Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

An innovative Virtual Reality based intrusion detection, incident investigation and response approach for enhancing the resilience, security, privacy and accountability of complex and heterogeneous digital systems and infrastructures

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Intermidiary Report on Contribution to Certification Standardisation (opens in new window)

The report will describe the contributions to the standardization bodies, consortiums and Alliance.

Dissemination and Communication Strategy (opens in new window)

This report will describe the plan for the dissemination activities and strategies for engaging stakeholders.

Intermediary Report on Dissemination and Communication Activities (opens in new window)

The report will explain the dissemination activities that were carried out during the first reporting period.

Publications

Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI (opens in new window)

Author(s): Jean Haurogné, Nihala Basheer, Shareeful Islam
Published in: Machine Learning with Applications, Issue 18, 2024, ISSN 2666-8270
Publisher: Elsevier BV
DOI: 10.1016/j.mlwa.2024.100598

Sensors (opens in new window)

Author(s): Basheer, Nihala; Islam, Shareeful; Alwaheidi, Mohammed K. S.; Papastergiou, Spyridon
Published in: Sensors, Issue 24(15), 2024, ISSN 1424-8220
Publisher: MDPI
DOI: 10.3390/s24154859

Federated Learning-Based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges (opens in new window)

Author(s): Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, Shareeful Islam, A. K. M. Najmul Islam
Published in: IEEE Transactions on Consumer Electronics, Issue 70, 2024, ISSN 0098-3063
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TCE.2023.3318754

Automated penetration testing: Formalization and realization (opens in new window)

Author(s): Charilaos Skandylas; Mikael Asplund
Published in: Computers & Security, Issue 155, 2025, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.48550/ARXIV.2412.12745

Cyber Threat Assessment and Management for Securing Healthcare Ecosystems using Natural Language Processing (opens in new window)

Author(s): Stefano Silvestri; Shareful Islam; Dmitry Amelin; Gabriele Weiler; Spyridon Papastergiou; Mario Ciampi
Published in: International Journal of Information Security, Issue 23, 2023, ISSN 1615-5270
Publisher: Springer
DOI: 10.1007/S10207-023-00769-W

Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework (opens in new window)

Author(s): Randhir Kumar, Ahamed Aljuhani, Danish Javeed, Prabhat Kumar, Shareeful Islam, A.K.M. Najmul Islam
Published in: Future Generation Computer Systems, Issue 156, 2024, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2024.02.015

Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS (opens in new window)

Author(s): Islam, Shareeful; Javeed, Danish; Saeed, Muhammad Shahid; Kumar, Prabhat; Jolfaei, Alireza; Islam, A. K. M. Najmul Islam
Published in: Cognitive Computation, Issue 16, 2024, ISSN 1866-9964
Publisher: Springer
DOI: 10.5281/zenodo.13254989

REACT: Autonomous intrusion response system for intelligent vehicles (opens in new window)

Author(s): Mohammad Hamad; Andreas Finkenzeller; Michael Kühr; Andrew Roberts; Olaf Maennel; Vassilis Prevelakis; Sebastian Steinhorst
Published in: Computers & Security, 2024
DOI: 10.48550/arxiv.2401.04792

Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection (opens in new window)

Author(s): Islam Shareeful, Ahmed Abdullah Ahmed, Hasan Md. Mahmudul, Papastergiou Spyridon, Mouratidis Haralambos
Published in: 20th Artificial Intelligence Applications and Innovations (AIAI2024), 2024
Publisher: AIAI
DOI: 10.5281/zenodo.14832599

Securing Real-Time Systems using Schedule Reconfiguration (opens in new window)

Author(s): Hamad Mohammad, Hammadeh Zain A. H., Hasan, Monowar
Published in: 2024 IEEE 27th International Symposium on Real-Time Distributed Computing (ISORC), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.14806788

PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis (opens in new window)

Author(s): Hamad Mohammad, Steinhorst Sebastian, Finkenzeller Andreas, Butowski Oliver, Regnath Emanuel
Published in: IEEE International Conference on Computer Communications (IEEE INFOCOM 2024), 2024
Publisher: IEEE
DOI: 10.5281/ZENODO.14806692

Advanced IDPS Architecture for Connected and Autonomous Vehicles (opens in new window)

Author(s): Hamad Mohammad, SteinhorstSebastian, Kalli Valappil Sherin, Vogel Lars
Published in: 35th IEEE Intelligent Vehicles Symposium (EEE IV), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.14806852

Security Challenges in Autonomous Systems Design (opens in new window)

Author(s): Mohammad Hamad, Sebastian Steinhorst
Published in: Communications in Computer and Information Science, Computational Technologies and Electronics, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-81981-0_13

Similarity-Based Selective Federated Learning for Distributed Device-Specific Anomaly Detection (opens in new window)

Author(s): Christian Lübben, Marc-Oliver Pahl
Published in: NOMS 2024-2024 IEEE Network Operations and Management Symposium, 2024
Publisher: IEEE
DOI: 10.1109/NOMS59830.2024.10575258

Enhancing Malware Detection through Machine Learning using XAI with SHAP Framework (opens in new window)

Author(s): Islam Shareeful, Papastergiou Spyridon, Mouratidis Haralambos, Pranggono Bernardi
Published in: 20th Artificial Intelligence Applications and Innovations (AIAI2024), 2024
Publisher: AIAI
DOI: 10.5281/zenodo.14832484

Creating a Security Enforcement Environment for a Vehicular Platform (opens in new window)

Author(s): Tsantekidis, Marinos; Abdelghani, Souleima; Hamad, Mohammad; Prevelakis, Vassilis
Published in: 2023 IEEE Conference on Standards for Communications and Networking (CSCN), 2023, ISSN 2644-3252
Publisher: IEEE
DOI: 10.5281/zenodo.10282179

Shells Bells: Cyber-Physical Anomaly Detection in Data Centers (opens in new window)

Author(s): Pahl, Marc-Oliver, Wüstrich Lars, Gallenmüller Sebastian,Günther Stephan, Carle Georg
Published in: 2024 IEEE Network Operations and Management Symposium (NOMS2024), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.14807181

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0