{"id":738,"date":"2018-09-26T09:40:43","date_gmt":"2018-09-26T08:40:43","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=738"},"modified":"2025-10-27T02:11:09","modified_gmt":"2025-10-27T02:11:09","slug":"ideal-cities","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=738","title":{"rendered":"IDEAL-CITIES"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/09\/cropped-IC-banner-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-739\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/09\/cropped-IC-banner-3.png\" alt=\"\" width=\"250\" height=\"84\" \/><\/a>IDEAL-CITIES is a EU H2020 project funded by the Marie Sk\u0142odowska-Curie RISE action.\u00a0The aim of\u00a0 IDEAL-CITIES is to provide a novel, open and extensible platform to enable secure, resilient acquisition and sharing of information with the goal to improve the well-being and inclusivity of citizens, produce more effective response to crime or other emergencies, and make Smart Cities feel more secure and safe to the citizens living in them.<\/p>\n<p>More information at <a class=\"\" href=\"http:\/\/www.ideal-cities.eu\/\">http:\/\/www.ideal-cities.eu<\/a><\/p>\n<p>Contacts: <a href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/vkatos\">Vasilis Katos<\/a><\/p>\n<p>Funders: EU Horizon 2020<\/p>\n<p>Collaborators:\u00a0Foundation for Research and Technology \u2013 Hellas (FORTH),\u00a0Ecole National des Ponts et Chaussees (ENPC), BlueSoft, Cablenet, Nodalpoint Systems<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IDEAL-CITIES is a EU H2020 project funded by the Marie Sk\u0142odowska-Curie RISE action.\u00a0The aim of\u00a0 IDEAL-CITIES is to provide a novel, open and extensible platform to enable secure, resilient acquisition and sharing of information with the goal to improve the well-being and inclusivity of citizens, produce more effective response to crime or other emergencies, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":53,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/738"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=738"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/738\/revisions"}],"predecessor-version":[{"id":918,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/738\/revisions\/918"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/53"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}