Knowledge Domains
- Any - Accessibility Algorithmic auditability and accountability Anonymity, pseudonymity, unlinkability, undetectability, or unobservability Anti-forensics and malware analytics Assessment Assessment of information security effectiveness and degrees of control Assurance Assurance, Audit, and Certification Audit Certification Asymmetric cryptography Attack modelling, techniques, and countermeasures Attack techniques Automating security functionality Biometric methods, technologies and tools Capability maturity models Citizen cooperation and reporting Compliance with information security and privacy policies, procedures, and regulations Computer ethics and security Coordination and information sharing in the context of cross-border/organizational incidents Cryptanalysis methodologies, techniques and tools Crypto material management Cryptology Digital signatures Functional encryption Hash functions Homomorphic encryption Mathematical foundations of cryptography Message authentication Post-quantum cryptography Quantum cryptography Random number generation Secure multi-party computation Symmetric cryptography Cyber ranges, Capture the Flag exercises, simulation platforms, educational/training tools, cybersecurity awareness Cybercrime prosecution and law enforcement Cyberpsychology Cybersecurity and cyber-safety co-engineering Cybersecurity concepts, definitions, ontologies, taxonomies, foundational aspects Cybersecurity profiling Cybersecurity regulation analysis and design Cybersecurity uncertainty models Cybersecurity-aware culture Data Security and Privacy Data integrity Data usage control Design, implementation, and operation of data management systems that include security and privacy functions Digital Rights Management Eavesdropping techniques Privacy Enhancing Technologies Privacy requirements for data management systems Risk analysis and attacks with respect to de-anonymization or data re-identification Digital forensic case studies Digital forensic processes and workflow models Digital watermarking Distributed consensus techniques Distributed systems security Distributed systems security analysis and simulation Economic aspects of the cybersecurity ecosystem Education and Training Education methodology Higher Education Professional training Vocational training Enhancing risk perception Fault injection testing and analysis Fault tolerant models Forensic cyberpsychology Formal specification of various aspects of security Formal specification, analysis, and verification of software and hardware Formal verification of security assurance Gamification Governance aspects of incident management, disaster recovery, business continuity History of cybersecurity Human aspects Human aspects of trust Human perception of cybersecurity Human-related risks/threats Non-intrusive security Privacy concerns, behaviours, and practices Psychological models and cognitive processes Security visualization Socio-technical security Transparent security Usability User acceptance of security policies and technologies Identification of the impact of hardware and software changes on the management of Information Security Identity and trust management Identity Management Identity and attribute management models, frameworks, applications, technologies, and tools Identity management quality assurance Legal aspects of identity management Optical and electronic document security Privacy and identity management Protocols and frameworks for authentication, authorization, and rights management Incident Handling and Digital Forensics Incident analysis, communication, documentation, forecasting, response, and reporting Policy issues related to digital forensics Resilience aspects Theories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence Vulnerability analysis and response Information flow modelling and its application to confidentiality policies, composition of systems, and covert channel analysis Intellectual property rights Intrusion detection and honeypots Investigations of computer crime (cybercrime) and security violations Legal and societal issues in information security Legal aspects Malware analysis including adversarial learning of malware Managerial aspects concerning information security Managerial, procedural and technical aspects of network security Measurement and assessment of security levels Model-driven security and domain-specific modelling languages Modelling of cross-sectoral interdependencies and cascading effects Network and Distributed Systems Network attack propagation analysis Network interoperability Network layer attacks and mitigation techniques Network security (principles, methods, protocols, algorithms and technologies) Network steganography Privacy-friendly communication architectures and services Protocols and frameworks for secure distributed computing Requirements for network security Secure distributed computations Secure system interconnection New theoretically-based techniques for the formal analysis and design of cryptographic protocols and their applications Privacy by design Privacy impact assessment and risk management Processes and procedures to ensure device end-of-life security and privacy Quantitative security for assurance Refinement and verification of security management policy models Reputation models Risk management, including modeling, assessment, analysis and mitigation Runtime security verification and enforcement Secure programming principles and best practices Secure software architectures and design Security and risk analysis of components compositions Security design patterns Security documentation Security Management and Governance Standards for Information Security Techniques to ensure business continuity/disaster recovery Threats and vulnerabilities modelling Security Measurements Security analytics and visualization Security metrics, key performance indicators, and benchmarks Validation and comparison frameworks for security metrics Security requirements engineering with emphasis on identity, privacy, accountability, and trust Security support in programming environments Security testing and validation Self-* including self-healing, self-protecting, self-configuration systems Semantics and models for security, accountability, privacy, and trust Social aspects of trust Software and Hardware Security Engineering Vulnerability discovery and penetration testing Steganalysis Steganography Steganography, Steganalysis and Watermarking Theoretical Foundations Trust Management and Accountability Trust and privacy Trust and reputation of social and mainstream media Trust in decision making algorithms Trust in securing digital as well as physical assets Trust management architectures, mechanisms and policies Trusted computing
Sectors
- Any - Audiovisual and media Chemical Defence Digital Services and Platforms Energy Financial Food and drink Government Health Manufacturing and supply chain Nuclear Safety and Security Space Telecomm Infrastructure Transportation
Technologies
- Any - Artificial intelligence Big data Blockchain and Distributed Ledger Technology Cloud, Edge and Virtualisation Hardware technology High-performance computing Human Machine Interface Industrial IoT and Control Systems Information systems Internet of Things, embedded systems, pervasive systems Mobile devices Operating systems Quantum Technologies Robotics Satellite systems and applications UAV Vehicular Systems
Use Cases
- Any - Border and external security Critical Infrastructure Protection Disaster resilience and crisis management Fight against crime and terrorism Local/wide area observation and surveillance Protection of public spaces
Country
Austria Belgium Bulgaria Croatia Cyprus Czechia Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Poland Portugal Romania Slovakia Slovenia Spain Sweden
Dual-use rating
Apply