{"id":891,"date":"2017-03-14T16:41:03","date_gmt":"2017-03-14T15:41:03","guid":{"rendered":"http:\/\/webs.um.es\/felixgm\/?page_id=891"},"modified":"2024-08-29T21:53:48","modified_gmt":"2024-08-29T20:53:48","slug":"projects","status":"publish","type":"page","link":"https:\/\/webs.um.es\/felixgm\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<p>[vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">European Research Projects<\/h3>\n<ul class=\"ul-withdetails \"><\/p>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2023\/03\/guardianLogo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>EU-GUARDIAN: European Framework and Proofs-of-concept for the Intelligent Automation of Cyber Defence Incident Management<\/h3><p>European Defence Fund, 101103044, 13.454.545.33\u20ac, 01\/12\/2022 \u2013 01\/11\/2025<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p align=\"justify\">EU-GUARDIAN aims at creating a cutting-edge, accurate and reliable AI-based solution that operates and automates larger parts of incident management and cyber defence processes. Focusing on the ability to detect, mitigate and respond to security challenges semi-automatically or automatically; support analysts and decision-makers at all levels; and contribute to enhancing cyber situational awareness, military infrastructure resilience and protection against advanced cyber threats. On these grounds, EU-GUARDIAN will make progress on understanding the relevant actors and the threat environment where AI-based cyber defence systems will interact with; creating AI-based techniques for detecting and understanding adversarial activity, as well as for building knowledge about own protected ICT systems; shaping AI-based information collection and storage systems that can dynamically adapt their strategy to the situation perceived; and building AI-based decision systems which are risk and impact aware. All components will follow the key requirements of human agency and oversight; technical robustness; privacy; algorithmic transparency; diversity and accountability; and proof-of-concept feasibility analysis will support each component. The multidisciplinary and highly specialised Consortium will present the results of EU-GUARDIAN, which will facilitate the tedious task of analysing large amounts of data; will improve cyber operational capability; drive a reduction in costs; and above all, they will contribute to EU cyber defence posture and to the laying of the foundations for prompting the EU autonomy in development and capacitation of AI-based resources.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2023\/03\/hexa-x_logo_color_large.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>Hexa-X : A Flagship for B5G\/6G Vision and Intelligent Fabric of Technology Enablers Connecting Human, Physical, and Digital Worlds<\/h3><p>European Commission, H2020, 101015956, 11.916.175\u20ac, 01\/01\/2021 \u2013 30\/06\/2023<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p align=\"justify\">At a time when Europe and the rest of the world are dealing with major obstacles, future challenges will need to be met to ensure growth and sustainability. Post-pandemic, a clear vision is needed to guarantee digital inclusion and ensure health and safety while working towards environmental goals. The EU-funded Hexa-X project seeks to contribute to shape this vision, and develop tools necessary to bring the next generation of wireless communications to Europe and beyond. It will achieve this by working on groundbreaking communication technologies, architectures and artificial intelligence-enabled networks. This will help secure growth and sustainability while creating the future of wireless communications worldwide.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2021\/10\/valkyries_logo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>VALKYRIES - Harmonization and Pre-Standardization of Equipment, Training and Tactical Coordinated procedures for First Aid Vehicles deployment on European multi-victim Disasters<\/h3><p>European Commission, H2020-ICT, 101020676, 5.995.757,50\u20ac, 01\/10\/2021 - 30\/09\/2023<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>A methodology for tracking and analysing the needs for standardization and certification harmonization thorough the project life cycle will be defined and enforced, which will allow the early identification of issues related to the conceptualization, design, implementation, integration and deployment of tools for support the EU disaster resiliency; which will be facilitated by a complete consultation strategy to the different stakeholders that are expected to act at each capability development phase, ranging from providers to end users. On these grounds H2020-VALKYRIES will develop, integrate and demonstrate capabilities for enabling immediate and coordinated emergency response including search and rescue, security and health, in scenarios of natural\/provoked catastrophes with multiple victims, with special application in cases in which several regions or countries are affected and hence greater interoperability being required. H2020-VALKYRIES will propose both design and development of a modular, interoperable, scalable and secure platform, which will allow the integration between legacy solutions and new technologies. The platform will be able to deploy services and dynamically adapt its behaviour, as the emergency requires it. A series of use cases and demonstrators will be developed placing an emphasis on cross-frontier and cross-sectorial BLOS (Beyond Line of Sight) scenarios, where the usual communications infrastructure could have been damaged, and emergency response teams are deployed without an accurate view of the operation environment.<\/p>\n<p><a href=\"https:\/\/cordis.europa.eu\/project\/id\/101020676\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/cordis.europa.eu\/project\/id\/101020676<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>INDRA Sistemas SA (Spain)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>Servicio Madrile\u00f1o de Salud (Spain)<\/li>\n<li>Tassica Emergency Training and Research SA (Spain)<\/li>\n<li>Iisem-Institut pre Medinarodnu Bezpecnost a Krizove Riadenie (Slovakia)<\/li>\n<li>Scuola Superiore di Studi Universitari e di Perfezzionament S Anna (Italy)<\/li>\n<li>Blockchain2050 (Netherlands)<\/li>\n<li>Institut po Otbrana (Bulgary)<\/li>\n<li>Bulgarian Red Cross (Bulgary)<\/li>\n<li>Kentro Meleton Asfaleias (Greece)<\/li>\n<li>Hospital do Espirito Santo de Evora EPE (Portugal)<\/li>\n<li>Aratos Ntot NET LTD (Greece)<\/li>\n<li>Universitetet i Sorost-Norge (Norway)<\/li>\n<li>Agenzia Regionale Emergenza Urgenza (Italy)<\/li>\n<li>Elliniki Omaga Diasosis Somateio (Greece)<\/li>\n<li>Novotec Consultores SA (Spain)<\/li>\n<li>Particle Summary (Portugal)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2020\/02\/PALANTIR-Logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>PALANTIR - Practical Autonomous Cyberhealth for resilient SMEs and Microenterprises<\/h3><p>European Commission, H2020-ICT, 883335, 4.046.908,38\u20ac, 01\/09\/2020 - 31\/08\/2023<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>PALANTIR aims at bridging the gap between large enterprises and SMEs\/MEs, by providing multi-layered, infrastructure-wide threat monitoring, cyber-resiliency and knowledge sharing in a heterogeneous ecosystem, while at the same time being able to market these services to third parties in the form of Security-as-a-service (SECaaS). PALANTIR will implement a coherent privacy assurance, data protection, incident detection and recovery framework, focusing on the case of highly dynamic service-oriented systems and networks, taking advantage of their inherent programmability features and abstractions. PALANTIR will also focus on cyber-resiliency leveraging the features of service-oriented systems key building features by a) applying and exploiting Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies; b) considering emerging paradigms such as the application of scalable artificial Intelligence, standardization and threat-sharing techniques to risk analysis, network operation, monitoring and management and c) ensuring the SME\u2019s compliance with the relevant data privacy and protection regulations in the data breach age, implementing the \u00abPrivacy by Default\u00bb and the \u00abPrivacy by Design\u00bb principles on how personal data is collected, used, transferred and stored between 3rd party businesses and entities. The end result will be an evolving, expandable and unified framework, tailored to the individual needs of every SME and ME, reducing the complexity level of usual security tools while still being affordable and thus attractive for adoption.