Skip to main content
European Commission logo print header

Security In trusted SCADA and smart-grids

Deliverables

SCISSOR SIEM final design and development

pro-vides the final specification and prototype description for the SCISSOR SIEM

Revision of control framework: design and im-plementation

Intermediate revision of the design and components prototyping of the control framework defined in D4.1.1

SCISSOR architecture specification

This deliverable will document the first stage of architectural specifications in terms of system-as-a-whole platform.

Final revision of monitoring layer components: design and prototype

This deliverable will document the final monitoring layer design and components prototyping by revising D3.2

Revision of control layer techniques: semantic modeling and data protection

Intermediate revision of the design and components prototyping of the semantic mod-eling and data protection techniques

Revision of Human Machine Interface layer de-sign and implementation

This document provides the final specification and prototype description for the HMI layer

Decision and Analytics layer: Advanced detec-tion algorithms

describes the design and implementation of the statistical and probabilistic algorithms at month 12.

Control framework: design and implementation

This deliverable documents the first stage of the design and components prototyping of the control frame-work.

Human Machine Interface layer design and im-plementation

This document describes the early design/implementation of the HMI layer components

Report on dissemination, standardization and ex-ploitation: first year

Report on dissemination, standardization and exploitation: first year

Final integration status and Platform Assessment

reports the final status of the SCISSOR integration activities. Moreover, this deliverable reports the final stage of security and resilience platform assessment

Report on dissemination, standardization and ex-ploitation: second year

Report on dissemination, standardization and exploitation: second year

Revision of the advanced detection algorithms

provides the final description of the statistical and probabilistic algorithms

Final report on dissemination, standardization and exploitation
Revision of SCISSOR SIEM design and devel-opment

describes the progress regarding the design and development of the SIEM

SCISSOR SIEM design and development

This deliverable documents the status of the early design and prototype of the SCISSOR SIEM

Revision of use case scenarios and requirements analysis

This deliverable will revise the use cases and requirements defined in D2.1 taking into account feedbacks coming from activities of WP3, WP4, WP5 and WP6.

Revision of the SCISSOR architecture specifica-tion

This de-liverable will revise architectural specifications provided in D2.2 integrating it with feedbacks from the early vali-dation stage

Use case scenarios and requirements analysis

This deliverable will document the first stage of the identification of the application scenarios as well as the architectural requirements of SCISSOR project.

Integration Status and Platform Assessment

This deliverable reports of the system integration activities at month 20, the status of the SCADA platform integration at month 20 and the second resilience and security assessment of the SCISSOR framework

Control layer techniques: semantic modeling and data protection

First stage of the design and components prototyping of the semantic modeling and data protection techniques.

Monitoring layer components: design and proto-type

This deliverable will document the first stage of monitoring layer design and components prototyping

Final revision of control layer techniques: seman-tic modeling and data protection

Final design/implementation of semantic modeling and data protection

Revision of monitoring layer components: design and prototype

This deliverable will document the intermediate revision of monitoring layer design and components prototyping defined in D3.1

Revision of Decision and Analytics layer: Ad-vanced detection algorithms

updates the descriptions of the statistical and probabilistic algorithms

Cloud platform initial design and security as-sessment

This deliverable documents the early activities carried out in the WP6 regarding the design and deployment of the SCISSOR cloud platform. Moreover, T6.4 contributes to this deliverable by reporting the first resilience and security assessment of the SCISSOR framework

Control framework: final design and implementa-tion

This deliverable documents the final design and implementation of the control framework

Final SCISSOR cloud platform

This deliverable describes the final design and deployment of the SCISSOR cloud platform.

Validation and Demonstration initial report

Prelimi-nary trial plans, specification of validation methodologies and objectives, documentation of early stage validation activities.

Validation and Demonstration final report

This doc-uments describes the final status of the validation activities, for both the controlled and the uncontrolled environment

Validation and Demonstration intermediate report

This document updates D7.1.1 with the report of the first results on from the real world trial.

Publications

Agent-Based Multi-variant Crisis Handling Strategies for SCADA Systems

Author(s): Grzegorz Dobrowolski, Aleksander Byrski, Leszek Siwik
Published in: Multimedia Communications, Services and Security, 2015, Page(s) 61-71, ISBN 978-3-319-26404-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-26404-2_5

Multivariate Cluster-Based Discretization for Bayesian Network Structure Learning

Author(s): Ahmed Mabrouk, Christophe Gonzales, Karine Jabet-Chevalier, Eric Chojnaki
Published in: Scalable Uncertainty Management, 2015, Page(s) 155-169, ISBN 978-3-319-23540-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-23540-0_11

On the Doubly Sparse Compressed Sensing Problem

Author(s): Grigory Kabatiansky, Serge Vlǎduţ, Cedric Tavernier
Published in: Cryptography and Coding, 2015, Page(s) 184-189, ISBN 978-3-319-27239-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-27239-9_11

A systematic comparison of PCA-based Statistical Process Monitoring methods for high-dimensional, time-dependent Processes

Author(s): Tiago Rato, Marco Reis, Eric Schmitt, Mia Hubert, Bart De Ketelaere
Published in: AIChE Journal, Issue 62/5, 2016, Page(s) 1478-1493, ISSN 0001-1541
Publisher: American Institute of Chemical Engineers
DOI: 10.1002/aic.15062

StreaMon: a data-plane programming abstraction for Software-defined Stream Monitoring

