Funded projects

Intrusion Detection Certification & Accreditation Offensive Security Applied Cryptography Frameworks & Standards Security Architecture Automated Red Teaming User Education Situation Awareness Cyber Range Trainings Education & Training Scenario Generation Pentesting Security Operation Incident Response Malware Development All
DAP/22-03 Using blockchain to secure the software supply chain August 2023 August 2027 Applied Cryptography Security Architecture Active
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept