cordis.europa.eu/project/id/317753
Preview meta tags from the cordis.europa.eu website.
Linked Hostnames
21- 49 links tocordis.europa.eu
- 13 links toec.europa.eu
- 10 links todashboard.tech.ec.europa.eu
- 3 links tocommission.europa.eu
- 1 link toeuropean-union.europa.eu
- 1 link toop.europa.eu
- 1 link toresearch-and-innovation.ec.europa.eu
- 1 link totwitter.com
Thumbnail

Search Engine Appearance
A Source code analysis Toolbox for software security AssuraNCE | STANCE | Projekt | Fact Sheet | FP7 | CORDIS | European Commission
The immunity of a system to malicious third parties trying to modify its behaviour (e.g. to perform unauthorized actions) is called security. Ensuring this feature in information and communication technologies is a requirement for establishing a trustworthy Information Societ...
Bing
A Source code analysis Toolbox for software security AssuraNCE | STANCE | Projekt | Fact Sheet | FP7 | CORDIS | European Commission
The immunity of a system to malicious third parties trying to modify its behaviour (e.g. to perform unauthorized actions) is called security. Ensuring this feature in information and communication technologies is a requirement for establishing a trustworthy Information Societ...
DuckDuckGo
A Source code analysis Toolbox for software security AssuraNCE | STANCE | Projekt | Fact Sheet | FP7 | CORDIS | European Commission
The immunity of a system to malicious third parties trying to modify its behaviour (e.g. to perform unauthorized actions) is called security. Ensuring this feature in information and communication technologies is a requirement for establishing a trustworthy Information Societ...
General Meta Tags
43- titleA Source code analysis Toolbox for software security AssuraNCE | STANCE | Projekt | Fact Sheet | FP7 | CORDIS | European Commission
- titleLog in
- titleEnglish
- titleSearch
- charsetUTF-8
Open Graph Meta Tags
6- og:descriptionThe immunity of a system to malicious third parties trying to modify its behaviour (e.g. to perform unauthorized actions) is called security. Ensuring this feature in information and communication technologies is a requirement for establishing a trustworthy Information Societ...
- og:titleA Source code analysis Toolbox for software security AssuraNCE | STANCE | Projekt | Fact Sheet | FP7 | CORDIS | European Commission
- og:typearticle
- og:site_nameCORDIS | European Commission
- og:imagehttps://cordis.europa.eu/projects/icons/logo_fp7_big.jpg
Twitter Meta Tags
6- twitter:descriptionThe immunity of a system to malicious third parties trying to modify its behaviour (e.g. to perform unauthorized actions) is called security. Ensuring this feature in information and communication technologies is a requirement for establishing a trustworthy Information Societ...
- twitter:titleA Source code analysis Toolbox for software security AssuraNCE | STANCE | Projekt | Fact Sheet | FP7 | CORDIS | European Commission
- twitter:cardsummary
- twitter:site@CORDIS_EU
- twitter:creator@CORDIS_EU
Link Tags
4- canonicalhttps://cordis.europa.eu/project/id/317753
- icon/favicon.ico
- stylesheet/build/94.b20776ee.css
- stylesheet/build/main.95c85689.css
Website Locales
6de
https://cordis.europa.eu/project/id/317753/deen
https://cordis.europa.eu/project/id/317753es
https://cordis.europa.eu/project/id/317753/esfr
https://cordis.europa.eu/project/id/317753/frit
https://cordis.europa.eu/project/id/317753/it
Emails
1Links
92- http://www.arttic.eu
- http://www.dassault-aviation.com
- http://www.fraunhofer.de
- http://www.infineon.com
- http://www.kuleuven.be