Author(s): Marco Bonola, Giuseppe Bianchi, Giulio Picierro, Salvatore Pontarelli, Marco Monaci
Published in: IEEE Transactions on Dependable and Secure Computing, 2015, Page(s) 1-1, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/TDSC.2015.2499747

Sparse PCA for high-dimensional data with outliers

Author(s): Mia Hubert, Tom Reynkens, Eric Schmitt, Tim Verdonck
Published in: Technometrics, 2015, Page(s) 1-31, ISSN 0040-1706
Publisher: American Statistical Association
DOI: 10.1080/00401706.2015.1093962

Statistical process monitoring of time-dependent data

Author(s): Bart De Ketelaere, Tiago Rato, Eric Schmitt, Mia Hubert
Published in: Quality Engineering, Issue 28/1, 2016, Page(s) 127-142, ISSN 0898-2112
Publisher: Marcel Dekker Inc.
DOI: 10.1080/08982112.2015.1100474

RFID-based Multilevel Sensing Network for Industrial Internet of Things

Author(s): S. Amendola, C. Occhiuzzi, S. Manzari, G. Marrocco
Published in: IEEE Antennas and Propagation Magazine, 2017, Page(s) 1-24, ISSN 1045-9243
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1007/978-3-319-58190-3_1

Precision and Accuracy in UHF-RFID Power Measurements for Passive Sensing

Author(s): Cecilia Occhiuzzi, Gaetano Marrocco
Published in: IEEE Sensors Journal, Issue 16/9, 2016, Page(s) 3091-3098, ISSN 1530-437X
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/JSEN.2016.2526678

On conditional truncated densities Bayesian networks

Author(s): Santiago Cortijo, Christophe Gonzales
Published in: International Journal of Approximate Reasoning, Issue 92, 2018, Page(s) 155-174, ISSN 0888-613X
Publisher: Elsevier BV
DOI: 10.1016/j.ijar.2017.10.007

Detecting Deviating Data Cells

Author(s): Peter J. Rousseeuw, Wannes Van Den Bossche
Published in: Technometrics, 2017, Page(s) 1-11, ISSN 0040-1706
Publisher: American Statistical Association
DOI: 10.1080/00401706.2017.1340909

Parameter selection guidelines for adaptive PCA-based control charts

Author(s): Eric Schmitt, Tiago Rato, Bart De Ketelaere, Marco Reis, Mia Hubert
Published in: Journal of Chemometrics, Issue 30/4, 2016, Page(s) 163-176, ISSN 0886-9383
Publisher: John Wiley & Sons Ltd.
DOI: 10.1002/cem.2783

Overview of PCA-Based Statistical Process-Monitoring Methods for Time-Dependent, High-Dimensional Data

Author(s): Bart De Ketelaere, Mia Hubert, Eric Schmitt
Published in: Journal of Quality Technology, Issue 47/4, 2015, Page(s) 318-335, ISSN 0022-4065
Publisher: American Society of Quality
DOI: 10.1080/00224065.2015.11918137

Configurable radiofrequency identification sensing breadboard for industrial Internet of Things

Author(s): C. Occhiuzzi, S. Amendola, S. Manzari, S. Caizzone, G. Marrocco
Published in: Electronics Letters, Issue 53/3, 2017, Page(s) 129-130, ISSN 0013-5194
Publisher: Institute of Electrical Engineers
DOI: 10.1049/el.2016.3669

An Identity-Based Data Aggregation Protocol for the Smart Grid

Author(s): Zhiwei Wang
Published in: IEEE Transactions on Industrial Informatics, Issue 13/5, 2017, Page(s) 2428-2435, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TII.2017.2705218

Towards scalable and adaptable security monitoring

Author(s): Christof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva
Published in: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), 2017, Page(s) 1-6, ISBN 978-1-5090-6468-7
Publisher: IEEE
DOI: 10.1109/PCCC.2017.8280502

Optimized linear complementary codes implementation for hardware trojan prevention

Author(s): Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Tliibault Porteboeuf, Cedric Tavernier
Published in: 2015 European Conference on Circuit Theory and Design (ECCTD), 2015, Page(s) 1-4, ISBN 978-1-4799-9877-7
Publisher: IEEE
DOI: 10.1109/ECCTD.2015.7300075

Contour Extraction and Compression Scheme Utilizing Both the Transform and Spatial Image Domains

Author(s): Remigiusz Baran, Andrzej Dziech, Jakob Wassermann
Published in: 2017, Page(s) 1-15
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-69911-0_1

Facing lateral movements using widespread behavioral probes

Author(s): Alessandro Greco, Alberto Caponi, Giuseppe Bianchi
Published in: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016, Page(s) 159-160, ISBN 978-1-908320-73-5
Publisher: IEEE
DOI: 10.1109/ICITST.2016.7856688

D-STREAMON — NFV-Capable Distributed Framework for Network Monitoring

Author(s): Davide Palmisano, Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi
Published in: 2017 29th International Teletraffic Congress (ITC 29), 2017, Page(s) 30-35, ISBN 978-0-9883045-3-6
Publisher: IEEE
DOI: 10.23919/ITC.2017.8065707

D-StreaMon: From middlebox to distributed NFV framework for network monitoring

Author(s): Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Davide Palmisano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi
Published in: 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2017, Page(s) 1-2, ISBN 978-1-5386-0728-2
Publisher: IEEE
DOI: 10.1109/LANMAN.2017.7972149

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available