Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism