Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español es
CORDIS - Resultados de investigaciones de la UE
CORDIS

Data Usage Control for empowering digital sovereignty for All citizens

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Initial results of Data Sharing Agreement Management and Enforcement Infrastructures (se abrirá en una nueva ventana)

This deliverable will define the format of DSA and list the main considered operations. It will also describe the preliminary version of both DSA management and enforcement infrastructures.

Initial results of Design, implementation and evaluation of use cases (se abrirá en una nueva ventana)

This deliverable describes the methodology followed for the elicitation of the requirements and needs of each use case together with a report of common and specific requirements, reports about the design of the use cases for each use case and the preparation done for the integration of DUCA, and describes the initial integration of the DUCA approach in each use case, the process followed, and the fulfilment of requirements as described in D5.1

Initial results of requirements, architecture and integration test (se abrirá en una nueva ventana)

This report provides the complete list of requirements for the architectural components, the preliminary version of the DUCA architecture and the first version of the integrated DUCA platform.

Plan for dissemination, exploitation and communication (se abrirá en una nueva ventana)

This deliverable will present DUCAs dissemination exploitation and communications plan which will be used to transfer the knowledge obtained during the project lifecycle

Data Management Plan (DMP) (se abrirá en una nueva ventana)

The DMP describes the data management life cycle for the data collected processed andor generated by the project This deliverable will evolve during the project lifetime

Initial results of security and privacy enhancing technologies (se abrirá en una nueva ventana)

This deliverable reports on the requirements for all the components developed in tasks 4.1-4.6 and the preliminary maturation cycle of all the components ready to be integrated in WP2.

Publicaciones

A SLAHP in the Face of DLL Search Order Hijacking (se abrirá en una nueva ventana)

Autores: Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri
Publicado en: Communications in Computer and Information Science, Ubiquitous Security, 2024
Editor: Springer
DOI: 10.1007/978-981-97-1274-8_12

A Model For Assessing The Adherence of E-Identity Solutions To Self-Sovereign Identity (se abrirá en una nueva ventana)

Autores: Lepore, Cristian; Laborde, Romain; Eynard, Jessica; Kandi, Mohamed, Ali; Macilotti, Giorgia; Ferreira, Afonso; Sibilla, Michelle
Publicado en: World Conference on Information Systems and Technologies, 2024
Editor: Springer
DOI: 10.1007/978-3-031-60215-3_15

Explainable Ransomware Detection with Deep Learning Techniques (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Publicado en: Journal of Computer Virology and Hacking Techniques, Edición 20, 2024, ISSN 2263-8733
Editor: Springer Science and Business Media LLC
DOI: 10.1007/s11416-023-00501-1

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems (se abrirá en una nueva ventana)

Autores: Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Publicado en: ACM Transactions on Internet of Things, Edición 5, 2024, ISSN 2691-1914
Editor: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Digital twin communities: an approach for secure DT data sharing (se abrirá en una nueva ventana)

Autores: Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez
Publicado en: International Journal of Information Security, Edición 24, 2025, ISSN 1615-5262
Editor: Springer Science and Business Media LLC
DOI: 10.1007/s10207-024-00912-1

A method for real-world privacy-preserving Android malware detection through Federated Machine Learning (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Fabio Martinelli, Christian Peluso, Antonella Santone, Francesco Mercaldo
Publicado en: Information and Software Technology, Edición 189, 2025, ISSN 0950-5849
Editor: Elsevier BV
DOI: 10.1016/J.INFSOF.2025.107892

Explainable Security Requirements Classification Through Transformer Models (se abrirá en una nueva ventana)

Autores: Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
Publicado en: Future Internet, Edición 17, 2025, ISSN 1999-5903
Editor: MDPI AG
DOI: 10.3390/fi17010015

Digital Twin-assisted anomaly detection for industrial scenarios (se abrirá en una nueva ventana)

Autores: Cristina Alcaraz, Javier Lopez
Publicado en: International Journal of Critical Infrastructure Protection, Edición 47, 2024, ISSN 1874-5482
Editor: Elsevier BV
DOI: 10.1016/j.ijcip.2024.100721

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0