UPMC
Funder
300 Projects, page 1 of 60
assignment_turned_in Project2010 - 2013Partners:POLITO, TP VISION EUROPE BV, UPMC, GUAVUS, EURECOM +9 partnersPOLITO,TP VISION EUROPE BV,UPMC,GUAVUS,EURECOM,TECHNICOLOR,TechnipFMC (France),UW,TNO,Telefonica Research and Development,TECHNICOLOR,PCL,Home Automation Europe B.V,MARTEL GMBHFunder: European Commission Project Code: 258378more_vert assignment_turned_in Project2012 - 2015Partners:UPMC, CEA Fontenay-aux-Roses, Hôpital Albert Calmette, Hôpital Saint-LouisUPMC,CEA Fontenay-aux-Roses,Hôpital Albert Calmette,Hôpital Saint-LouisFunder: Institut National du Cancer Project Code: INCa-5667more_vert assignment_turned_in Project2009 - 2010Partners:OAW, NHRF, University of Konstanz, STRATICELL SCREENING TECHNOLOGIES, UWIC +10 partnersOAW,NHRF,University of Konstanz,STRATICELL SCREENING TECHNOLOGIES,UWIC,UCL,Semmelweis University,University of Namur,CNRS,UNIBO,INSTITUT NATIONAL DE LA SANTE ET DE LA RECHERCHE MEDICALE,University of Łódź,UPMC,Newcastle University,University of TübingenFunder: European Commission Project Code: 200970more_vert Open Access Mandate for Publications assignment_turned_in Project2015 - 2018Partners:SIXSQ, Sorbonne University, RADIO6ENSE, KUL, ASSYSTEM E&OS +5 partnersSIXSQ,Sorbonne University,RADIO6ENSE,KUL,ASSYSTEM E&OS,SALZBURG RESEARCH FORSCHUNGSGESELLSCHAFT M.B.H.,SEA SOCIETÀ ELETTRICA DI FAVIGNANA SPA,CNIT,UPMC,Jagiellonian UniversityFunder: European Commission Project Code: 644425Overall Budget: 3,989,850 EURFunder Contribution: 3,534,850 EURIn traditional industrial control systems and critical infrastructures, security was implicitly assumed by the reliance on proprietary technologies (security by obscurity), physical access protection and disconnection from the Internet. The massive move, in the last decade, towards open standards and IP connectivity, the growing integration of Internet of Things technologies, and the disruptiveness of targeted cyber-attacks, calls for novel, designed-in, cyber security means. Taking an holistic approach, SCISSOR designs a new generation SCADA security monitoring framework, comprising four layers: i) a monitoring layer supporting traffic probes providing programmable traffic analyses up to layer 7, new ultra low cost/energy pervasive sensing technologies, system and software integrity verification, and smart camera surveillance solutions for automatic detection and object classification; ii) a control and coordination layer adaptively orchestrating remote probes/sensors, providing a uniform representation of monitoring data gathered from heterogeneous sources, and enforcing cryptographic data protection, including certificate-less identity/attribute-based encryption schemes; iii) a decision and analysis layer in the form of an innovative SIEM fed by both highly heterogeneous monitoring events as well as the native control processes’ signals, and supporting advanced correlation and detection methodologies; iv) a human-machine layer devised to present in real time the system behavior to the human end user in a simple and usable manner. SCISSOR’s framework will leverage easy-to-deploy cloud-based development and integration, and will be designed with resilience and reliability in mind (no single point of failure). SCISSOR will be assessed via i) an off-field SCADA platform, to highlight its ability to detect and thwart targeted threats, and ii) an on-field, real world deployment within a running operational smart grid, to showcase usability, viability and deployability.
more_vert assignment_turned_in Project2012 - 2016Partners:UPMCUPMCFunder: European Commission Project Code: 321879more_vert
chevron_left - 1
- 2
- 3
- 4
- 5
chevron_right
