Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Bridging the security, privacy and data protection gap for smaller enterprises in Europe

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

The SENTINEL integrated solution - final version (opens in new window)

D5.6: The SENTINEL integrated solution – final version (Lead: INTRA; Due: M30; R+DEM [T5.2] PU)

The SENTINEL digital core: Full-featured version (opens in new window)

D3.2: The SENTINEL digital core: Full-featured version (Lead: ITML; Due: M18; DEM [T3.1-T3.4]; PU)

The SENTINEL services: Full-featured version (opens in new window)

D4.2: The SENTINEL services: Full-featured version (Lead: STS; Due: M18; DEM [T4.1-T4.4]; PU)

The SENTINEL integrated solution - interim version (opens in new window)

D5.5: The SENTINEL integrated solution – interim version (Lead: INTRA; Due: M18; R+DEM [T5.2] PU)

The SENTINEL services: Final product (opens in new window)

D4.3: The SENTINEL services: Final product (Lead: ACS; Due: M30; DEM [T4.1-T4.4]; PU)

The SENTINEL visualisation and UI component - final version (opens in new window)

D5.3: The SENTINEL visualisation and UI component – final version (Lead: AEGIS; Due: M30; DEM [T5.1]; PU)

The SENTINEL visualisation and UI component - second version (opens in new window)

D5.2: The SENTINEL visualisation and UI component – second version (Lead: AEGIS; Due: M18; DEM [T5.1]; PU)

The SENTINEL services: MVP (opens in new window)

D4.1: The SENTINEL services: MVP (Lead: IDIR; Due: M12; DEM [T4.1, T4.3]; PU)

The SENTINEL privacy & data protection suite for SMEs/MEs: MVP (opens in new window)
The SENTINEL privacy & data protection suite for SMEs/MEs: Final product (opens in new window)

D2.3: The SENTINEL privacy & data protection suite for SMEs/MEs: Final product (Lead: LIST; Due: M30; DEM [T2.1-T2.4]; PU)

The SENTINEL Minimum Viable Product (opens in new window)

D5.4: The SENTINEL Minimum Viable Product (Lead: INTRA; Due: M12; R+DEM [T5.2] PU)

The SENTINEL digital core: MVP (opens in new window)

D3.1: The SENTINEL digital core: MVP (Lead: ITML; Due: M12; DEM [T3.1-T3.3]; PU)

The SENTINEL website and visual identity (opens in new window)

D7.1. The SENTINEL website and visual identity (Lead ITML; Due: M2; R+DEM [T7.1]; PU)

The SENTINEL visualisation and UI component - first version (opens in new window)

D5.1: The SENTINEL visualisation and UI component – first version (Lead: AEGIS; Due: M12; DEM [T5.1]; PU)

The SENTINEL privacy & data protection suite for SMEs/MEs: Full-featured version (opens in new window)

D2.2: The SENTINEL privacy & data protection suite for SMEs/MEs: Full-featured version (Lead: FP; Due: M18; DEM [T2.1-T2.4]; PU)

The SENTINEL digital core: Final product (opens in new window)

D3.3: The SENTINEL digital core: Final product (Lead: ITML; Due: M30; DEM [T3.1-T3.4]; PU)

The SENTINEL QA plan and periodic monitoring report - second version (opens in new window)

D86 The SENTINEL QA plan and periodic monitoring report second version Lead ITML Due M18 R T81 PU

The SENTINEL QA plan and periodic monitoring report - first version (opens in new window)

D85 The SENTINEL QA plan and periodic monitoring report first version Lead ITML Due M3 R T81 PU

The SENTINEL project handbook - third version (opens in new window)

D8.10 The SENTINEL project handbook – third version (Lead: ITML; Due: M24; R [T8.1, T8.2]; PU)

The SENTINEL QA plan and periodic monitoring report - final version (opens in new window)

D8.7: The SENTINEL QA plan and periodic monitoring report – final version (Lead ITML; Due: M36; R [T8.1]; PU)

Continuous data privacy legislation compliance monitoring and guidelines - final version (opens in new window)