<\/p>\n<p><a href=\"https:\/\/cordis.europa.eu\/project\/id\/883335\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/cordis.europa.eu\/project\/id\/883335<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>DBC Europe (Belgium)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>Fundaci\u00f3 i2CAT (Spain)<\/li>\n<li>Telef\u00f3nica Investigaci\u00f3n y Desarrollo (Spain)<\/li>\n<li>Infili Technologies (Greece)<\/li>\n<li>Space Hellas (Greece)<\/li>\n<li>Hewlett-Packard Limited (UK)<\/li>\n<li>NEC Laboratories Europe (Germany)<\/li>\n<li>Politecnico di Torino (Italy)<\/li>\n<li>Incites Consulting (Luxembourg)<\/li>\n<li>National Center for Scientific Research Demokritos (Greece)<\/li>\n<li>Orion Innovations (Greece)<\/li>\n<li>Ubitech (Cyprus)<\/li>\n<li>Sfera IT (Slovenia)<\/li>\n<li>Helenic Army Academy (Greece)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/11\/5gzorro-logo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>5GZORRO - Zero-Touch Security and Trust for Ubiquitous Computing and Connectivity in 5G Networks<\/h3><p>European Commission, H2020-ICT, 871533, 4.999.965\u20ac, 01\/11\/2019 - 30\/04\/2022<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>5GZORRO uses distributed Artificial Intelligence (AI) to implement cognitive network orchestration and management with minimal manual intervention (Zero-Touch Automation). Distributed Ledger Technologies (DLT) are adopted to implement flexible and efficient distributed security and trust across the various parties involved in a 5G end-to-end service chain. With these, an evolved 5G Service Layer can be implemented for Smart Contracts among multiple non-trusted parties, to allow SLA monitoring, spectrum sharing, intelligent and automated data-driven resource discovery and management.<\/p>\n<p><a href=\"https:\/\/cordis.europa.eu\/project\/rcn\/225650\/factsheet\/en\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/cordis.europa.eu\/project\/rcn\/225650\/factsheet\/en<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Fundaci\u00f3 i2CAT (Spain)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>Telef\u00f3nica Investigaci\u00f3n y Desarrollo (Spain)<\/li>\n<li>Nextworks (Italy)<\/li>\n<li>Intracom (Greece)<\/li>\n<li>Ubiwhere LDA (Portugal)<\/li>\n<li>Bartr Holding Limited (UK)<\/li>\n<li>Comunicare Digitale APS (Italy)<\/li>\n<li>Malta Communication Authority (Malta)<\/li>\n<li>Fondazione Bruno Kessler (Italy)<\/li>\n<li>IBM Israel Science &amp; Technology Ltd (Israel)<\/li>\n<li>Altice Lab (Portugal)<\/li>\n<li>ATOS (Spain)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/01\/5ginfire.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>5G-CAGE - 5G-enabled Context and situational Awareness detection with machine learninG techniques of city objects in Experimental vertical instances<\/h3><p>European Commission, H2020-5GINFIRE-OC2 Call, 75.000\u20ac, 01\/12\/2018 - 31\/05\/2019<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>5G-CAGE builds on monitoring and analysis of video streams collected from heterogeneous and distributed sources in Smart City deployments with the aim of providing advanced features for early detection of specific city safety elements not currently supported by the 5GINFIRE platform and capabilities. To this end, 5G-CAGE plans to provide to 5GINFIRE a new VxF, called City Object Detection (CODet)<\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Universidad de Murcia (Spain)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/12\/SoftFIRE_Logo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>BotsOnFIRE - Mitigation of Botnets in Federated SDN\/NFV Infrastructures for 5G<\/h3><p>European Commission, H2020-SOFTFIRE-OC3 Call, 50.000\u20ac, 17\/11\/2017 - 16\/02\/2018<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>BotsOnFIRE is intended to demonstrate how an autonomic solution based on a combination of NFV orchestration and SDN applications can be dynamically and automatically adapted in case of cybersecurity threats (e.g. bot agents from a botnet) affecting devices which can move across different domains.<\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Universidad de Murcia (Spain)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Nextworks (Italy)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/09\/SELFNET-LOGO.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SELFNET \u2013 Framework for Self-Organized Network Management in Virtualized and Software Defined Networks<\/h3><p>European Commission, H2020-ICT, 671672, 6.866.496\u20ac, 01\/07\/2015 - 30\/06\/2018<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>The SELFNET project designs and implements an autonomic network management framework to achieve self-organizing capabilities in managing network infrastructures by automatically detecting and mitigating a range of common network problems that are currently still being manually addressed by network operators, thereby significantly reducing operational costs and improving user experience.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/197349_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/197349_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Eurescom Gmbh (Germany)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>PT Inova\u00e7ao e Sistemas SA (Portugal)<\/li>\n<li>Deutsches Forschungszentrum fuer Kuenstliche Intelligenz Gmbh (Germany)<\/li>\n<li>University of West of Scotland (United Kingdom)<\/li>\n<li>Universidad Complutense de Madrid (Spain)<\/li>\n<li>Nextworks (Italy)<\/li>\n<li>Innoroute Gmbh (Germany)<\/li>\n<li>Alvarion Technologies Ltd (Israel)<\/li>\n<li>Ubiwhere LDA (Portugal)<\/li>\n<li>PROEF, SGPS SA (Portugal)<\/li>\n<li>Creative Systems Engineering (Greece)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/logo_SMARTIE.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SMARTIE: Secure and sMArter ciTIes data management<\/h3><p>European Commission, FP7-ICT, 609062, 3.286.000\u20ac, 01\/09\/2013 - 31\/12\/2016<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>The SMARTIE project works on security, privacy and trust for data exchange between IoT devices and consumers of their information. Results are demonstrated in smart cities in Germany, Serbia and Spain. Further partners are from Portugal and the UK.