Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Cyber-kinetic attacks using Artificial Intelligence

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Communication actions M6 (opens in new window)

This deliverable will provide a detailed description of the actions taken to communicate about the project. Incremental versions of the document will be delivered, at M6, M18 and M36. Document at M6 will mainly describe communication plans. At M18, it will report on the past actions and describe the updated version of the communication actions. At M36, the deliverable will focus on reporting and assessing the communication actions taken during the project.

Dissemination and exploitation plans M24 (opens in new window)

These deliverables will provide a plan for dissemination and exploitation activities which will be implemented in T7.2. Plans will identify the project assets to communicate and exploit, the targets for the dissemination and exploitation activities, as well as the actions more suitable to reach them. It will also set interim and final KPIs for both activities to ensure project goals are fully achieved.

Dissemination and exploitation plans M12 (opens in new window)

These deliverables will provide a plan for dissemination and exploitation activities which will be implemented in T7.2. Plans will identify the project assets to communicate and exploit, the targets for the dissemination and exploitation activities, as well as the actions more suitable to reach them. It will also set interim and final KPIs for both activities to ensure project goals are fully achieved.

Communication actions 18 (opens in new window)

This deliverable will provide a detailed description of the actions taken to communicate about the project. Incremental versions of the document will be delivered, at M6, M18 and M36. Document at M6 will mainly describe communication plans. At M18, it will report on the past actions and describe the updated version of the communication actions. At M36, the deliverable will focus on reporting and assessing the communication actions taken during the project.

Publications

How to Train your Antivirus: RL-based Hardening through the Problem Space (opens in new window)

Author(s): Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro
Published in: The 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2025
Publisher: ACM
DOI: 10.1145/3678890.3678912

KINAITICS: Enhancing Cybersecurity Education Using AI-Based Tools and Gamification (opens in new window)

Author(s): Francesco Zola, Xabier Echeberria, Jokin Petisco, Nikos Vakakis, Antonis Voulgaridis, Kostantinos Votis
Published in: Proceedings of the 2024 16th International Conference on Education Technology and Computers, 2025
Publisher: ACM
DOI: 10.1145/3702163.3702183

NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness (opens in new window)

Author(s): Xabier Echeberria-Barrio, Mikel Gorricho, Selene Valencia, Francesco Zola
Published in: Computer Science & Information Technology (CS & IT), Issue 2, 2024, ISSN 2231-5403
Publisher: AIRCC
DOI: 10.5121/csit.2024.140209

Designing AI Systems with Correction Mechanisms Towards Attack-Resilient Architectures (opens in new window)

Author(s): Efi Kafali, Christoforos N. Spartalis, Theodoros Semertzidis, Charalampos Z. Patrikakis, Petros Daras
Published in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Publisher: IEEE
DOI: 10.1109/CSR64739.2025.11130000

CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity (opens in new window)

Author(s): José Álvaro Fernández Carrasco, Iñigo Amonarriz Pagola, Raúl Orduna Urrutia, Rodrigo Román
Published in: 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2024
Publisher: IEEE
DOI: 10.1109/IOTSMS62296.2024.10710208

Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach (opens in new window)

Author(s): Prodromos Kiriakidis, Efi Kafali, Georgios Rizos, Antonis Voulgaridis, Theodoros Semertzidis, Stephane Gazut, Petros Daras, Konstantinos Votis
Published in: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
Publisher: IEEE
DOI: 10.1109/CSR61664.2024.10679406

Defending Against AI Threats with a User-Centric Trustworthiness Assessment Framework (opens in new window)

Author(s): Efi Kafali; Davy Preuveneers; Theodoros Semertzidis; Petros Daras
Published in: Big Data and Cognitive Computing, 2024, ISSN 2504-2289
Publisher: MDPI
DOI: 10.3390/BDCC8110142

Dynamic Trade-Offs in Adversarial Training: Exploring Efficiency, Robustness, Forgetting, and Interpretability (opens in new window)

Author(s): Efi Kafali, Theodoros Semertzidis, Petros Daras
Published in: Neural Processing Letters, Issue 57, 2025, ISSN 1573-773X
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/S11063-025-11751-Z

An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet. 2024; 16(3):69. (opens in new window)

Author(s): Preuveneers D, Joosen W.
Published in: Future Internet, Issue 69, 2024, ISSN 1999-5903
Publisher: MDPI
DOI: 10.3390/fi16030069

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0