Πλατφόρμα για τη δοκιμή νέων τεχνολογιών ασφαλείας, την εκπαίδευση εξειδικευμένων υπερασπιστών ασφαλείας και την υποστήριξη οργανισμών σε αποφάσεις ασφαλείας.
Το TRUSTEE στοχεύει να δημιουργήσει ένα πράσινο, ασφαλές, αξιόπιστο και με επίγνωση του απορρήτου framework που θα συγκεντρώνει διάφορα διεπιστημονικά αποθετήρια δεδομένων.
REFINE aims to create a novel real-time fine-grained air quality monitoring system empowered by advanced technologies in Unmanned Aerial Vehicles (UAVs), Artificial Intelligence (AI), and Wireless Networking.
AIAS aims to design and develop an innovative AI-based security platform for the protection of AI systems’ technical robustness and AI-based operations of organisations
INTACT aims to boost cybersecurity resilience across the IoT-to-Cloud continuum with a software toolbox that combines predictive sensing, optimization, and management functions.
CASTOR’s mission is to create a strong “Continuum of Trust” framework that enhances path agility and ensures reliable device and service provisioning across distributed networks.
cPAID aims to research, design, and develop a cloud-based, platform-agnostic defence framework to safeguard AI applications and operations from these attacks
TRITON aims to revolutionize penetration testing, particularly for defense applications, by integrating advanced technologies such as Artificial Intelligence (AI) and automation
The XTRUST-6G project aims to establish a robust zero-trust security framework, focusing on a resilient, AI-driven, and quantum-safe network and services
TORNADO aims to develop an adaptive cloud robotics platform that empowers autonomous mobile robots (AMRs) to operate efficiently in dynamic, real-world environments
PiQASO aims to provide a comprehensive suite of quantum-safe cryptographic services, ensuring secure and future-proof communication in the face of quantum computing threats
SEQURED aims to fortify, future-proof, and enhance the resilience of defence systems and communication infrastructures against potential threats from quantum computing attacks