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/109944_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/109944_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>IHP Gmbh (Germany)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Green Way Systems Gmbh (Germany)<\/li>\n<li>Instituto de Fomento de la Regi\u00f3n de Murcia (Spain)<\/li>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>PT Inova\u00e7ao e Sistemas SA (Portugal)<\/li>\n<li>DunavNet (Serbia)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<\/ul>\n<h4><strong>Remarks<\/strong><\/h4>\n<ul>\n<li>WP7 Leader: Exploitation, dissemination, standardisation<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/AU2EU_Logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>AU2EU: Authentication and Authorisation for Entrusted Unions<\/h3><p>European Commission, FP7-ICT, 611659, 2.950.000\u20ac, 01\/12\/2013 - 30\/11\/2015<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>The aim of the AU2EU project is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational\/governmental jurisdictions.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/111357_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/111357_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Technische Universiteit Eindhoven (Netherlands)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Edith Cowan University (Australia)<\/li>\n<li>CSIRO (Australia)<\/li>\n<li>Macquarie University (Australia)<\/li>\n<li>University of New South Wales (Australia)<\/li>\n<li>RMIT University (Australia)<\/li>\n<li>IBM Research Gmbh (Switzerland)<\/li>\n<li>Deutsches Rotes Kreuz Heidelberg (Germany)<\/li>\n<li>Thales Communications &amp; Security SAS (France)<\/li>\n<li>Bicore (Netherlands)<\/li>\n<li>Philips Electronics (Netherlands)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<li>Thales Services SAS (France)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/attps-logo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>ATTPS: Achieving The Trust Paradigm Shift<\/h3><p>European Commission, Coordination and Support Actions, 317665, 1.950.000\u20ac, 01\/07\/2012 - 30\/11\/2015<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>ATTPS supports TDL (<a href=\"https:\/\/trustindigitallife.eu\" target=\"_blank\" rel=\"noopener noreferrer\">www.trustindigitallife.eu<\/a>) in addressing the relationship and balance between the business, legal, social and technical aspects of a public trust platform as well as pragmatic actions such as developing and the testing of generic trust architectures and integration pilots. ATTPS strengthens TDL\u2019s road-mapping by implementing and supporting the SRA and actively contributes to the awareness raising for trustworthy ICT solutions.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/105734_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/105734_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Bicore (Netherlands)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Cryptas IT-Security Gmbh (Austria)<\/li>\n<li>EIT ICT Labs (Belgium)<\/li>\n<li>Technische Universitaet Berlin (Germany)<\/li>\n<li>Nokia OYJ (Finland)<\/li>\n<li>Thales Services SAS (France)<\/li>\n<li>Thales Communications &amp; Security SAS (France)<\/li>\n<li>Gemalto SA (France)<\/li>\n<li>Philips Electronics (Netherlands)<\/li>\n<li>KTH (Sweden)<\/li>\n<li>Verizon European Holdings (United Kingdom)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<\/ul>\n<h4><strong>Remarks<\/strong><\/h4>\n<ul>\n<li>WP3 Leader: Interoperability, Architecture and Test bed<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/logo_HBB-Next.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>HBB-Next: Next-Generation Hybrid Broadcast Broadband<\/h3><p>European Commission, FP7-ICT, 287848, 2.975.979\u20ac, 01\/10\/2011 - 31\/03\/2014<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>HBB-NEXT will lay the foundations for advanced hybrid multi-user services by building upon existing standards and by enhancing them.The project seeks to facilitate the convergence of the broadcast and Internet world by researching user- centric technologies for enriching the TV-viewing experience with social networking, multiple device access, group-tailored content recommendations, as well as the seamless mixing of broadcast content, of complementary Internet content and of user-generated content.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/100252_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/100252_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Rundfunk Berlin-Brandenburg (Germany)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Katholieke Universiteit Leuven (Belgium)<\/li>\n<li>Technische Hochschule Mittelhessen (Germany)<\/li>\n<li>Tara Systems Gmbh (Germany)<\/li>\n<li>Institut fuer Rundfunktechnik (Germany)<\/li>\n<li>TNO (Netherlands)<\/li>\n<li>Slovak Telekom AS (Slovakia)<\/li>\n<li>STUBA (Slovakia)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<\/ul>\n<h4><strong>Remarks<\/strong><\/h4>\n<ul>\n<li>WP3 Leader: Identity, Security and Trust<\/li>\n<li><a href=\"http:\/\/uk.nec.com\/en_GB\/press\/201309\/20130913_03.html\" target=\"_blank\" rel=\"noopener noreferrer\">NEC Laboratories Europe showcases its Media Cloud solution and Smart AppStore at IBC 2013<\/a><\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/IoT-A.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>IoT-A: Internet of Things Architecture<\/h3><p>European Commission, FP7-ICT, 257521, 11.956.284\u20ac, 01\/09\/2010 - 31\/08\/2013<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>IoT-A, the European Lighthouse Integrated Project addressing the Internet-of-Things Architecture, proposes the creation of an architectural reference model together with the definition of an initial set of key building blocks. Together they are envisioned as crucial foundations for fostering a future Internet of Things. Using an experimental paradigm, IoT-A will combine top-down reasoning about architectural principles and design guidelines with simulation and prototyping to explore the technical consequences of architectural design choices.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/95713_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/95713_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>VDI\/VDE Innovation + Technik Gmbh (Germany)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Alcatel-Lucent Bell NV (Belgium)<\/li>\n<li>NXP Semiconductors Belgium NV (Belgium)<\/li>\n<li>Universitaet St Gallen (Switzerland)<\/li>\n<li>IBM Research Gmbh (Switzerland)<\/li>\n<li>Julius-Maximilians Universitaet Wuerzburg (Germany)<\/li>\n<li>SAP AG (Germany)<\/li>\n<li>NXP Semiconductors Germany Gmbh (Germany)<\/li>\n<li>Fraunhofer (Germany)<\/li>\n<li>Siemens (Germany)<\/li>\n<li>Teknologian Tutkimuskeskus VTT (Finland)<\/li>\n<li>Commissariat a l&#8217;Energie Atomique et aux Energies Alternatives (France)<\/li>\n<li>Alcatel-Lucent Bell Labs France (France)<\/li>\n<li>Creative Systems Engineering (Greece)<\/li>\n<li>Universita degli Studi di Roma La Sapienza (Italy)<\/li>\n<li>Consorzio Ferrara Ricerche (Italy)<\/li>\n<li>Hitachi Europe Ltd (United Kingdom)<\/li>\n<li>University of Surrey (United Kingdom)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<li>Universita degli Studi di Padova (Italy)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/florence-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>Florence: Multi Purpose Mobile Robot for Ambient Assisted Living<\/h3><p>European Commission, FP7-ICT, 248730, 3.550.000\u20ac, 01\/02\/2010 - 31\/01\/2013<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>The Florence* (Multi Purpose Mobile Robot for Ambient Assisted Living) project aims to improve the well-being of elderly (and that of his beloved ones) as well as improve efficiency in care through AAL services supported by a general-purpose robot platform. The Florence system with its multipurpose mobile robot platform will pioneer the use of such robots in delivering new kinds of AAL services to elderly persons and their caretakers. The main objective is to make this concept acceptable for the users and cost effective for the society and care givers.