Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS

Bridging the security, privacy and data protection gap for smaller enterprises in Europe

Deliverables

The SENTINEL QA plan and periodic monitoring report - second version

D86 The SENTINEL QA plan and periodic monitoring report second version Lead ITML Due M18 R T81 PU

The SENTINEL QA plan and periodic monitoring report - first version

D85 The SENTINEL QA plan and periodic monitoring report first version Lead ITML Due M3 R T81 PU

The SENTINEL technical architecture

D12 The SENTINEL technical architecture Lead INTRA Due M6 R T12 PU

Ecosystem building and SMEs engagement report - interim version

D75 Ecosystem building and SMEs engagement report interim version Lead UNINOVA Due M18 R T74 PU

The SENTINEL project handbook - first version

D88 The SENTINEL project handbook first version Lead ITML Due M4 R T81 T82 PU

Dissemination strategy and activities - interim version

D73 Dissemination strategy and activities interim version Lead UNINOVA Due M18 R T72 PU

The SENTINEL experimentation protocol

D13 The SENTINEL experimentation protocol Lead IDIR Due M6 R T13 PU

Continuous data privacy legislation compliance monitoring and guidelines - interim version

D24 Continuous data privacy legislation compliance monitoring and guidelines interim version Lead CECL Due M18 R T25 PU

The SENTINEL project handbook - second version

D89 The SENTINEL project handbook second version Lead ITML Due M12 R T81 T82 PU

The SENTINEL baseline

D11 The SENTINEL baseline Lead IDIR Due M4 R T11 T12 PU

Yearly project management report - first version

D81 Yearly project management report first version Lead ITML Due M12 R T81 PU

The SENTINEL digital core: Full-featured version

D3.2: The SENTINEL digital core: Full-featured version (Lead: ITML; Due: M18; DEM [T3.1-T3.4]; PU)

The SENTINEL services: Full-featured version

D4.2: The SENTINEL services: Full-featured version (Lead: STS; Due: M18; DEM [T4.1-T4.4]; PU)

The SENTINEL integrated solution - interim version

D5.5: The SENTINEL integrated solution – interim version (Lead: INTRA; Due: M18; R+DEM [T5.2] PU)

The SENTINEL visualisation and UI component - second version

D5.2: The SENTINEL visualisation and UI component – second version (Lead: AEGIS; Due: M18; DEM [T5.1]; PU)

The SENTINEL services: MVP

D4.1: The SENTINEL services: MVP (Lead: IDIR; Due: M12; DEM [T4.1, T4.3]; PU)

The SENTINEL privacy & data protection suite for SMEs/MEs: MVP
The SENTINEL Minimum Viable Product

D5.4: The SENTINEL Minimum Viable Product (Lead: INTRA; Due: M12; R+DEM [T5.2] PU)

The SENTINEL digital core: MVP

D3.1: The SENTINEL digital core: MVP (Lead: ITML; Due: M12; DEM [T3.1-T3.3]; PU)

The SENTINEL website and visual identity

D7.1. The SENTINEL website and visual identity (Lead ITML; Due: M2; R+DEM [T7.1]; PU)

The SENTINEL visualisation and UI component - first version

D5.1: The SENTINEL visualisation and UI component – first version (Lead: AEGIS; Due: M12; DEM [T5.1]; PU)

The SENTINEL privacy & data protection suite for SMEs/MEs: Full-featured version

D2.2: The SENTINEL privacy & data protection suite for SMEs/MEs: Full-featured version (Lead: FP; Due: M18; DEM [T2.1-T2.4]; PU)

The SENTINEL data management plan

D89 The SENTINEL data management plan Lead ITML Due M6 R T81 PU

Publications

Digitalizing process assessment approach: An illustration with GDPR Compliance Self-Assessment for SMEs

Author(s): Stéphane Cortina, Michel Picard, Samuel Renault, Philippe Valoggia
Published in: Systems, Software and Services Process Improvement (EuroSPI 2023), Issue 30 August 2023, 2023
Publisher: SpringerLink
DOI: 10.1007/978-3-031-42310-9_9

Capability oriented RE for Cybersecurity and Personal Data Protection: Meeting the challenges of SMEs

