keen in making questions with regards to…

0
Read More

Meeting at University of Milan – SESAR Lab (Milan) 

Our partners from MATHEMA participated in the meeting at the eleventh of September in 2018 that took place in the technical presentation at University of Milan – SESAR Lab (Milan).The meeting was held at the University of Milan, SEcure Service-oriented Architectures Research Lab. The goal of the meeting was to present the project and to explore next opportunities of collaboration especially in the application of blockchain technology.  

0
Read More

Technical presentation at THALES, Sesto Fiorentino (FI) 

Technical presentation at THALES, Sesto Fiorentino (FI) Our partners from MATHEMA participated in the meeting that was held at the University of Florence with the international research group of the Center for Cyber Security. The goal of the meeting was to discuss the possible common research field for synergies in research and technology transfer.    

0
Read More

Threat sharing methods: comparative analysis

Organizations worldwide, from governments to public and corporate enterprises, are under constant threat by evolving cyber-attacks. The fact that there are literally billions of IoT devices globally, most of which are readily accessible and easily hacked, allows threat actors to use them as the cyber-weapon delivery system of choice in many today’s cyber-attacks, e.g., from botnet-building for launching distributed denial of service attacks, to malware spreading and spamming. The sooner an organization knows about emerging threats, the more efficiently cyber-defense…

0
Read More

Our partners CGI hosting FRONTEX at CGI SPARK innovation center

Hosting FRONTEX at CGI SPARK innovation centre – security and safety solutions and services presented. Among others, on the 25th of May 2018 Cyber-TRUST was presented.  In this workshop, Gohar Sargsyan on behalf of project consortium presented the Cyber-Trust project among other security and safety projects where CGI participates in Rotterdam, The Netherlands. 

0
Read More

Are cracked applications really free? An empirical analysis on Android devices paper presentation

Our partners from UOP on the 12th of Aug, participated with a presentation at the 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018) that was held in Athens, Greece, with the paper entitled “Are cracked applications really free? An empirical analysis on Android devices,” Participation in 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018) that that was held in Athens, Greece, for presenting the paper entitled ” Are cracked applications really free?…

0
Read More

Paper presentation at the 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018)

Our partners from CSCAN and UOP, participated with a presentation at the 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018) that was held in Athens, Greece, with the paper entitled ” A Novel Blockchain–based Trust Model for Cloud Identity Management,” The presentation received many questions regarding the proposed approach. Also, participants demonstrated great interest for the trust management and Blockchain. Cyber-Trust was also presented as this work is a part of the project.

0
Read More

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents. 

Archives