Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

Monitoring, Investigation and Response to cyber-attacks with an Adaptive digital twiN moDel for Agile services over the computing continuum

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Towards an Architecture for Managing Security Under the EU Cyber Resilience Act (opens in new window)

Author(s): Daniele Canavese, Afonso Ferreira, Romain Laborde, Mohamed Ali Kandi
Published in: Lecture Notes in Computer Science, Security and Trust Management, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-06155-3_9

Network Policy Enforcement in Cloud-Native Environments (opens in new window)

Author(s): Tomás, Pedro; Ribeiro da Silva, Sofia Margarida; Neto, Marco; Proença, Jorge; Rosa, Luis; Cordeiro, Luis; Taleb, Tarik; Cruz, Tiago
Published in: IFIP Advances in Information and Communication Technology ISBN: 9783031973161, 2025
Publisher: Springer Nature
DOI: 10.5281/ZENODO.17727759

Vulnerabilities Of Machine Learning Algorithms To Adversarial Attacks In Medical Images (opens in new window)

Author(s): Karolina Krzton, Joanna Kolodziej, Adrian Widlak, Mateusz Nawrocki, Jose Sigut
Published in: ECMS 2025 Proceedings edited by Marco Scarpa, Salvatore Cavalieri, Salvatore Serrano, Fabrizio De Vita, 2025
Publisher: ECMS
DOI: 10.7148/2025-0255

Context Discovery for Digital Service Chain with OpenC2 (opens in new window)

Author(s): Silvio Tanzarella, Matteo Repetto
Published in: 2025 IEEE 11th International Conference on Network Softwarization (NetSoft), 2025
Publisher: IEEE
DOI: 10.1109/NETSOFT64993.2025.11080629

Adversarial Robustness Of Multimodal Machine Learning Models (opens in new window)

Author(s): Mateusz Kowalczyk, Karolina Seweryn, Joanna Kolodziej, Mateusz Krzyszton
Published in: ECMS 2025 Proceedings edited by Marco Scarpa, Salvatore Cavalieri, Salvatore Serrano, Fabrizio De Vita, 2025
Publisher: ECMS
DOI: 10.7148/2025-0248

Uncovering challenges of cybersecurity cross-regulation in EU legislation (opens in new window)

Author(s): Daniele Canavese, Afonso Ferreira, Liina Kamm, Adrian Quesada Rodriguez
Published in: Information and Software Technology, Issue 193, 2026, ISSN 0950-5849
Publisher: Elsevier BV
DOI: 10.1016/J.INFSOF.2026.108033

Otupy: A flexible, portable, and extensible framework for remote control of security functions (opens in new window)

Author(s): Matteo Repetto
Published in: Computers & Security, Issue 158, 2025, ISSN 0167-4048
Publisher: Elsevier BV
DOI: 10.1016/J.COSE.2025.104597

Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity (opens in new window)

Author(s): Max Landauer, Leonhard Alton, Martina Lindorfer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner
Published in: Digital Threats: Research and Practice, Issue 6, 2025, ISSN 2692-1626
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3770085

Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains (opens in new window)

Author(s): M. Repetto
Published in: Journal of Information Security and Applications, Issue 96, 2025, ISSN 2214-2126
Publisher: Elsevier BV
DOI: 10.1016/J.JISA.2025.104299

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0