D2.5: Continuous data privacy legislation compliance monitoring and guidelines – final version (Lead: CECL; Due: M30; R [T2.5]; PU)

The SENTINEL technical architecture (opens in new window)

D12 The SENTINEL technical architecture Lead INTRA Due M6 R T12 PU

Best practices for maintaining and operating the system in the long-term - TRL 7 (opens in new window)

D5.7: Best practices for maintaining and operating the system in the long-term – TRL 7 (Lead: UNINOVA; Due: M36; R [T5.3]; PU)

Ecosystem building and SMEs engagement report - interim version (opens in new window)

D75 Ecosystem building and SMEs engagement report interim version Lead UNINOVA Due M18 R T74 PU

Final business model, market analysis and long-term sustainability report (opens in new window)

D7.9. Final business model, market analysis and long-term sustainability report (Lead AEGIS; Due: M36; R [T71, T7.4]; PU)

The SENTINEL project handbook - first version (opens in new window)

D88 The SENTINEL project handbook first version Lead ITML Due M4 R T81 T82 PU

Dissemination strategy and activities - interim version (opens in new window)

D73 Dissemination strategy and activities interim version Lead UNINOVA Due M18 R T72 PU

The SENTINEL experimentation protocol (opens in new window)

D13 The SENTINEL experimentation protocol Lead IDIR Due M6 R T13 PU

Continuous data privacy legislation compliance monitoring and guidelines - interim version (opens in new window)

D24 Continuous data privacy legislation compliance monitoring and guidelines interim version Lead CECL Due M18 R T25 PU

Yearly project management report -third version (opens in new window)

D8.3 Yearly project management report -third version (Lead: ITML; Due: M36; R [T8.1]; PU)

SENTINEL Demonstration - final execution (opens in new window)

D6.2: SENTINEL Demonstration - final execution (Lead: CG; Due: M30; R [T6.2, T6.3]; PU)

The SENTINEL project handbook - second version (opens in new window)

D89 The SENTINEL project handbook second version Lead ITML Due M12 R T81 T82 PU

Dissemination strategy and activities - final version (opens in new window)

D7.4. Dissemination strategy and activities – final version (Lead UNINOVA; Due: M36; R [T7.2]; PU)

The SENTINEL baseline (opens in new window)

D11 The SENTINEL baseline Lead IDIR Due M4 R T11 T12 PU

Assessment report and impact analysis (opens in new window)

D6.3: Assessment report and impact analysis (Lead: STS; Due: M36; R [T6.2, T6.3]; PU)

Ecosystem building and SMEs engagement report - final version (opens in new window)

D7.6: Ecosystem building and SMEs engagement report – final version (Lead UNINOVA; Due: M36; R [T7.4]; PU)

Yearly project management report - first version (opens in new window)

D81 Yearly project management report first version Lead ITML Due M12 R T81 PU

Yearly project management report - second version (opens in new window)

D8.2 Yearly project management report – second version (Lead: ITML; Due: M24; R [T8.1]; PU)

The SENTINEL data management plan (opens in new window)

D89 The SENTINEL data management plan Lead ITML Due M6 R T81 PU

Publications

Digitalizing process assessment approach: An illustration with GDPR Compliance Self-Assessment for SMEs (opens in new window)

Author(s): Stéphane Cortina, Michel Picard, Samuel Renault, Philippe Valoggia
Published in: Systems, Software and Services Process Improvement (EuroSPI 2023), Issue 30 August 2023, 2023
Publisher: SpringerLink
DOI: 10.1007/978-3-031-42310-9_9

Capability oriented RE for Cybersecurity and Personal Data Protection: Meeting the challenges of SMEs (opens in new window)

Author(s): Kavakli, Evangelia; Loucopoulos, Pericles; Skourtis, Yannis
Published in: IEEE 30th International Requirements Engineering Conference Workshops (REW), Issue 20 October 2022, 2022
Publisher: IEEE
DOI: 10.1109/rew56159.2022.00053

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain (opens in new window)

