{"componentChunkName":"component---src-templates-category-template-category-template-js","path":"/category/project","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"frontmatter":{"categories":["project"],"title":"Modelling Support for Security of Operational Activities of C3I System","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"November 1, 2021","featured_image":null},"fields":{"slug":"modelling-support-for-security-of-operational-activities-of-c3i-system","authorId":null,"dateSlug":"2021-11-01"},"excerpt":"Command, Control, Communication, and Intelligence (C3I) system is a kind of System of Systems (SoS) that is increasingly leveraging ICT…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Blockchain Network Prototyping Framework","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"blockchain-network-prototyping-framework","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"As blockchain technology mature, private blockchain network deployment has become increasingly feasible and desirable, especially for…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Blockchain Network Design Space","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"blockchain-network-design-space","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Blockchain technologies have been increasingly adopted by enterprises to increase operational efficiency and enable new business models…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Blockchain - Internet of Things Integration Survey","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"blockchain-internet-of-things-integration-survey","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Recent years have witnessed the emergence of the Internet of Things (IoT) systems that incorporate blockchain (BC) elements in their…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Blockchain-enabled Internet of Things Testbed","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"blockchain-enabled-internet-of-things-testbed","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Research and development activities in the Internet of Things domain are intrinsically linked to the physical world. They rely on the…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Collaborative Cyber Common Operating Picture","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"collaborative-cyber-common-operating-picture","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Common Operational Pictures (COPs) have been used in the military domain as a powerful tool for gaining Situational Awareness (SA) and thus…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Metrics Recommendation for Cyber Common Operating Picture","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"metrics-recommendation-for-cyber-common-operating-picture","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Cyber Common Operating Picture (CCOP) comprises security metrics that reflect the cyber-health of an organization with respect to its…"}},{"node":{"frontmatter":{"categories":["project"],"title":"AI Assistant for Cyber Common Operating Picture","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"ai-assistant-for-cyber-common-operating-picture","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Cyber Common Operating Picture (CCOP) comprises a set of metrics, coming from different security intelligence sources. One of the current…"}}]}},"pageContext":{"category":"project","breadcrumb":{"location":"/category/project","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/category","crumbLabel":"category"},{"pathname":"/category/project","crumbLabel":"project"}]}}}}