Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Cyber-security Excellence Hub in Estonia and South Moravia

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Initial Data Management Plan (opens in new window)

First version of the CHESS Data Management Plan.

Training and knowledge transfer needs and opportunities (SWOT) in the selected areas in South Moravia and Estonia (opens in new window)

A document describing the training and knowledge transfer needs of the CHESS regions.

Risk Management Plan (opens in new window)

A document outlining the risk management procedures of the CHESS project.

Dissemination, Exploitation and Communication Plan (opens in new window)

Description of target groups, messaging and tailored dissemination channels.

Project website (opens in new window)

Description of the project website.

Publications

The Finite Satisfiability Problem for PCTL is Undecidable (opens in new window)

Author(s): Miroslav Chodil, Antonín Kučera
Published in: Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS 2024), 2024, ISBN 979-8-4007-0660-8
Publisher: Association for Computing Machinery
DOI: 10.1145/3661814.3662145

Comparable and Repeatable Information Security Level Evaluation (opens in new window)

Author(s): Mari Seeba
Published in: CEUR Workshop Proceedings, 2024, ISSN 1613-0073
Publisher: CEUR‑WS
DOI: 10.5281/ZENODO.16093367

A Model of Qualitative Factors in Forensic-Ready Software Systems (opens in new window)

Author(s): Lukas Daubner, Raimundas Matulevičius and Barbora Buhnova
Published in: Research Challenges in Information Science: Information Science and the Connected World (RCIS 2023), 2023, ISSN 1865-1348
Publisher: Springer Nature Switzerland AG
DOI: 10.1007/978-3-031-33080-3_19

DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain (opens in new window)

Author(s): Iqbal, M., Suhail, S., Matulevicius, R.
Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security (2024), 2024, ISBN 979-8-4007-1718-5
Publisher: ACM
DOI: 10.1145/3664476.3670473

Secure and Privacy-Preserving Car-Sharing Systems (opens in new window)

Author(s): Lukas Malina, Petr Dzurenda, Norbert Lövinger, Ijeoma Faustina Ekeh, Raimundas Matulevicius
Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, ISBN 979-8-4007-1718-5
Publisher: ACM
DOI: 10.1145/3664476.3670443

CHESS: Cyber-security Excellence Hub in Estonia and South Moravia (opens in new window)

Author(s): Bakhtina, M., Vémolová, Z., and Matyáš
Published in: CEUR Workshop Proceedings, 2024, ISSN 1613-0073
Publisher: CEUR‑WS
DOI: 10.5281/ZENODO.11577196

Optimizing Local Satisfaction of Long-Run Average Objectives in Markov Decision Processes (opens in new window)

Author(s): Klaška, David; Kučera, Antonín; Kůr, Vojtěch; Musil, Vít; Řehák, Vojtěch
Published in: Proceedings of the AAAI Conference on Artificial Intelligence, 2024, ISSN 2159-5399
Publisher: AAAI Press, Washington, DC, USA
DOI: 10.1609/AAAI.V38I18.29993

Lattice-based Threshold Signature Implementation for Constrained Devices (opens in new window)

Author(s): Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov
Published in: Proceedings of the 20th International Conference on Security and Cryptography SECRYPT, Issue 1, 2023, ISSN 2184-7711
Publisher: SciTePress
DOI: 10.5220/0012112700003555

Reducing Acceptance Marks in Emerson-Lei Automata by QBF Solving (opens in new window)

Author(s): Tereza Schwarzová, Jan Strejček, Juraj Major
Published in: Leibniz International Proceedings in Informatics, 2023, ISSN 1868-8969
Publisher: Schloss Dagstuhl – Leibniz-Zentrum für Informatik
DOI: 10.4230/LIPICS.SAT.2023.23

On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms (opens in new window)

Author(s): Patrik Dobias, Lukas Malina, Petr Ilgner, Petr Dzurenda
Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES ’23), 2023, ISBN 979-8-4007-0772-8
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3600160.3605015

Synthesizing Resilient Strategies for Infinite-Horizon Objectives in Multi-Agent Systems (opens in new window)

Author(s): David Klaska, Antonín Kucera, Martin Kurecka, Vít Musil, Petr Novotný, Vojtech Rehák
Published in: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence (IJCAI 2023), 2023, ISBN 978-1-956792-03-4
Publisher: International Joint Conferences on Artificial Intelligence
DOI: 10.24963/IJCAI.2023/20

A Diagrammatic Algebra for Program Logics (opens in new window)

Author(s): Bonchi, F., Di Giorgio, A., Di Lavore, E.
Published in: Foundations of Software Science and Computation Structures. FoSSaCS 2025, Lecture Notes in Computer Science, 2025, ISSN 0302-9743
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-90897-2_15