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/93917_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/93917_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Philips Electronics (Netherlands)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Offis EV (Germany)<\/li>\n<li>Fundaci\u00f3n Tecnalia Research &amp; Innovation (Spain)<\/li>\n<li>Agencia de Servicios Sociales y Dependencia de Andaluc\u00eda (Spain)<\/li>\n<li>Stichting Novay (Netherlands)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/logo-semiramis.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SEMIRAMIS: Secure Management of Information across multiple Stakeholders<\/h3><p>European Commission, ICT PSP, 250453, 2.020.000\u20ac, 01\/03\/2010 - 31\/08\/2012<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>The main goal of SEMIRAMIS is to pilot, in different scenarios, the infrastructure whose major function is to enable the safe, secure and seamless transfer of rel\u00adevant data to clearly identified users. This will occur in full adaptation and within the limits of the context in which this data is needed for the provision of request\u00aded e-services. It will provide an easy-to-implement and easy-to-use solution for single sign-on and secure access to services on which novel offerings can be eas\u00adily deployed.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/191850_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/191850_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Atos Spain SA (Spain)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>European Organisation for Security (Belgium)<\/li>\n<li>Universitaet Stuttgart (Germany)<\/li>\n<li>Ayuntamiento de Ceut\u00ed (Spain)<\/li>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>Citta di Lecce * Comune di Lecce (Italy)<\/li>\n<li>Engineering &#8211; Ingegneria Informatica (Italy)<\/li>\n<li>Polska Telefonia (Poland)<\/li>\n<li>Portugal Telecom Inova\u00e7ao SA (Portugal)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/sensei-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SENSEI: Integrating the Physical with the Digital World of the Network of the Future<\/h3><p>European Commission, FP7-ICT, 215923, 14.977.717\u20ac, 01\/01\/2008 - 31\/12\/2010<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>SENSEI creates an open, business driven architecture that fundamentally addresses the scalability problems for a large number of globally distributed WS&amp;A (wireless sensor and actuator) devices. It provides necessary network and information management services to enable reliable and accurate context information retrieval and interaction with the physical environment. By adding mechanisms for accounting, security, privacy and trust it enables an open and secure market space for context-awareness and real world interaction.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/85429_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/85429_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Commissariat a l\u2019Energie Atomique et aux Energies Alternatives (France)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>ETH Zurich (Switzerland)<\/li>\n<li>SAP AG (Germany)<\/li>\n<li>Telef\u00f3nica Investigaci\u00f3n y Desarrollo SA (Spain)<\/li>\n<li>Oulun Yliopisto (Finland)<\/li>\n<li>Sensinode OY (Finland)<\/li>\n<li>Universite Pierre Mendes France (France)<\/li>\n<li>Alma Consulting Group SAS (France)<\/li>\n<li>Consorzio Ferrara Ricerche (Italy)<\/li>\n<li>Uniersiteit Twente (Netherlands)<\/li>\n<li>Ambient Systems NV (Netherlands)<\/li>\n<li>Telenor ASA (Norway)<\/li>\n<li>Universitatea Politehnica din Bucaresti (Romania)<\/li>\n<li>Ericsson DOO for Telecommunications (Serbia)<\/li>\n<li>Ericsson AB (Sweden)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<li>Ove Arup &amp; Partners International Ltd (United Kingdom)<\/li>\n<li>University of Surrey (United Kingdom)<\/li>\n<li>Thales Research &amp; Technology (United Kingdom)<\/li>\n<li>Telenor Objects AS (Norway)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/swift-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SWIFT: Secure Widespread Identities for Federated Telecommunications<\/h3><p>European Commission, FP7-ICT, 215832, 3.480.000\u20ac, 01\/01\/2008 - 30\/06\/2010<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<h4><strong>Objective<\/strong><\/h4>\n<p>SWIFT aims to leverage identity technology as a key to integrate service and transport infrastructures for the benefit of users and providers. It focuses on extending identity functions and federation to the network while addressing usability and privacy concerns. SWIFT aims to build on considerable identity management work that has already been done in standards and in multiple R&amp;D projects.<\/p>\n<p><a href=\"http:\/\/cordis.europa.eu\/project\/rcn\/85308_en.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/cordis.europa.eu\/project\/rcn\/85308_en.html<\/a><\/p>\n<h4><strong>Coordinator<\/strong><\/h4>\n<ul>\n<li>Fraunhofer (Germany)<\/li>\n<\/ul>\n<h4><strong>Partners<\/strong><\/h4>\n<ul>\n<li>Alcatel-Lucent Bell NV (Belgium)<\/li>\n<li>Universitaet Stuttgart (Germany)<\/li>\n<li>Deutsche Telekom AG (Germany)<\/li>\n<li>Universidad de Murcia (Spain)<\/li>\n<li>Desarrollo de Aplicaciones para las Comunicaciones, Control y Tecnolog\u00edas de la Informaci\u00f3n (Spain)<\/li>\n<li>Portugal Telecom Inova\u00e7ao SA (Portugal)<\/li>\n<li>Instituto de Telecomunica\u00e7oes (Portugal)<\/li>\n<li>NEC Europe Ltd (United Kingdom)<\/li>\n<li>T-Systems International Gmbh (Germany)<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<br \/>\n<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">International Research Projects<\/h3>\n<br \/>\n<ul class=\"ul-withdetails \"><br \/>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/09\/logo-escuela-colombiana-de-ingenieria-julio-garavito.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>Cyber security architecture for incident management<\/h3><p>Escuela de Ingenier\u00eda Julio Garavito, Colombia, 13.630\u20ac, 10\/01\/2018 - 14\/12\/2018<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">Current interconnection of \u00abthings\u00bb to the Internet (IoT) has grown significantly in the last years, foreseeing 20 billion of these things by 2020. Internet security constitutes an strategic action for organizations, governments and even individuals, so the security of interconnected \u00abthings\u00bb requires our attention too. Thus, in this project we will revise the security conditions of such \u00abthings\u00bb in order to propose a cyber security architecture for IoT systems entailing a holistic security paradigm for the protection of information assets. Such solution should be easy to follow by technology developers, IT areas and users, strengthening this way the technological environments of organizations, as well as the individuals using them. Additionally, we will document such know-how so that we can disseminate the acquired knowledge and describe a potential application of the outcomes over an e-Health scenario.<\/p>\n\n\t\t<\/div> <\/li><\/p>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/09\/logo-escuela-colombiana-de-ingenieria-julio-garavito.