Company Name: CEA
Expertise offered:
The Laboratory for Communication Systems of CEA in France excels in the following technical expertise for consortiums building proposals towards 6G and 3D NTN: - AI and Machine Learning-based prototype tools and top-grade research for software-defined network management and advanced intrusion detection in ultra-critical systems. - Network deterministics with time sensitiveness, reliability and lifelike real time. - Digital Twin for Networks, twin-to-twin communications. The applicability domains are: tactical settings, IoT, advanced manufacturing, UAV, autonomous driving and swarming, high-altitude platforms, vLEO, IRIS^2; private 6G networks. The laboratory offers also expertise in standardisation fora and is capable of performing leadership roles at[...]
Company Name: WALLIX
Expertise offered:
Advanced solutions for a secure digital future WALLIX protects identities and access to IT infrastructure, applications, and data. Specializing in Privileged Access Management, WALLIX solutions ensure compliance with the latest IT security standards and protect against cyber-attacks, theft and data leaks linked to stolen credentials and elevated privileges to sensitive company assets.
Company Name: Quobis Networks SL
Expertise offered:
QUOBIS has broad knowledge about real time communications protocols working on R&D projects as key partner for some of the larger network integrators and service providers that see QUOBIS as the reference partner for projects with special needs in unified communications. Quobis platform is being used today for real time communication and collaboration on theses scenarios: - Private 5G networks - Critical communications - Real-time communications & IoT for industry - Edge computing - On-prem deployments - Use cases with limitations due legal compliance - etc. We are working now on R&D projects providing: - Artificial inteligence applied to video[...]
Company Name: Luxembourg Institute of Science and Technology (LIST)
Expertise offered:
LIST has built an expertise in wireless networks, by participating in various local (Luxembourg) and European projects, but also by developing its own technology infrastructure to design, implement and test network and AI services and applications. The expertise offered by our teams includes, but is not limited to: - The design, implementation and use of a network digital twin, which allows testing and evaluating realistic usage scenarios that are not possible in reality yet - thus enabling operators and application developers to optimise their plans. This is done by mixing virtual and real data/models, and with the ambition in Luxembourg[...]
Company Name: BEIA
Expertise offered:
BEIA is a R&D performing SME founded in 1991, leading ICT integrator in Romania with offices in Austria and Belgium. BEIA is ISO certified with experience in coordinating & participating in over 60 R&D Innovation projects (FPx, Horizon, Eureka, ERA-Net, etc.) on 5G, cloud, IoT, AI, blockchain/quantum/security (5G-SAFE+, ALADIN, Arrowhead, CHRISS, HUBCAP, FLEXNET, IMMINENCE, MOBILISE, NGI-UAV-AGRO, S4ALLCITIES, SealedGRID, SWITCH, SOLID-B5G, SARWS, TESTBED2, VITAL-5G, etc.) STREAM-B-01-01 (System Architecture): Heterogenous time-critical edge/IoT 6G use cases Integrated and dependable sensing & actuation networks STREAM-B-01-02 (Wireless Communication Technologies and Signal Processing): Optimal usage of wireless edge caching, Novel techniques for integrated sensing and communication[...]
Company Name: University of Essex
Expertise offered:
We (the NCL team of UEssex, UK) have strong expertise in cybersecurity, focusing so far on intrusion detection and mitigation, network resilience to ensure service continuity and system integrity verification using DLT-based solutions. Examples of our track record in the space include: - https://www.sciencedirect.com/science/article/pii/S2214209621000942 - https://ieeexplore.ieee.org/document/9119638 - https://ieeexplore.ieee.org/document/8860878 We are interested in participating in B-01-04 to develop security solutions that satisfy user intents for trustworthy privacy-perserving operations. This includes - trust-aware resource management/orchestration based on user needs and ecosystem constraints - AI-based decentralised and autonomous detection/mitigation of inter-linked attacks across multiple domains - Integrity verification protocols using DLT and DID[...]