Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Cyber-kinetic attacks using Artificial Intelligence

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Communication actions M6 (öffnet in neuem Fenster)

This deliverable will provide a detailed description of the actions taken to communicate about the project. Incremental versions of the document will be delivered, at M6, M18 and M36. Document at M6 will mainly describe communication plans. At M18, it will report on the past actions and describe the updated version of the communication actions. At M36, the deliverable will focus on reporting and assessing the communication actions taken during the project.

Dissemination and exploitation plans M24 (öffnet in neuem Fenster)

These deliverables will provide a plan for dissemination and exploitation activities which will be implemented in T7.2. Plans will identify the project assets to communicate and exploit, the targets for the dissemination and exploitation activities, as well as the actions more suitable to reach them. It will also set interim and final KPIs for both activities to ensure project goals are fully achieved.

Dissemination and exploitation plans M12 (öffnet in neuem Fenster)

These deliverables will provide a plan for dissemination and exploitation activities which will be implemented in T7.2. Plans will identify the project assets to communicate and exploit, the targets for the dissemination and exploitation activities, as well as the actions more suitable to reach them. It will also set interim and final KPIs for both activities to ensure project goals are fully achieved.

Communication actions 18 (öffnet in neuem Fenster)

This deliverable will provide a detailed description of the actions taken to communicate about the project. Incremental versions of the document will be delivered, at M6, M18 and M36. Document at M6 will mainly describe communication plans. At M18, it will report on the past actions and describe the updated version of the communication actions. At M36, the deliverable will focus on reporting and assessing the communication actions taken during the project.

Veröffentlichungen

How to Train your Antivirus: RL-based Hardening through the Problem Space (öffnet in neuem Fenster)

Autoren: Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro
Veröffentlicht in: The 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2025
Herausgeber: ACM
DOI: 10.1145/3678890.3678912

KINAITICS: Enhancing Cybersecurity Education Using AI-Based Tools and Gamification (öffnet in neuem Fenster)

Autoren: Francesco Zola, Xabier Echeberria, Jokin Petisco, Nikos Vakakis, Antonis Voulgaridis, Kostantinos Votis
Veröffentlicht in: Proceedings of the 2024 16th International Conference on Education Technology and Computers, 2025
Herausgeber: ACM
DOI: 10.1145/3702163.3702183

NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness (öffnet in neuem Fenster)

Autoren: Xabier Echeberria-Barrio, Mikel Gorricho, Selene Valencia, Francesco Zola
Veröffentlicht in: Computer Science & Information Technology (CS & IT), Ausgabe 2, 2024, ISSN 2231-5403
Herausgeber: AIRCC
DOI: 10.5121/csit.2024.140209

Designing AI Systems with Correction Mechanisms Towards Attack-Resilient Architectures (öffnet in neuem Fenster)

Autoren: Efi Kafali, Christoforos N. Spartalis, Theodoros Semertzidis, Charalampos Z. Patrikakis, Petros Daras
Veröffentlicht in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Herausgeber: IEEE
DOI: 10.1109/CSR64739.2025.11130000

CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity (öffnet in neuem Fenster)

Autoren: José Álvaro Fernández Carrasco, Iñigo Amonarriz Pagola, Raúl Orduna Urrutia, Rodrigo Román
Veröffentlicht in: 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2024
Herausgeber: IEEE
DOI: 10.1109/IOTSMS62296.2024.10710208

Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach (öffnet in neuem Fenster)

Autoren: Prodromos Kiriakidis, Efi Kafali, Georgios Rizos, Antonis Voulgaridis, Theodoros Semertzidis, Stephane Gazut, Petros Daras, Konstantinos Votis
Veröffentlicht in: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
Herausgeber: IEEE
DOI: 10.1109/CSR61664.2024.10679406

Defending Against AI Threats with a User-Centric Trustworthiness Assessment Framework (öffnet in neuem Fenster)

Autoren: Efi Kafali; Davy Preuveneers; Theodoros Semertzidis; Petros Daras
Veröffentlicht in: Big Data and Cognitive Computing, 2024, ISSN 2504-2289
Herausgeber: MDPI
DOI: 10.3390/BDCC8110142

Dynamic Trade-Offs in Adversarial Training: Exploring Efficiency, Robustness, Forgetting, and Interpretability (öffnet in neuem Fenster)

Autoren: Efi Kafali, Theodoros Semertzidis, Petros Daras
Veröffentlicht in: Neural Processing Letters, Ausgabe 57, 2025, ISSN 1573-773X
Herausgeber: Springer Science and Business Media LLC
DOI: 10.1007/S11063-025-11751-Z

An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet. 2024; 16(3):69. (öffnet in neuem Fenster)

Autoren: Preuveneers D, Joosen W.
Veröffentlicht in: Future Internet, Ausgabe 69, 2024, ISSN 1999-5903
Herausgeber: MDPI
DOI: 10.3390/fi16030069

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0