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>A SIEM solution deployment for the protection of information assets<\/h3><p>Escuela de Ingenier\u00eda Julio Garavito, Colombia, 10.195\u20ac, 09\/01\/2017 - 15\/01\/2018<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">The management of information security and the protection of information assets deserve a constant attention by those organizations handling highly critical information. SIEM solutions provide a way to tackle this issue by means of security event management functionalities allowing the detection of security incidents that occurred in the past or happening right now and making the organizations able to generate countermeasures to diminish the impact of an incident. Besides the utility of these solutions, its application to SMEs and in public sector entities has not succeeded yet mainly due to the high cost of a SIEM solution and the lack of technical skills required for its deployment, configuration and roll-out. This project intends to generate a SIEM solution prototype that can be used in real scenarios to protect critical information assets exposed to common security threats, without a high economic investment from the organizations benefiting from it. Additionally, all the generated know-how will be documented aiming at disseminating all the lessons learnt and to describe a potential application scenario in the context of e-Health.<\/p>\n\n\t\t<\/div> <\/li><\/ul><br \/>\n[\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<br \/>\n<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">National Research Projects<\/h3>\n<br \/>\n<ul class=\"ul-withdetails \"><\/p>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2023\/03\/Logo_Agencia_Estatal_de_Investigacion.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>CYBERSAFEMAN: Prueba de Concepto de SAFEMAN<\/h3><p>Agencia Estatal de Investigaci\u00f3n, Espa\u00f1a, PDC2022-133026-I00, 128.800\u20ac, 01\/01\/2023 \u2013 31\/12\/2024<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">El principal objetivo de este proyecto es el prototipado del sistema SafeMan para la gesti\u00f3n de forma unificada de la ciberseguridad y la seguridad en entornos industriales, combinando t\u00e9cnicas novedosas como la Artificial Inteligencia, espec\u00edficamente Machine Learning y Deep Learning, y t\u00e9cnicas de Visi\u00f3n Artificial. Este prototipo ser\u00e1 verificado en un entorno industrial operativo.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2023\/03\/Logo_Agencia_Estatal_de_Investigacion.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>CYBERTY: Ciberseguridad y Reconocimiento de Actividad como Tecnolog\u00edas Habilitadoras de la F\u00e1brica<\/h3><p>Agencia Estatal de Investigaci\u00f3n, Espa\u00f1a, TED2021-129300B-I00, 290.605\u20ac, 01\/12\/2022 \u2013 30\/11\/2024<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">El objetivo principal de CYBERTY es el dise\u00f1o, desarrollo y evaluaci\u00f3n en un escenario realista de f\u00e1brica inteligente de un framework aut\u00f3nomo que permite: (1) monitorear, identificar y mitigar ciberamenazas en tiempo real; (2) reconocimiento de la actividad humana para la caracterizaci\u00f3n de procesos industriales; y (3) controles de seguridad para proteger el propio framework. En particular, en este proyecto se propone integrar ciberseguridad y reconocimiento de actividad en una arquitectura de edge computing que aprovecha las nuevas tecnolog\u00edas como aprendizaje m\u00e1quina y aprendizaje profundo, Internet de las cosas, visi\u00f3n artificial y dockerizaci\u00f3n, entre otros.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2021\/10\/logo-pastor-1024x834.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>PASTOR: Servicios de investigaci\u00f3n y desarrollo para la b\u00fasqueda de soluciones innovadoras en la obtenci\u00f3n de servicios ocultos il\u00edticos en la red an\u00f3nima TOR<\/h3><p>Instituto para la Competitividad Empresarial de la Junta de Castilla y Le\u00f3n, Espa\u00f1a, C2021\/001, 188.760\u20ac, 15\/12\/2021 - 15\/01\/2023<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">La Plataforma de An\u00e1lisis de Servicios en TOR (PASTOR) ofrece las siguientes funcionalidades: i) Obtenci\u00f3n de nuevos servicios ocultos en TOR no identificados previamente y que no se encuentren en fuentes p\u00fablicas, ii) Comprobaci\u00f3n del estado (activo o inactivo) de los servicios ocultos descubiertos en el momento de la consulta, iii) Dise\u00f1o de un prototipo software que obtenga nuevos servicios ocultos en TOR de manera continua, es decir, estar\u00e1 basado en t\u00e9cnicas no temporales que aseguren que el software no tendr\u00e1 que ser adaptado a corto o medio plazo para continuar obteniendo nuevos servicios ocultos y iv) Desarrollo y prueba de un prototipo software que pueda ser integrado f\u00e1cilmente con soluciones que permitan recoger estos nuevos servicios (.onion) para su monitorizaci\u00f3n continua.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/webs.um.es\/felixgm\/projects\/pastor\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/webs.um.es\/felixgm\/projects\/pastor<\/a><\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2020\/02\/COBRA-Logo-1024x616.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>COBRA: Cibermaniobras adaptativas y personalizables de simulaci\u00f3n hiperrealista de APTs y entrenamiento en ciberdefensa usando gamificaci\u00f3n<\/h3><p>Ministerio de Defensa, Espa\u00f1a, 10032\/20\/0035\/00, 01\/12\/2020 - 30\/11\/2022<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">En este proyecto se desarrollar\u00e1n m\u00f3dulos de simulaci\u00f3n de tr\u00e1fico y topolog\u00edas de red, y de amenazas avanzadas persistentes (APTs) hiperrealistas que simulen de forma efectiva escenarios realistas. En segundo lugar, se utilizar\u00e1 un Cyber Range para integrar dichos m\u00f3dulos de simulaci\u00f3n, con un m\u00f3dulo que permita el desarrollo de escenarios de cibermaniobras plantilla parametrizables y aleatorizables, que otorgue flexibilidad al instructor y escenarios desafiantes para el estudiante. En tercer lugar, se integrar\u00e1 al Cyber Range elementos de dos tecnolog\u00edas educativas en alce actualmente, como la gamificaci\u00f3n y el aprendizaje adaptivo, de manera que el proceso de aprendizaje sea m\u00e1s motivante y adaptado. Por \u00faltimo, se desarrollar\u00e1 un m\u00f3dulo de evaluaci\u00f3n de competencias en ciberdefensa en funci\u00f3n de la interacci\u00f3n de los estudiantes con las cibermaniobras. Las soluciones desarrolladas en este proyecto conformar\u00e1n m\u00f3dulos independientes y un entorno de trabajo global, que tenga la capacidad de mejorar el entrenamiento en ciberdefensa con simulaciones hiperrealistas en escenarios que puedan variar en cada iteraci\u00f3n y adaptarse din\u00e1micamente a las caracter\u00edsticas del estudiante, as\u00ed como mejorar la motivaci\u00f3n de los estudiantes para aprender en este entorno.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/09\/1280px-Logotipo_del_Ministerio_de_Ciencia_Innovaci\u00f3n_y_Universidades.svg_.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SAFEMAN: A unified management framework for cybersecurity and safety in the manufacturing industry<\/h3><p>Ministerio de Ciencia, Innovaci\u00f3n y Universidades, Espa\u00f1a, RTI2018-095855-B-I00, 161.051\u20ac, 01\/01\/2019 - 31\/12\/2021<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">We propose an unified framework for combining cybersecurity and safety in manufacturing industrial environments. This framework, called SAFEMAN, is composed of a set of applications and services that monitor and analyse the cybersecurity and safety risks in real time. The individual risk assessments are collected and considered together in order to identify threats or deviations. If required, the framework takes specific actions in order to protect workers and equipment, and develops the adequate response mechanisms to ensure the reliability of the industrial processes.