Deliverables Documents, reports (28) SCISSOR SIEM final design and development pro-vides the final specification and prototype description for the SCISSOR SIEM Revision of control framework: design and im-plementation Intermediate revision of the design and components prototyping of the control framework defined in D4.1.1 SCISSOR architecture specification This deliverable will document the first stage of architectural specifications in terms of system-as-a-whole platform. Final revision of monitoring layer components: design and prototype This deliverable will document the final monitoring layer design and components prototyping by revising D3.2 Revision of control layer techniques: semantic modeling and data protection Intermediate revision of the design and components prototyping of the semantic mod-eling and data protection techniques Revision of Human Machine Interface layer de-sign and implementation This document provides the final specification and prototype description for the HMI layer Decision and Analytics layer: Advanced detec-tion algorithms describes the design and implementation of the statistical and probabilistic algorithms at month 12. Control framework: design and implementation This deliverable documents the first stage of the design and components prototyping of the control frame-work. Human Machine Interface layer design and im-plementation This document describes the early design/implementation of the HMI layer components Report on dissemination, standardization and ex-ploitation: first year Report on dissemination, standardization and exploitation: first year Final integration status and Platform Assessment reports the final status of the SCISSOR integration activities. Moreover, this deliverable reports the final stage of security and resilience platform assessment Report on dissemination, standardization and ex-ploitation: second year Report on dissemination, standardization and exploitation: second year Revision of the advanced detection algorithms provides the final description of the statistical and probabilistic algorithms Final report on dissemination, standardization and exploitation Final report on dissemination, standardization and exploitation Revision of SCISSOR SIEM design and devel-opment describes the progress regarding the design and development of the SIEM SCISSOR SIEM design and development This deliverable documents the status of the early design and prototype of the SCISSOR SIEM Revision of use case scenarios and requirements analysis This deliverable will revise the use cases and requirements defined in D2.1 taking into account feedbacks coming from activities of WP3, WP4, WP5 and WP6. Revision of the SCISSOR architecture specifica-tion This de-liverable will revise architectural specifications provided in D2.2 integrating it with feedbacks from the early vali-dation stage Use case scenarios and requirements analysis This deliverable will document the first stage of the identification of the application scenarios as well as the architectural requirements of SCISSOR project. Integration Status and Platform Assessment This deliverable reports of the system integration activities at month 20, the status of the SCADA platform integration at month 20 and the second resilience and security assessment of the SCISSOR framework Control layer techniques: semantic modeling and data protection First stage of the design and components prototyping of the semantic modeling and data protection techniques. Monitoring layer components: design and proto-type This deliverable will document the first stage of monitoring layer design and components prototyping Final revision of control layer techniques: seman-tic modeling and data protection Final design/implementation of semantic modeling and data protection Revision of monitoring layer components: design and prototype This deliverable will document the intermediate revision of monitoring layer design and components prototyping defined in D3.1 Revision of Decision and Analytics layer: Ad-vanced detection algorithms updates the descriptions of the statistical and probabilistic algorithms Cloud platform initial design and security as-sessment This deliverable documents the early activities carried out in the WP6 regarding the design and deployment of the SCISSOR cloud platform. Moreover, T6.4 contributes to this deliverable by reporting the first resilience and security assessment of the SCISSOR framework Control framework: final design and implementa-tion This deliverable documents the final design and implementation of the control framework Final SCISSOR cloud platform This deliverable describes the final design and deployment of the SCISSOR cloud platform. Demonstrators, pilots, prototypes (3) Validation and Demonstration initial report Prelimi-nary trial plans, specification of validation methodologies and objectives, documentation of early stage validation activities. Validation and Demonstration final report This doc-uments describes the final status of the validation activities, for both the controlled and the uncontrolled environment Validation and Demonstration intermediate report This document updates D7.1.1 with the report of the first results on from the real world trial. Publications Book chapters (3) Agent-Based Multi-variant Crisis Handling Strategies for SCADA Systems Author(s): Grzegorz Dobrowolski, Aleksander Byrski, Leszek Siwik Published in: Multimedia Communications, Services and Security, 2015, Page(s) 61-71, ISBN 978-3-319-26404-2 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-26404-2_5 Multivariate Cluster-Based Discretization for Bayesian Network Structure Learning Author(s): Ahmed Mabrouk, Christophe Gonzales, Karine Jabet-Chevalier, Eric Chojnaki Published in: Scalable Uncertainty Management, 2015, Page(s) 155-169, ISBN 