...encies. In a process that involves technicalexperts, end-users, and other stakeholders, technologies that are indispensable for security todayand in the near future are identified. In a next step, an analysis is performed to evaluate in which ofthese critical technologies member states of the EU are dependent on non-EU contributions. Aresearch agenda to alleviate these critical dependencies throug ...