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/08\/red_leonardo-logo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>COSMOS: Collaborative, Seamless and Adaptive Sentinels for the Internet of Things<\/h3><p>Fundaci\u00f3n BBVA, Beca Leonardo, 35.000\u20ac, 15\/09\/2017 - 14\/03\/2019<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">The COSMOS project, funded by a Leonardo Grant awarded by the BBVA Foundation, intends to develop novel and innovative solutions aimed at providing sophisticated protection mechanisms within the context of the Internet of Things (IoT). In this regard, its overall and main goal lies in the development of the so-called collaborative, seamless and adaptive sentinels. Such sentinels would seamlessly sense their environment, automatically identifying all those devices in the nearby to be potentially protected. Once the appropriate devices have been selected, the sentinels would adapt themselves in order to become experts in the protection of such specific devices against cyber-attacks. Last but not least, in case a new device to be protected comes into play and the assigned sentinel does not know how to protect it, the sentinel would ask for such protection knowledge to other collaborative sentinels in the community.<\/p>\n<p align=\"justify\">Furthermore, the IoT sentinels would not only focus on detecting intrusions, but rather cover the four phases of the cyberdefense, namley: prevention, detection, reaction and forensics.<\/p>\n<p align=\"justify\">Materialized in two different forms (dedicated and virtual), the sentinels in the context of COSMOS would operate in a Smart Home scenario, where a number of heterogeneous devices can be found (PCs, laptops, smartphones, electrical appliances, wearables, etc.).<\/p>\n<p align=\"justify\"><a href=\"http:\/\/webs.um.es\/felixgm\/projects\/cosmos\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/webs.um.es\/felixgm\/projects\/cosmos<\/a><\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/MINECO-Logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>DHARMA: Dynamic Heterogeneous threAts Risk Management and Assessment<\/h3><p>Ministerio de Educaci\u00f3n y Ciencia, Espa\u00f1a, TIN2014-59023-C2-1-R, 112.288\u20ac, 01\/01\/2015 - 31\/12\/2017<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">The DHARMA (Dynamic Heterogeneous threAts Risk Management and Assessment) project aims to provide a framework for the achievement of an efficient Dynamic Risk Management and Assurance in ICT environments taking into account new types of threats known as APTs (Advanced Persistent Threats). These threats are characterised for not using just the classical means of penetration based on software vulnerabilities, but a combination of heterogeneous attack vectors customized for the organization and its employees, including the use of physical intrusions, employees deception, sensitive information abuse, side channels, etc. Thus, the current methodologies cannot manage adequately this dynamicity, with changes in context being a possible symptom of a new vulnerability and implying a potential modification in the list of risks identified for the organization.<\/p>\n<p align=\"justify\">The DHARMA project is devoted to provide an answer to this shortcoming, proposing a multilevel architecture where a remarkable number of heterogeneous sensors will capture any change in the organization context (not just traditional network attacks, but any type of context change), namely: variations in the normal usage of systems and networks, electric consumption deviations, physical security incidents with presence detectors and video surveillance, ambient sensors, social networks activity sensors, and even the characterization of labour unrest in the organization in order to anticipate possible insider attacks by malicious employees.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/dharma.inf.um.es\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/dharma.inf.um.es<\/a><\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/MINECO-Logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>RECLAMO: Virtual and Collaborative Honeynets based on Trust Management and Autonomous Systems applied to Intrusion Management<\/h3><p>Ministerio de Ciencia e Innovaci\u00f3n, Espa\u00f1a, TIN2011-28287-C02-02, 161.898\u20ac, 01\/01\/2012 - 31\/12\/2014<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">The main objective of the RECLAMO project is the research on novel approaches for reacting to network attacks. So, the project will try to go beyond the classic Intrusion Detection Systems approach, based on intrusion detection and basic reactions, and will define, develop and validate an intelligent Automatic Intrusion Response System able to generate new and advanced reactions, with a special focus on the so-called \u00abdeception-based\u00bb responses: the diversion of the attack to a dynamically ad-hoc generated honeynet for the attack to be adequately confined in order to mitigate it and learn from it. In this approach, a detected intrusion will be analysed in real time using a model of intrusions, responses and security metrics formally defined with formal knowledge and behaviour definition languages, which allow triggering an inference process from the detected intrusion.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/reclamo.inf.um.es\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/reclamo.inf.um.es<\/a><\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/logo600.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SEISCIENTOS: Providing adaptive ubiquitous services in vehicular contexts<\/h3><p>Ministerio de Educaci\u00f3n y Ciencia, Espa\u00f1a, TIN2008-06441-C02-02, 256.520\u20ac, 01\/11\/2009 - 31\/12\/2011<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">The work proposed in this project is aimed at creating a framework that meets the needs for communication and for the infrastructure to provide dedicated services to end-user in ubiquitous vehicular environments. The vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications will have a special relevance in this project. Various communication technologies will be exploited, mainly vehicular ad-hoc networks (VANET) and networks with infrastructure, whose main representative are 3G cellular networks. We will study the feasibility of such technologies in the area of vehicles; explore new strategies for modeling networks in VANETs, and directing all development towards an integrated environment for a communicating vehicle. In this regard, special attention will be given to provide a common communication interface, isolating the user from handoffs or changes that may occur between different network technologies.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/www.grc.upv.es\/600\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.grc.upv.es\/600<\/a><\/p>\n\n\t\t<\/div> <\/li><br \/>\n<\/ul>[\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<br \/>\n<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">Regional Research Projects<\/h3>\n<br \/>\n<ul class=\"ul-withdetails \"><\/p>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2022\/01\/SCORPION-logo-1024x555.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SCORPION: Smart and efficient Cyber Range-as-a-Service for on-demand Trainings<\/h3><p>Fundaci\u00f3n S\u00e9neca, Comunidad Aut\u00f3noma de la Regi\u00f3n de Murcia, Espa\u00f1a, 21661\/PDC\/21, 30.000\u20ac, 01\/01\/2022 - 31\/12\/2022<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">El objetivo principal de SCORPION es dise\u00f1ar y desarrollar una plataforma que incluya formaci\u00f3n de contenidos conceptuales te\u00f3ricos, y a su vez tambi\u00e9n formaci\u00f3n pr\u00e1ctica a trav\u00e9s de ciberejercicios virtualizados en tem\u00e1ticas relacionadas con la ciberseguridad para que las PYMEs y microempresas de la Regi\u00f3n de Murcia puedan formar a sus profesionales y, consecuentemente, mejorar sus capacidades estrat\u00e9gicas en materias de ciberseguridad TIC mejorando sus activos frente a los eventuales y cada vez m\u00e1s presentes ciberataques. En este sentido, la plataforma SCORPION ser\u00e1 suministrada a los usuarios interesados en forma de servicio bajo demanda seg\u00fan el paradigma Cyber Range-as-a-Service (CRaaS). De esta forma, los usuarios interesados podr\u00e1n explotar el conjunto de herramientas ofrecidas en el marco de esta PdC, como por ejemplo infraestructura f\u00edsica y virtual, cursos de formaci\u00f3n (p.ej., cyber situational awareness, gesti\u00f3n de riesgo, seguridad de la informaci\u00f3n, etc.), como un servicio remoto mantenido por el equipo solicitante.