CORDIS - Forschungsergebnisse der EU
CORDIS

Protection of Critical Infrastructures from advanced combined cyber and physical threats

Leistungen

Instantiation of previous project results

Study and analysis of previous research projects and their outcomes

Communication Strategy and Dissemination Plan v2

Second Release Comprehensive plan for the communication and dissemination actions of the project

Communication Strategy and Dissemination Plan v1

First Release Comprehensive plan for the communication and dissemination actions of the project

Project management handbook

This Deliverable will include all necessary project management procedures reporting approvals etc to be performed by the consortium members

Quality Assurance Plan

Guidelines for deliverables presentations and key messages delivery internal and external communication description of the internal review process to be followed by all partners and specific KPIs for quality check

Research Ethics and Privacy Management

Guidelines on the relevant principles of data protection and research ethics related to the pilots

Policy and regulatory framework Recommendations

Analysis of the policy recommendations for public authorities dealing with regulatory aspects of the fight against physical and cyberattacks in CIs

Deployment and demonstration plan

Guidelines to be followed in the rest of the tasks of WP8 including the demonstration plan

Replication to largest audience beyond the project

Description of the impact and benefits of PRAETORIAN solutions to the actors of the targeted sectors energy transport and health and beyond including recommendations on the scalingup and lessons learned

Exploitation Strategy

Report on the actions for the joint exploitation of the project results as well as the individual exploitation plans that will maximize the project impact

Socio-Economic impact assessment results

Presentation of the impact results of the demonstration activities based on the Evaluation and Impact assessment framework elaborated in T83

Legal and Ethical Frameworks and Requirements

Analysis of the relevant legal and ethical frameworks applicable to PRAETORIAN and guidelines on the specific legal and ethical requirements and implementation

Demonstration activities

Description of the PRAETORIAN system deployment and the demonstration activities performed in each pilot

Security Standards and Certification Mechanisms

Inventory of relevant European and national standards relevant national regulation and recommendations on the certification requirements based on the connection between the national and European legal frameworks focusing on the NIS Directive and Cyber Act

Evaluation and Impact assessment framework

Description of the framework including indicators methods and processes for assessing the impact of PRAETORIAN solutions across different dimensions and assessment of the PRAETORIAN results

Transitioning risk management

Study of the typology of data that it is required useful to pass from the risk management teams at designtime to the risk management teams at runtime

Risk & Opportunities Register

This Deliverable will include the riskopportunities policy forecasted and detected risksopportunities and the action descriptions deadlines and responsibilities

Social Media for Enhanced Situation Awareness

Integration and use of social media for ensuring trustworthy bidirectional information flow with the citizens

Business Plan and investment measures

Business plan to take the outputs of the project to market This will include customer needs compliance with regulation and standards supply chain requirements licensing component technologies from the partners manufacturing and certification plans and taking account of competition

Advanced User Interface

In this document the new visualization techniques applied for developing the intelligent HMIs for visualizing the cyber environment and showing attacks, incidents and managing large amounts of data in a more structured and natural manner will be described.

Veröffentlichungen

Mitigation Of Operational Impacts On Airports By Early Awareness Of Malicious Events Impacting Linked Critical Infrastructures

Autoren: Piekert, Florian and Schaper, Meilin and Boumann, Hilke and Stelkens-Kobsch, Tim H. and Predescu, Andrei-Vlad and Günther, Yves and Carstengerdes, Nils
Veröffentlicht in: 26th ATRS World Conference, 2023
Herausgeber: ATRS Kobe Organizing Committee

PRAETORIAN: From protection to resilience of critical infrastructures

Autoren: Eva Muñoz-Navarro, Juan José Hernández-Montesinos, Antonio Marqués-Moreno, Lazaros Papadopoulos, Antonios Karteris, Konstantinos Demestichas
Veröffentlicht in: RISE-SD 2023 online proceedings, 2023
Herausgeber: RISE-SD

Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures

Autoren: König, S., Shaaban, A.M., Hadjina, T., Gregorc, K. and Kutej
Veröffentlicht in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, Ausgabe 111, 2023, ISBN 979-8-4007-0772-8
Herausgeber: ACM
DOI: 10.1145/3600160.3605026

Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework

Autoren: Schauer, Stefan, Tamara Hadjina, Melita Damjanovic, Eva Maria Muñoz Navarro, Juan Jose Hernandez Montesinos, Javier Hingant Gómez, and Lazaros Papadopoulos
Veröffentlicht in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, Ausgabe 109, 2023, ISBN 979-8-4007-0772-8
Herausgeber: ACM
DOI: 10.1145/3600160.3605095

A Methodology for enhancing Emergency Situational Awareness through Social Media

Autoren: Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos Demestichas, Dimitrios Soudris, Juliette Pauline Philibert, Carlos López Gómez
Veröffentlicht in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Ausgabe Article 130, 2022, Seite(n) 1-7
Herausgeber: ACM Digital Library
DOI: 10.1145/3538969.3544418

ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443

Autoren: Christoph Schmittner, Abdelkader Magdy Shaaban, Georg Macher
Veröffentlicht in: 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems (ICPS), 2022, Seite(n) 1-6
Herausgeber: IEEE
DOI: 10.1109/icps51978.2022.9816864

An Analysis of IEC 62351 Implementations for Securing IEC 60870-5-104 Communication

Autoren: Ivan Cindrić; Tamara Hadjina
Veröffentlicht in: 2023 IEEE Belgrade PowerTech, 2023, ISBN 978-1-6654-8779-5
Herausgeber: IEEE
DOI: 10.1109/powertech55446.2023.10202923

A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical Infrastructures

Autoren: MA Lozano, IP Llopis, AC Alarcón, ME Domingo
Veröffentlicht in: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), 2023, ISBN 978-1-6654-7599-0
Herausgeber: IEEE
DOI: 10.1109/drcn57075.2023.10108333

PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats

Autoren: Papadopoulos, L., Karteris, A., Soudris, D., Muñoz-Navarro, E., Hernandez-Montesinos, J.J., Paul, S., Museux, N., Kuenig, S., Egger, M., Schauer, S. and Hingant Gómez, J.,
Veröffentlicht in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, Ausgabe 112, 2023, ISBN 979-8-4007-0772-8
Herausgeber: ACM
DOI: 10.1145/3600160.3605030

Application of a Generic Digital Twin for Risk and Resilience Assessment in Critical Infrastructures

Autoren: Stefan Schauer, Martin Latzenhofer, Sandra König, Sebastian Chlup, Christoph Schmittner
Veröffentlicht in: Proceedings of the 32nd European Safety and Reliability Conference, 2022
Herausgeber: Research Publishing, Singapore
DOI: 10.3850/978-981-18-5183-4_s21-01-195-cd

Systématisation d’une Démarche de Sécurisation par Conformité Ajustée aux Besoins et Enjeux de Sécurité – une Revue Critique

Autoren: Stéphane Paul, Nicolas Van Cauter, Paul Varela, Simon Leboeuf, Michael Catroux
Veröffentlicht in: C&ESAR’21: Computer Electronics Security Application Rendezvous, Ausgabe Vol 3056, 2021
Herausgeber: CEUR Workshop Proceedings

Parametrization of Probabilistic Risk Models

Autoren: Sandra König, Abdelkader Magdy Shaaban
Veröffentlicht in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Ausgabe No.: 129, 2022, Seite(n) Pages 1–6
Herausgeber: Association for Computing Machinery
DOI: 10.1145/3538969.3544454

A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures

Autoren: Stelkens-Kobsch, Tim H., Hilke Boumann, Florian Piekert, Meilin Schaper, and Nils Carstengerdes
Veröffentlicht in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, Ausgabe 110, 2023, ISBN 979-8-4007-0772-8
Herausgeber: ACM
DOI: 10.1145/3600160.3605025

Detection of Cyber Security Threats through Social Media Platforms

Autoren: Antonios Karteris; Georgios Tzanos; Lazaros Papadopoulos; Dimitrios Soudris
Veröffentlicht in: 2023 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2023, ISBN 979-8-3503-1199-0
Herausgeber: IEEE
DOI: 10.1109/ipdpsw59300.2023.00137

Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach

Autoren: Mario Aragonés Lozano; Israel Pérez Llopis; Manuel Esteve Domingo
Veröffentlicht in: Mathematics; Volume 11; Ausgabe 16; Pages: 3448, Ausgabe 2, 2023, ISSN 2227-7390
Herausgeber: MDPI
DOI: 10.3390/math11163448

Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach

Autoren: Lazaros Papadopoulos, Konstantinos Demestichas, Eva Muñoz-Navarro, Juan José Hernández-Montesinos, Stephane Paul, Nicolas Museux, Sandra König, Stefan Schauer, Alfonso Climente Alarcón, Israel Perez Llopis, Tim Stelkens-Kobsch, Tamara Hadjina, Jelena Levak
Veröffentlicht in: International Journal of Critical Infrastructure Protection, Ausgabe Volume 44, March 2024, 100657, 2024, ISSN 2212-2087
Herausgeber: Elsevier
DOI: 10.1016/j.ijcip.2023.100657

Threat Hunting Architecture Using a Machine Learning Approach for Critical Infrastructures Protection

Autoren: Mario Aragonés Lozano; Israel Pérez Llopis; Manuel Esteve Domingo
Veröffentlicht in: Big Data and Cognitive Computing; Volume 7; Ausgabe 2; Pages: 65, Ausgabe 1, 2023, ISSN 2504-2289
Herausgeber: MDPI
DOI: 10.3390/bdcc7020065

Towards Optimized Security Attributes for IoT Devices in Smart Agriculture Based on the IEC 62443 Security Standard

Autoren: Abdelkader Magdy Shaaban, Sebastian Chlup, Nahla El-Araby, Christoph Schmittner
Veröffentlicht in: Applied Sciences, Ausgabe no. 11: 5653, 2022, ISSN 2076-3417
Herausgeber: MDPI
DOI: 10.3390/app12115653

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor