DOWNLOAD FULL DOCUMENT
2016
2017
2018
2019
2020
NETWORKING
#01
Research Action
Monitoring and intrusions detection systems to identify network intrusions that can undermine data integrity (e.g. corrupt operational data with traffic injection) or confidentiality (e.g. with a man-in-the-middle attack)
#02
Research Action
Protocols for utilities, smart grids and Advanced Metering Infrastructures (AMI) with embedded support for encryption, security, authentication and scalability
#03
Research Action
Innovative solutions to guarantee data integrity without relying on encryption
NETWORKING