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/seneca.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>AUTHCODE: AUTHentication for Continuous access On DEvices<\/h3><p>Fundaci\u00f3n S\u00e9neca, Comunidad Aut\u00f3noma de la Regi\u00f3n de Murcia, Espa\u00f1a, 20549\/PDC\/18, 28.000\u20ac, 01\/01\/2019 - 31\/12\/2019<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">La autenticaci\u00f3n continua en dispositivos m\u00f3viles, como su nombre indica, pretende identificar al propietario (o propietarios) de un determinado dispositivo en todo momento y no de forma puntual, como lo hacen los sistemas tradicionales. El beneficio principal de la autenticaci\u00f3n continua es la mejora de la experiencia de los usuarios cuando hacen uso de los servicios o aplicaciones en sus dispositivos m\u00f3viles. Concretamente, este tipo de autenticaci\u00f3n evita el tener que recordar o \u201cposeer\u201d algo cuando se quiere acceder a una aplicaci\u00f3n o servicio que requiere autenticaci\u00f3n. En este sentido, tener autenticado al usuario de forma permanente aumenta la seguridad del dispositivo, adem\u00e1s de permitir que la interacci\u00f3n del usuario con aplicaciones sea mucho m\u00e1s fluida, sencilla y satisfactoria. As\u00ed, la prueba de concepto (PdC) que se propone en este proyecto est\u00e1 orientada a la implementaci\u00f3n y validaci\u00f3n de una aplicaci\u00f3n para dispositivos m\u00f3viles que permitir\u00e1 la autenticaci\u00f3n continua del propietario (o propietarios) en base a su comportamiento con el dispositivo.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/seneca.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>An\u00e1lisis, estudio y desarrollo de sistemas inteligentes y servicios telem\u00e1ticos<\/h3><p>Fundaci\u00f3n S\u00e9neca, Comunidad Aut\u00f3noma de la Regi\u00f3n de Murcia, Espa\u00f1a, 04552\/GERM\/06, 312.000\u20ac, 01\/01\/2008 - 31\/07\/2014<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">Partiendo de las l\u00edneas sistemas de Aprendizaje (con y sin incertidumbre) y de Optimizaci\u00f3n junto con el an\u00e1lisis relacionadas con diversos aspectos de loss de decisiones y sistemas cooperativos inteligentes, que se fijan en la descripci\u00f3n del grupo, se han creado nuevas \u00e1reas de trabajo como los sistemas de DataMining, el modelado difuso, los sistemas de manejo de la imperfecci\u00f3n, DataMining aplicada a Meta-heur\u00edsticas Cooperativas y los sistemas de Optimizaci\u00f3n aplicados a Inteligencia Ambiental. Por otra lado, partiendo de las l\u00edneas de investigaci\u00f3n relacionadas con diversos aspectos de las redes, servicios distribuidos y los servicios telem\u00e1ticos, que se fijan en la descripci\u00f3n del grupo se han creado nuevas \u00e1reas de trabajo como los Sistemas de Agentes aplicados a Inteligencia Ambiental y los Sistemas Adaptativos en redes M\u00f3viles, as\u00ed como los Entornos Colaborativos, y Seguridad en redes IPv6, Telem\u00e1tica aplicada los sistemas Inteligentes de Transportes (ITS) y Servicios en redes m\u00f3viles y ad-hoc.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/fseneca.es\/seneca\/html\/GERM\/fichas\/germ04552.htm\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/fseneca.es\/seneca\/html\/GERM\/fichas\/germ04552.htm<\/a><\/p>\n\n\t\t<\/div> <\/li>\n<p><li class=\"no-details\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/logoregion.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>MISTRAL. Middleware de gesti\u00f3n de Identidades de Seguridad en TRansacciones electr\u00f3nicAs basado en c\u00f3digo Libre<\/h3><p>Consejer\u00eda de Educaci\u00f3n, Ciencia e Investigaci\u00f3n, Comunidad Aut\u00f3noma de la Regi\u00f3n de Murcia, Espa\u00f1a, TIC-INF 07\/01-0003, 47.260,53\u20ac, 08\/01\/2008 - 07\/01\/2010<\/p><\/div><\/div><\/li><br \/>\n<\/ul><br \/>\n[\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">R&amp;D Contracts<\/h3>\n<\/p>\n<ul class=\"ul-withdetails \">\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/11\/armasuisse-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>RESERVE: Resilient federated IoT device securization<\/h3><p>Federal Office for Defence Procurement Armasuisse &amp; Universidad de Murcia, 04\/02\/2022 - 30\/11\/2022<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">This project aims to develop a framework, called RESERVE, designed to uniquely identify each device deployed in a crowdsensing or Industrial IoT (IIoT) platform in a distributed and robust manner, solving possible security threats based on device impersonation or malicious deployment. The proposed framework is based on hardware device fingerprinting and the generation of ML\/DL models to identify the sensors as well as possible malicious elements affecting the identification process robustness.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/11\/armasuisse-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>TREASURE: IoT sensor identification and securization<\/h3><p>Federal Office for Defence Procurement Armasuisse &amp; Universidad de Murcia, 15\/02\/2021 - 26\/11\/2021<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">This project aims to develop a framework, called TREASURE, designed to uniquely identify each sensor in a crowdsensing or Industrial IoT (IIoT) platform, solving possible security threats based on sensor impersonation or malicious sensor deployment. The proposed framework is based on device analysis and the generation of ML\/DL models to identify the sensors as well as possible malicious elements affecting the identification process robustness.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2021\/03\/El-Dulze-Logotipo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>PR\u00d3XIMA: La pr\u00f3xima generaci\u00f3n de f\u00e1brica inteligente: Inteligencia artificial, herramienta potenciadora de las habilidades de las personas<\/h3><p>El Dulze Growers S.L. &amp; Universidad de Murcia, 02\/10\/2020 - 01\/12\/2023<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">El proyecto PR\u00d3XIMA crear\u00e1 un Modelo de Referencia constituido por Bloques Funcionales que estar\u00e1n interconectados entre s\u00ed de cara a gestionar de manera inteligente y eficiente procesos industriales a partir de una explotaci\u00f3n de datos del producto producido, del proceso productivo, de la planta de producci\u00f3n y de la f\u00e1brica en su globalidad, empleando a tal fin capacidades cognitivas tales como la Inteligencia Artificial Explicativa e Interpretativa, todo ello de cara a disponer en un futuro pr\u00f3ximo en Espa\u00f1a de F\u00e1bricas Nativamente Inteligentes capaces de asegurar una industria econ\u00f3mica y medioambientalmente sostenible y centrada en el trabajador, minimizando asimismo la aparici\u00f3n de brechas digitales.