Post-quantum trails: an educational board game about post-quantum cryptography (opens in new window)

Author(s): Vakarjuk, J., Snetkov, N.
Published in: Proceedings of the 7th International Conference on Historical Cryptology (HistoCrypt 2024), 2024
Publisher: Tartu University Library
DOI: 10.58009/AERE-PERENNIUS0115

String Diagrammatic Trace Theory (opens in new window)

Author(s): Matthew Earnshaw, Paweł Sobociński
Published in: 48th International Symposium on Mathematical Foundations of Computer Science (MFCS 2023). Leibniz International Proceedings in Informatics (LIPIcs), 2023, ISSN 1868-8969
Publisher: Schloss Dagstuhl – Leibniz-Zentrum für Informatik
DOI: 10.4230/LIPICS.MFCS.2023.43

A Decentralised Public Key Infrastructure for X-Road (opens in new window)

Author(s): Mariia Bakhtina, Kin Long Leung, Raimundas Matulevičius, Ahmed Awad, and Petr Švenda
Published in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, ISBN 979-8-4007-0772-8
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3600160.3605092

2LS: Arrays and Loop Unwinding (opens in new window)

Author(s): Viktor Malík, František Nečas, Peter Schrammel, Tomáš Vojnar
Published in: Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2023), 2023, ISSN 0302-9743
Publisher: Springer Nature Switzerland AG
DOI: 10.1007/978-3-031-30820-8_31

Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation (opens in new window)

Author(s): Antonín Dufka, Jakub Janků, Petr Švenda
Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, ISBN 979-8-4007-1718-5
Publisher: ACM
DOI: 10.1145/3664476.3670889

A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture (opens in new window)

Author(s): Lukas Daubner, Raimundas Matulevicius, Barbora Buhnova, Matej Antol, Michal Ruzicka and Tomas Pitner
Published in: Advanced Information Systems Engineering (CAiSE 2023), 2023, ISSN 0302-9743
Publisher: Springer Nature Switzerland AG
DOI: 10.1007/978-3-031-34560-9_31

Security level evaluation with F4SLE (opens in new window)

Author(s): Mari Seeba, Tarmo Oja, Maria Pibilota Murumaa, and Václav Stupka
Published in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, ISBN 979-8-4007-0772-8
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3600160.3605045

Tighter Construction of Tight Büchi Automata (opens in new window)

Author(s): Jankola, M., Strejček, J.
Published in: Foundations of Software Science and Computation Structures. FoSSaCS 2024. Lecture Notes in Computer Science., 2024, ISSN 0302-9743
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-57228-9_12

The Power of Many: Securing Organisational Identity Through Distributed Key Management (opens in new window)

Author(s): Mariia Bakhtina, Jan Kvapil, Petr Švenda, and Raimundas Matulevičius
Published in: Advanced Information Systems Engineering, 2024, ISSN 0302-9743
Publisher: Cham: Springer
DOI: 10.1007/978-3-031-61057-8_28

Cybersecurity Study Programs: What's in a Name? (opens in new window)

Author(s): VYKOPAL, J.; V. ŠVÁBENSKÝ; M. T. LOPEZ II and P. ČELEDA
Published in: Proceedings of the 56th ACM Technical Symposium on Computer Science Education, 2025
Publisher: ACM
DOI: 10.1145/3641554.3701976

Towards More Secure and Data Protective Intelligent Infrastructure Systems

Author(s): Mariia Bakhtina
Published in: Proceedings of the Doctoral Consortium Papers Presented at the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), 2023, ISSN 1613-0073
Publisher: CEUR-WS.org

Automated feedback for participants of hands-on cybersecurity training (opens in new window)

Author(s): Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Ján Dovjak
Published in: Education and Information Technologies, 2023, ISSN 1360-2357
Publisher: Springer Nature
DOI: 10.1007/S10639-023-12265-8

From Reports to Actions: Bridging the Customer Usability Gap in Penetration Testing (opens in new window)

Author(s): Katarina Galanska, Agata Kruzikova, Maria Pibilota Murumaa, Václav Matyáš, Mike Just
Published in: IEEE Access, Issue 13, 2025, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/ACCESS.2025.3561220

Information Security and Privacy Management in Intelligent Transportation Systems (opens in new window)

Author(s): Mariia Bakhtina, Raimundas Matulevičius, Lukaš Malina
Published in: Complex Systems Informatics and Modeling Quarterly (CSIMQ), 2024, ISSN 2255-9922
Publisher: RTU Press
DOI: 10.7250/CSIMQ.2024-38.04

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0