Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

SECURE-BY-DESIGN IOT OPERATION WITH SUPPLY CHAIN CONTROL

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

IoT supply chain security requirements (opens in new window)

List of security requirements the STC needs to satisfy

Specification of DSP (opens in new window)

Information content, format and other technical details

Unified component testing methodology (opens in new window)

Summary of the test activities integrated into the platform

Integrated IoT supply chain concept (opens in new window)

Description of the overall approach, major design input for the STC implementation

Data Management Plan_v1 (opens in new window)

How research data is handled throughout its lifecycle

Publications

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy (opens in new window)

Author(s): Gelenbe, Erol; Nasereddin, Mohammed; Gelenbe, Erol; Nasereddin, Mohammed
Published in: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023
Publisher: IEEE
DOI: 10.5281/zenodo.10154446

IoT Performance for Maritime Passenger Evacuation (opens in new window)

Author(s): Gelenbe, Erol; Liu, Kezhong; Ma, Yuting; Ma, Yuting; Gelenbe, Erol; Liu, Kezhong
Published in: 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), 2024
Publisher: IEEExplore
DOI: 10.1109/wf-iot62078.2024.10811235

Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing (opens in new window)

Author(s): Barakat, Ramon; Schneider, Martin; Josten, Silvan; Barakat, Ramon; Josten, Silvan; Schneider, Martin
Published in: EuroCyberSec2024 at the 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.14497331

Vulnerability Classification on Source Code Using Text Mining and Deep Learning Techniques (opens in new window)

Author(s): Kalouptsoglou, Ilias; Siavvas, Miltiadis; Ampatzoglou, Apostolos; Kehagias, Dionysios; Chatzigeorgiou, Alexander
Published in: 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.12748077

Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection (opens in new window)

Author(s): Gelenbe, Erol; Nakıp, Mert; Gül, Baran Can; Nakip, Mert; Gül, Baran Can; Gelenbe, Erol
Published in: 2023 31st International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2023
Publisher: IEEE
DOI: 10.5281/zenodo.10245869

Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed (opens in new window)

Author(s): Mohammed Nasereddin; Mert Nakip; Gelenbe, Erol
Published in: 2023 IEEE 48th Conference on Local Computer Networks (LCN), 2023
Publisher: IEEE
DOI: 10.48550/arxiv.2305.10565

On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model (opens in new window)

Author(s): Gelenbe, Erol; Bergquist, Jacob; Sigman, Karl; Bergquist, Jacob; Gelenbe, Erol; Sigman, Karl
Published in: 2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.13860521

A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform (opens in new window)

Author(s): Nagy, Roland; Buttyán, Levente; Maliga, Dávid; Maliga, Dávid; Nagy, Roland; Buttyán, Levente
Published in: EuroCyberSec 2024 Workshop at the 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2024
Publisher: IEEEExplore
DOI: 10.5281/zenodo.14497265

Software Requirements Classification: From Bag-of-Words to Transformer (opens in new window)

Author(s): Xanthopoulou, Georgia; Siavvas, Miltiadis; Kalouptsoglou, Ilias; Kehagias, Dionysios; Tzovaras, Dimitrios
Published in: Special Session on Intelligent Internet of Things Security and Privacy in conjunction with the 21st International Conference on Distributed Computing and Artificial Intelligence (WISP2024 in conjunction with DCAI2024), 2024
Publisher: Springer
DOI: 10.13140/rg.2.2.35146.58563

A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification (opens in new window)

Author(s): Sara N. Matheu, Juan F. Martínez-Gil, Irene Bicchierai, Jan Marchel, Radosław Piliszek, Antonio Skarmeta
Published in: Applied Sciences, Issue 15, 2025, ISSN 2076-3417
Publisher: MDPI AG
DOI: 10.3390/APP15031600

DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles (opens in new window)

Author(s): Gelenbe, Erol; Mert, Nakip; Gül, Baran Can; Gelenbe, Erol; Gül, Baran Can; Mert, Nakip
Published in: IEEE Internet of Things, 2024, ISSN 0000-0000
Publisher: IEEE
DOI: 10.5281/zenodo.13622689

Adaptive Attack Mitigation for IoV Flood Attacks (opens in new window)

Author(s): Erol Gelenbe, Mohammed Nasereddin
Published in: IEEE Internet of Things Journal, Issue 12, 2025, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JIOT.2025.3529615

Impact of IoT System Imperfections and Passenger Errors on Cruise Ship Evacuation Delay (opens in new window)

Author(s): Gelenbe, Erol; Liu, Kezhong; Ma, Yuting; Yuting, Ma; Gelenbe, Erol; Liu, Kezhong
Published in: Sensors, 2024, ISSN 0000-0000
Publisher: mdpi
DOI: 10.3390/s24061850

System Wide Vulnerability and Trust in Multi-Component Communication System Software (opens in new window)

Author(s): Erol Gelenbe; Mert Nakıp; Miltiadis Siavvas
Published in: IEEE Network, 2024, ISSN 0000-0000
Publisher: IEEE
DOI: 10.1109/mnet.2024.3452962

Online Self-Supervised Deep Learning for Intrusion Detection Systems (opens in new window)

Author(s): Gelenbe, Erol; Nakıp, Mert; Mert Nakıp; Erol Gelenbe
Published in: IEEE Transactions on Information Forensics and Security, 2023, ISSN 0000-0000
Publisher: IEEE
DOI: 10.48550/arxiv.2306.13030

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0