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/11\/armasuisse-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>INSURANCE: IoT and sensor networks securization using artificial intelligence<\/h3><p>Federal Office for Defence Procurement Armasuisse &amp; Universidad de Murcia, 20\/03\/2020 - 31\/03\/2021<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">INSURANCE aims to develop a framework, called INSURANCE, to identify misbehaving or malicious sensors in the ElectroSense platform. The proposed framework is based on a central entity which receives sensor information and different measurements and generates ML\/DL models to detect attacks to\/from sensors as well as to the ElectroSense platform itself. In particular, anomalous sensors will be identified based on their fingerprinting and the analysis of the data they send.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/11\/mit-logo.jpg);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>LAGA: Learning Analytics and Game-based Assessment<\/h3><p>Massachusetts Institute of Technology &amp; Universidad de Murcia, 100.792\u20ac, 18\/12\/2019 - 15\/11\/2022<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">LAGA is part of a bigger project that is taking place at the MIT Playful Journey Lab on the design and implementation of game-based assessment in K12 schools. In this regard, LAGA entails the design of the data infrastructure and the development of the learning analytics and assessment machinery models to perform such game-based assessment.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/11\/armasuisse-logo.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>SOUNDS: Securing communications in a distributed platform for spectrum measurements leveraging heterogeneous sensors<\/h3><p>Federal Office for Defence Procurement Armasuisse &amp; Universidad de Murcia, 32.560\u20ac, 01\/10\/2019 - 31\/03\/2020<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">SOUNDS aims to analyse the ElectroSense distributed platform for drawing its assets and requirements in terms of securing the communications channels, provide a state-of-the-art detailed review and comparison of solutions concerning communications security capabilities, taking into account the ElectroSense distributed platform and report on a proposal for a technical solution describing at the design level how to deploy mechanisms and protocols for securing the transfer of spectrum data for further processing in ElectroSense.<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2019\/01\/minsait_cyber_range.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>Indra Cyber Range<\/h3><p>Indra Sistemas &amp; Universidad de Murcia, 55.000\u20ac, 01\/04\/2019 - 30\/09\/2020<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">Minsait Cyber Range is one of the most advanced cyber-training solutions on the market. It has been designed by Indra to support intensive individual and group training in techniques and tactics related to cyberdefense, cyber attacks and forensic analysis. The solution has been used in different CyberCamps organized by the Spanish National Cybersecurity Institute (INCIBE).<\/p>\n\n\t\t<\/div> <\/li>\n<li class=\"\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/03\/C\u00e1tedra-SAES.png);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>C\u00e1tedra SAES de Software Libre y de Aplicaciones Cr\u00edticas y en Tiempo Real<\/h3><p>Sociedad An\u00f3nima de Electr\u00f3nica Submarina &amp; Universidad de Murcia, 986.676,46\u20ac, 04\/02\/2009 - 04\/02\/2021<\/p><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<p align=\"justify\">The C\u00e1tedra SAES-UMU initiative is created in the context of the continuous improvement process of the company, paying special attention to increasing the current quality level of the internal software development processes. It is based on several years of continuous collaboration between SAES and the University of Murcia, that since 2006 are collaborating in common projects and initiatives. This initiative is also the base for current and future research and knowledge transfer activities in the context of open-source software and real time and critical applications and services.<\/p>\n<p align=\"justify\"><a href=\"https:\/\/www.catedrasaes.org\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.catedrasaes.org<\/a><\/p>\n\n\t\t<\/div> <\/li>\n<p><li class=\"no-details\">\n\t\t\t\t<div class=\"wrap\"><div class=\"image\" style=\"background-image:url(https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/04\/telefonica-logo.gif);\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><div class=\"meta\"><h3>FACTO: Firma Electr\u00f3nica y Servicios de Certificaci\u00f3n en Dispositivos M\u00f3viles<\/h3><p>Telef\u00f3nica M\u00f3viles de Espa\u00f1a &amp; Universidad de Murcia, 100.000\u20ac, 19\/09\/2006 - 11\/10\/2007<\/p><\/div><\/div><\/li><\/ul>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row] [vc_row][vc_column] [\/vc_column][\/vc_row] [vc_row][vc_column] [\/vc_column][\/vc_row] [vc_row][vc_column] [\/vc_column][\/vc_row] [vc_row][vc_column] [\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":2241,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>F\u00e9lix G\u00f3mez M\u00e1rmol - Research Projects<\/title>\n<meta name=\"description\" content=\"Research projects of F\u00e9lix G\u00f3mez M\u00e1rmol, Associate Professor in the Department of Information and Communications Engineering (University of Murcia)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webs.um.es\/felixgm\/projects\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00e9lix G\u00f3mez M\u00e1rmol - Research Projects\" \/>\n<meta property=\"og:description\" content=\"Research projects of F\u00e9lix G\u00f3mez M\u00e1rmol, Associate Professor in the Department of Information and Communications Engineering (University of Murcia)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webs.um.es\/felixgm\/projects\/\" \/>\n<meta property=\"og:site_name\" content=\"F\u00e9lix G\u00f3mez M\u00e1rmol\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-29T20:53:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/03\/Flying-over-Sinsheim.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2913\" \/>\n\t<meta property=\"og:image:height\" content=\"1940\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webs.um.es\/felixgm\/#website\",\"url\":\"https:\/\/webs.um.es\/felixgm\/\",\"name\":\"F\\u00e9lix G\\u00f3mez M\\u00e1rmol\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/webs.um.es\/felixgm\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/webs.um.es\/felixgm\/projects\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/03\/Flying-over-Sinsheim.jpg\",\"width\":2913,\"height\":1940},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webs.um.es\/felixgm\/projects\/#webpage\",\"url\":\"https:\/\/webs.um.es\/felixgm\/projects\/\",\"name\":\"F\\u00e9lix G\\u00f3mez M\\u00e1rmol - Research Projects\",\"isPartOf\":{\"@id\":\"https:\/\/webs.um.es\/felixgm\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webs.um.es\/felixgm\/projects\/#primaryimage\"},\"datePublished\":\"2017-03-14T15:41:03+00:00\",\"dateModified\":\"2024-08-29T20:53:48+00:00\",\"description\":\"Research projects of F\\u00e9lix G\\u00f3mez M\\u00e1rmol, Associate Professor in the Department of Information and Communications Engineering (University of Murcia)\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webs.um.es\/felixgm\/projects\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages\/891"}],"collection":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/comments?post=891"}],"version-history":[{"count":74,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages\/891\/revisions"}],"predecessor-version":[{"id":14031,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages\/891\/revisions\/14031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/media\/2241"}],"wp:attachment":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/media?parent=891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}