Author(s): Kavakli, Evangelia; Loucopoulos, Pericles; Skourtis, Yannis
Published in: IEEE 30th International Requirements Engineering Conference Workshops (REW), Issue 20 October 2022, 2022
Publisher: IEEE
DOI: 10.1109/rew56159.2022.00053

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain

Author(s): George Hatzivasilis, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, Jose Francisco Ruiz
Published in: IEEE International Conference on Cyber Security and Resilience (CSR 2023), Issue 28 August 2023, 2023
Publisher: IEEE
DOI: 10.1109/csr57506.2023.10224971

A Systematic Analysis of the Event-Stream Incident

Author(s): Arvanitis, Iosif; Ntousakis, Grigoris; Ioannidis, Sotiris; Vasilakis, Nikos
Published in: Proceedings of the 15th European Workshop on Systems Security, Issue 05 April 2022, 2022
Publisher: Association for Computing Machinery
DOI: 10.1145/3517208.3523753

Fingerprinting the Shadows: Unmasking Malicious Servers withMachine Learning-Powered TLS Analysis

Author(s): Andreas Theofanous, Eva Papadogiannaki, Alexander Shevtsov, Sotiris Ioannidis
Published in: WWW '24: Proceedings of the ACM on Web Conference 2024, Issue 13 May 2024, 2024
Publisher: ACM
DOI: 10.1145/3589334.3645719

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning

Author(s): Drakonakis, Kostas; Ioannidis, Sotiris; Polakis, Jason
Published in: Proceedings of Network and Distributed System Security Symposium, Issue 27 February 2023, 2023
Publisher: NDSS Symposium
DOI: 10.14722/ndss.2023.24169

SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprises

Author(s): Trantidou, Tatiana; Bravos, George; Valoggia, Philippe; Skourtis, Ioannis; Falelakis, Manolis; Poulios, Kostas; Spais, Ilias; Ioannidis, Sotiris; Oudin, Thomas; Costa, Ruben; Konialis, Christopher; Holkham, Daryl; Kasapi, Zoe; Karantjias, Athanasios
Published in: IEEE International Conference on Cyber Security and Resilience (CSR), Issue 16 August 2022, 2022
Publisher: IEEE
DOI: 10.1109/csr54599.2022.9850297

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting

Author(s): Eva Papadogiannaki, Sotiris Ioannidis
Published in: IEEE Symposium on Computers and Communications (ISCC 2023), Issue 28 August 2023, 2023
Publisher: IEEE
DOI: 10.1109/iscc58397.2023.10218210

Energy-aware Trajectory Optimization for UAV-mounted RIS and Full-duplex Relay

Author(s): Dimitrios Tyrovolas, Nikos A. Mitsiou, Thomas G. Boufikos, Prodromos-Vasileios Mekikis, Sotiris A. Tegos, Panagiotis D. Diamantoulakis, Sotiris Ioannidis, Christos K. Liaskos; George K. Karagiannidis
Published in: IEEE Internet of Things Journal, Issue 18 April 2024, 2024, Page(s) 24259 - 24272, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/jiot.2024.3390767

A taxonomy for cybersecurity standards

Author(s): Eleni-Maria Kalogeraki, Nineta Polemi
Published in: Journal of Surveillance, Security and Safety, Issue 27 Apr 2024, 2024, Page(s) 95-115, ISSN 2694-1015
Publisher: Journal of Surveillance, Security and Safety
DOI: 10.20517/jsss.2023.50

Swarm-Intelligence for the Modern ICT Ecosystems

Author(s): George Hatzivasilis, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Spyros Papastergiou, Stylianos Karagiannis, Andreas Alexopoulos, Dimitry Amelin, Stephan Kiefer
Published in: International Journal of Information Security, Issue 18 June 2024, 2024, ISSN 1615-5270
Publisher: International Journal of Information Security
DOI: 10.1007/s10207-024-00869-1

Data Protection for SMEs

Author(s): Feneriki Panagopoulou
Published in: E-politeia 10th edition, Issue 10 April 2024, 2024, ISSN 2732-9666
Publisher: E-politeia
DOI: 10.5281/zenodo.11072859

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available