Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Cyber-kinetic attacks using Artificial Intelligence

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Communication actions M6 (se abrirá en una nueva ventana)

This deliverable will provide a detailed description of the actions taken to communicate about the project. Incremental versions of the document will be delivered, at M6, M18 and M36. Document at M6 will mainly describe communication plans. At M18, it will report on the past actions and describe the updated version of the communication actions. At M36, the deliverable will focus on reporting and assessing the communication actions taken during the project.

Dissemination and exploitation plans M24 (se abrirá en una nueva ventana)

These deliverables will provide a plan for dissemination and exploitation activities which will be implemented in T7.2. Plans will identify the project assets to communicate and exploit, the targets for the dissemination and exploitation activities, as well as the actions more suitable to reach them. It will also set interim and final KPIs for both activities to ensure project goals are fully achieved.

Dissemination and exploitation plans M12 (se abrirá en una nueva ventana)

These deliverables will provide a plan for dissemination and exploitation activities which will be implemented in T7.2. Plans will identify the project assets to communicate and exploit, the targets for the dissemination and exploitation activities, as well as the actions more suitable to reach them. It will also set interim and final KPIs for both activities to ensure project goals are fully achieved.

Communication actions 18 (se abrirá en una nueva ventana)

This deliverable will provide a detailed description of the actions taken to communicate about the project. Incremental versions of the document will be delivered, at M6, M18 and M36. Document at M6 will mainly describe communication plans. At M18, it will report on the past actions and describe the updated version of the communication actions. At M36, the deliverable will focus on reporting and assessing the communication actions taken during the project.

Publicaciones

How to Train your Antivirus: RL-based Hardening through the Problem Space (se abrirá en una nueva ventana)

Autores: Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro
Publicado en: The 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2025
Editor: ACM
DOI: 10.1145/3678890.3678912

KINAITICS: Enhancing Cybersecurity Education Using AI-Based Tools and Gamification (se abrirá en una nueva ventana)

Autores: Francesco Zola, Xabier Echeberria, Jokin Petisco, Nikos Vakakis, Antonis Voulgaridis, Kostantinos Votis
Publicado en: Proceedings of the 2024 16th International Conference on Education Technology and Computers, 2025
Editor: ACM
DOI: 10.1145/3702163.3702183

NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness (se abrirá en una nueva ventana)

Autores: Xabier Echeberria-Barrio, Mikel Gorricho, Selene Valencia, Francesco Zola
Publicado en: Computer Science & Information Technology (CS & IT), Edición 2, 2024, ISSN 2231-5403
Editor: AIRCC
DOI: 10.5121/csit.2024.140209

Designing AI Systems with Correction Mechanisms Towards Attack-Resilient Architectures (se abrirá en una nueva ventana)

Autores: Efi Kafali, Christoforos N. Spartalis, Theodoros Semertzidis, Charalampos Z. Patrikakis, Petros Daras
Publicado en: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Editor: IEEE
DOI: 10.1109/CSR64739.2025.11130000

CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity (se abrirá en una nueva ventana)

Autores: José Álvaro Fernández Carrasco, Iñigo Amonarriz Pagola, Raúl Orduna Urrutia, Rodrigo Román
Publicado en: 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2024
Editor: IEEE
DOI: 10.1109/IOTSMS62296.2024.10710208

Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach (se abrirá en una nueva ventana)

Autores: Prodromos Kiriakidis, Efi Kafali, Georgios Rizos, Antonis Voulgaridis, Theodoros Semertzidis, Stephane Gazut, Petros Daras, Konstantinos Votis
Publicado en: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
Editor: IEEE
DOI: 10.1109/CSR61664.2024.10679406

Defending Against AI Threats with a User-Centric Trustworthiness Assessment Framework (se abrirá en una nueva ventana)

Autores: Efi Kafali; Davy Preuveneers; Theodoros Semertzidis; Petros Daras
Publicado en: Big Data and Cognitive Computing, 2024, ISSN 2504-2289
Editor: MDPI
DOI: 10.3390/BDCC8110142

Dynamic Trade-Offs in Adversarial Training: Exploring Efficiency, Robustness, Forgetting, and Interpretability (se abrirá en una nueva ventana)

Autores: Efi Kafali, Theodoros Semertzidis, Petros Daras
Publicado en: Neural Processing Letters, Edición 57, 2025, ISSN 1573-773X
Editor: Springer Science and Business Media LLC
DOI: 10.1007/S11063-025-11751-Z

An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet. 2024; 16(3):69. (se abrirá en una nueva ventana)

Autores: Preuveneers D, Joosen W.
Publicado en: Future Internet, Edición 69, 2024, ISSN 1999-5903
Editor: MDPI
DOI: 10.3390/fi16030069

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0