Author(s): George Hatzivasilis, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, Jose Francisco Ruiz
Published in: IEEE International Conference on Cyber Security and Resilience (CSR 2023), Issue 28 August 2023, 2023
Publisher: IEEE
DOI: 10.1109/csr57506.2023.10224971

A Systematic Analysis of the Event-Stream Incident (opens in new window)

Author(s): Arvanitis, Iosif; Ntousakis, Grigoris; Ioannidis, Sotiris; Vasilakis, Nikos
Published in: Proceedings of the 15th European Workshop on Systems Security, Issue 05 April 2022, 2022
Publisher: Association for Computing Machinery
DOI: 10.1145/3517208.3523753

Fingerprinting the Shadows: Unmasking Malicious Servers withMachine Learning-Powered TLS Analysis (opens in new window)

Author(s): Andreas Theofanous, Eva Papadogiannaki, Alexander Shevtsov, Sotiris Ioannidis
Published in: WWW '24: Proceedings of the ACM on Web Conference 2024, Issue 13 May 2024, 2024
Publisher: ACM
DOI: 10.1145/3589334.3645719

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning (opens in new window)

Author(s): Drakonakis, Kostas; Ioannidis, Sotiris; Polakis, Jason
Published in: Proceedings of Network and Distributed System Security Symposium, Issue 27 February 2023, 2023
Publisher: NDSS Symposium
DOI: 10.14722/ndss.2023.24169

SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprises (opens in new window)

Author(s): Trantidou, Tatiana; Bravos, George; Valoggia, Philippe; Skourtis, Ioannis; Falelakis, Manolis; Poulios, Kostas; Spais, Ilias; Ioannidis, Sotiris; Oudin, Thomas; Costa, Ruben; Konialis, Christopher; Holkham, Daryl; Kasapi, Zoe; Karantjias, Athanasios
Published in: IEEE International Conference on Cyber Security and Resilience (CSR), Issue 16 August 2022, 2022
Publisher: IEEE
DOI: 10.1109/csr54599.2022.9850297

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting (opens in new window)

Author(s): Eva Papadogiannaki, Sotiris Ioannidis
Published in: IEEE Symposium on Computers and Communications (ISCC 2023), Issue 28 August 2023, 2023
Publisher: IEEE
DOI: 10.1109/iscc58397.2023.10218210

Energy-aware Trajectory Optimization for UAV-mounted RIS and Full-duplex Relay (opens in new window)

Author(s): Dimitrios Tyrovolas, Nikos A. Mitsiou, Thomas G. Boufikos, Prodromos-Vasileios Mekikis, Sotiris A. Tegos, Panagiotis D. Diamantoulakis, Sotiris Ioannidis, Christos K. Liaskos; George K. Karagiannidis
Published in: IEEE Internet of Things Journal, Issue 18 April 2024, 2024, Page(s) 24259 - 24272, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/jiot.2024.3390767

A taxonomy for cybersecurity standards (opens in new window)

Author(s): Eleni-Maria Kalogeraki, Nineta Polemi
Published in: Journal of Surveillance, Security and Safety, Issue 27 Apr 2024, 2024, Page(s) 95-115, ISSN 2694-1015
Publisher: Journal of Surveillance, Security and Safety
DOI: 10.20517/jsss.2023.50

Swarm-Intelligence for the Modern ICT Ecosystems (opens in new window)

Author(s): George Hatzivasilis, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Spyros Papastergiou, Stylianos Karagiannis, Andreas Alexopoulos, Dimitry Amelin, Stephan Kiefer
Published in: International Journal of Information Security, Issue 18 June 2024, 2024, ISSN 1615-5270
Publisher: International Journal of Information Security
DOI: 10.1007/s10207-024-00869-1

Data Protection for SMEs (opens in new window)

Author(s): Feneriki Panagopoulou
Published in: E-politeia 10th edition, Issue 10 April 2024, 2024, ISSN 2732-9666
Publisher: E-politeia
DOI: 10.5281/zenodo.11072859

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0