978-3-319-23540-0 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-23540-0_11 On the Doubly Sparse Compressed Sensing Problem Author(s): Grigory Kabatiansky, Serge Vlǎduţ, Cedric Tavernier Published in: Cryptography and Coding, 2015, Page(s) 184-189, ISBN 978-3-319-27239-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-27239-9_11 Peer reviewed articles (12) A systematic comparison of PCA-based Statistical Process Monitoring methods for high-dimensional, time-dependent Processes Author(s): Tiago Rato, Marco Reis, Eric Schmitt, Mia Hubert, Bart De Ketelaere Published in: AIChE Journal, Issue 62/5, 2016, Page(s) 1478-1493, ISSN 0001-1541 Publisher: American Institute of Chemical Engineers DOI: 10.1002/aic.15062 StreaMon: a data-plane programming abstraction for Software-defined Stream Monitoring Author(s): Marco Bonola, Giuseppe Bianchi, Giulio Picierro, Salvatore Pontarelli, Marco Monaci Published in: IEEE Transactions on Dependable and Secure Computing, 2015, Page(s) 1-1, ISSN 1545-5971 Publisher: IEEE Computer Society DOI: 10.1109/TDSC.2015.2499747 Sparse PCA for high-dimensional data with outliers Author(s): Mia Hubert, Tom Reynkens, Eric Schmitt, Tim Verdonck Published in: Technometrics, 2015, Page(s) 1-31, ISSN 0040-1706 Publisher: American Statistical Association DOI: 10.1080/00401706.2015.1093962 Statistical process monitoring of time-dependent data Author(s): Bart De Ketelaere, Tiago Rato, Eric Schmitt, Mia Hubert Published in: Quality Engineering, Issue 28/1, 2016, Page(s) 127-142, ISSN 0898-2112 Publisher: Marcel Dekker Inc. DOI: 10.1080/08982112.2015.1100474 RFID-based Multilevel Sensing Network for Industrial Internet of Things Author(s): S. Amendola, C. Occhiuzzi, S. Manzari, G. Marrocco Published in: IEEE Antennas and Propagation Magazine, 2017, Page(s) 1-24, ISSN 1045-9243 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1007/978-3-319-58190-3_1 Precision and Accuracy in UHF-RFID Power Measurements for Passive Sensing Author(s): Cecilia Occhiuzzi, Gaetano Marrocco Published in: IEEE Sensors Journal, Issue 16/9, 2016, Page(s) 3091-3098, ISSN 1530-437X Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/JSEN.2016.2526678 On conditional truncated densities Bayesian networks Author(s): Santiago Cortijo, Christophe Gonzales Published in: International Journal of Approximate Reasoning, Issue 92, 2018, Page(s) 155-174, ISSN 0888-613X Publisher: Elsevier BV DOI: 10.1016/j.ijar.2017.10.007 Detecting Deviating Data Cells Author(s): Peter J. Rousseeuw, Wannes Van Den Bossche Published in: Technometrics, 2017, Page(s) 1-11, ISSN 0040-1706 Publisher: American Statistical Association DOI: 10.1080/00401706.2017.1340909 Parameter selection guidelines for adaptive PCA-based control charts Author(s): Eric Schmitt, Tiago Rato, Bart De Ketelaere, Marco Reis, Mia Hubert Published in: Journal of Chemometrics, Issue 30/4, 2016, Page(s) 163-176, ISSN 0886-9383 Publisher: John Wiley & Sons Ltd. DOI: 10.1002/cem.2783 Overview of PCA-Based Statistical Process-Monitoring Methods for Time-Dependent, High-Dimensional Data Author(s): Bart De Ketelaere, Mia Hubert, Eric Schmitt Published in: Journal of Quality Technology, Issue 47/4, 2015, Page(s) 318-335, ISSN 0022-4065 Publisher: American Society of Quality DOI: 10.1080/00224065.2015.11918137 Configurable radiofrequency identification sensing breadboard for industrial Internet of Things Author(s): C. Occhiuzzi, S. Amendola, S. Manzari, S. Caizzone, G. Marrocco Published in: Electronics Letters, Issue 53/3, 2017, Page(s) 129-130, ISSN 0013-5194 Publisher: Institute of Electrical Engineers DOI: 10.1049/el.2016.3669 An Identity-Based Data Aggregation Protocol for the Smart Grid Author(s): Zhiwei Wang Published in: IEEE Transactions on Industrial Informatics, Issue 13/5, 2017, Page(s) 2428-2435, ISSN 1551-3203 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/TII.2017.2705218 Conference proceedings (6) Towards scalable and adaptable security monitoring Author(s): Christof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva Published in: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), 2017, Page(s) 1-6, ISBN 978-1-5090-6468-7 Publisher: IEEE DOI: 10.1109/PCCC.2017.8280502 Optimized linear complementary codes implementation for hardware trojan prevention Author(s): Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Tliibault Porteboeuf, Cedric Tavernier Published in: 2015 European Conference on Circuit Theory and Design (ECCTD), 2015, Page(s) 1-4, ISBN 978-1-4799-9877-7 Publisher: IEEE DOI: 10.1109/ECCTD.2015.7300075 Contour Extraction and Compression Scheme Utilizing Both the Transform and Spatial Image Domains Author(s): Remigiusz Baran, Andrzej Dziech, Jakob Wassermann Published in: 2017, Page(s) 1-15 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-69911-0_1 Facing lateral movements using widespread behavioral probes Author(s): Alessandro Greco, Alberto Caponi, Giuseppe Bianchi Published in: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016, Page(s) 159-160, ISBN 978-1-908320-73-5 Publisher: IEEE DOI: 10.1109/ICITST.2016.7856688 D-STREAMON — NFV-Capable Distributed Framework for Network Monitoring Author(s): Davide Palmisano, Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi Published in: 2017 29th International Teletraffic Congress (ITC 29), 2017, Page(s) 30-35, ISBN 978-0-9883045-3-6 Publisher: IEEE DOI: 10.23919/ITC.2017.8065707 D-StreaMon: From middlebox to distributed NFV framework for network monitoring Author(s): Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Davide Palmisano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi Published in: 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2017, Page(s) 1-2, ISBN 978-1-5386-0728-2 Publisher: IEEE DOI: 10.1109/LANMAN.2017.7972149 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available