Projects
Organising training and setting up networks on the European co-ordination of social security schemes Ghent University
The overall objective of this project is to achieve the free movement of persons by ensuring that social security schemes are properly coordinated, through the increased transfer and exchange of knowledge on the topic among the different key persons and institutions operating at national and European level as well as through the training of a growing number of practitioners in the different Member States.
PROgraMmable integrated photonic nEuromorphic and quanTum networks for High-speed imaging, communications and sEcUrity applicationS Ghent University
Bio-inspired and quantum paradigms are two emerging approaches to computing that aim to overcome the limitations of traditional computing methods. The EU-funded PROMETHEUS project will bridge the gap between bio-inspired and quantum computing by developing a common platform that integrates the strengths of both paradigms. The project will focus on creating a photonic integrated platform that combines the scalability of quantum computing with ...
Bandwidth Management and Security in Mobile Ad Hoc Networks. Hasselt University
AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat Detection KU Leuven
Despite the rapid advancements in AI, effectively integrating it into the cybersecurity pipeline remains a complex endeavor. Key issues encompass the opacity of AI models, the lack of contextually-aware analysis, and the challenges posed by vast, intricate, and unstructured datasets. The core objective of the study is to harness advanced AI techniques, inspired by successful applications in domains like natural language processing and graph ...
Ensuring security and availability of critical networked embedded devices, in the presence of on-device attackers KU Leuven
Driven by the Internet of Things (IoT), the proliferation of smart devices means that almost every aspect of life is monitored, or even controlled by networks of small embedded devices. These devices are increasingly responsible for executing critical control code that has stringent real-time and safety requirements (e.g., cars, train monitoring and control systems, industrial machinery, etc.). This class of devices provides a new attack ...
The Recursive Internet Architecture as a solution for optimal resource consumption, security and scalability of sensor networks: RINAiSense. KU Leuven
The current Internet architecture is over 40 years old. Recently, a revolutionary clean-slate alternative, the Recursive InterNet Architecture (RINA) has been proposed. RINA incorporates the best design decisions made during the last four decades, while fixing critical problems in the current Internet. RINA provides a unified theory of networking by extending Inter-Process Communication (IPC) mechanisms between applications running on a ...
A security architecture for trustworthy networked embedded systems. KU Leuven
Many embedded systems provide hardware security extensions such as custominstruction or co-processors instead of standard security features present in high-end processors. We intend to explore what the advantages, limits and trade-offs are of software support for specific hardware security. This includes a secure boot process, runtime integrity and remote verification, ...
CYMEDSEC : Enhanced cybersecurity for networked medical devices through optimisation of guidelines, standards, risk management and security by design Vrije Universiteit Brussel
of regulatory, cybersecurity, technology, evaluation, and clinical EU experts to address exactly this challenge. It provides close feedback
loops between new technological paradigms and recommendation of regulatory approaches, fostering regulatory science fresh thinking.
It will deliver novel security-by-design solutions for the oversight of ‘Internet of Medical Things’ ...
Securing network protocols and their implementations KU Leuven
Securing interconnected devices has become a vital but error-prone task. Unfortunately, vulnerabilities can be present in both the design and implementation of the network protocol that devices use to communicate. This project explores three areas to better secure network protocols. First, research will be done on techniques to discover logical implementation flaws in network protocols implementations. This will be done by relying on software ...