Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Security In trusted SCADA and smart-grids

Livrables

SCISSOR SIEM final design and development

pro-vides the final specification and prototype description for the SCISSOR SIEM

Revision of control framework: design and im-plementation

Intermediate revision of the design and components prototyping of the control framework defined in D4.1.1

SCISSOR architecture specification

This deliverable will document the first stage of architectural specifications in terms of system-as-a-whole platform.

Final revision of monitoring layer components: design and prototype

This deliverable will document the final monitoring layer design and components prototyping by revising D3.2

Revision of control layer techniques: semantic modeling and data protection

Intermediate revision of the design and components prototyping of the semantic mod-eling and data protection techniques

Revision of Human Machine Interface layer de-sign and implementation

This document provides the final specification and prototype description for the HMI layer

Decision and Analytics layer: Advanced detec-tion algorithms

describes the design and implementation of the statistical and probabilistic algorithms at month 12.

Control framework: design and implementation

This deliverable documents the first stage of the design and components prototyping of the control frame-work.

Human Machine Interface layer design and im-plementation

This document describes the early design/implementation of the HMI layer components

Report on dissemination, standardization and ex-ploitation: first year

Report on dissemination, standardization and exploitation: first year

Final integration status and Platform Assessment

reports the final status of the SCISSOR integration activities. Moreover, this deliverable reports the final stage of security and resilience platform assessment

Report on dissemination, standardization and ex-ploitation: second year

Report on dissemination, standardization and exploitation: second year

Revision of the advanced detection algorithms

provides the final description of the statistical and probabilistic algorithms

Final report on dissemination, standardization and exploitation
Revision of SCISSOR SIEM design and devel-opment

describes the progress regarding the design and development of the SIEM

SCISSOR SIEM design and development

This deliverable documents the status of the early design and prototype of the SCISSOR SIEM

Revision of use case scenarios and requirements analysis

This deliverable will revise the use cases and requirements defined in D2.1 taking into account feedbacks coming from activities of WP3, WP4, WP5 and WP6.

Revision of the SCISSOR architecture specifica-tion

This de-liverable will revise architectural specifications provided in D2.2 integrating it with feedbacks from the early vali-dation stage

Use case scenarios and requirements analysis

This deliverable will document the first stage of the identification of the application scenarios as well as the architectural requirements of SCISSOR project.

Integration Status and Platform Assessment

This deliverable reports of the system integration activities at month 20, the status of the SCADA platform integration at month 20 and the second resilience and security assessment of the SCISSOR framework

Control layer techniques: semantic modeling and data protection

First stage of the design and components prototyping of the semantic modeling and data protection techniques.

Monitoring layer components: design and proto-type

This deliverable will document the first stage of monitoring layer design and components prototyping

Final revision of control layer techniques: seman-tic modeling and data protection

Final design/implementation of semantic modeling and data protection

Revision of monitoring layer components: design and prototype

This deliverable will document the intermediate revision of monitoring layer design and components prototyping defined in D3.1

Revision of Decision and Analytics layer: Ad-vanced detection algorithms

updates the descriptions of the statistical and probabilistic algorithms

Cloud platform initial design and security as-sessment

This deliverable documents the early activities carried out in the WP6 regarding the design and deployment of the SCISSOR cloud platform. Moreover, T6.4 contributes to this deliverable by reporting the first resilience and security assessment of the SCISSOR framework

Control framework: final design and implementa-tion

This deliverable documents the final design and implementation of the control framework

Final SCISSOR cloud platform

This deliverable describes the final design and deployment of the SCISSOR cloud platform.

Validation and Demonstration initial report

Prelimi-nary trial plans, specification of validation methodologies and objectives, documentation of early stage validation activities.

Validation and Demonstration final report

This doc-uments describes the final status of the validation activities, for both the controlled and the uncontrolled environment

Validation and Demonstration intermediate report

This document updates D7.1.1 with the report of the first results on from the real world trial.

Publications

Agent-Based Multi-variant Crisis Handling Strategies for SCADA Systems

Auteurs: Grzegorz Dobrowolski, Aleksander Byrski, Leszek Siwik
Publié dans: Multimedia Communications, Services and Security, 2015, Page(s) 61-71, ISBN 978-3-319-26404-2
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-26404-2_5

Multivariate Cluster-Based Discretization for Bayesian Network Structure Learning

Auteurs: Ahmed Mabrouk, Christophe Gonzales, Karine Jabet-Chevalier, Eric Chojnaki
Publié dans: Scalable Uncertainty Management, 2015, Page(s) 155-169, ISBN 978-3-319-23540-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-23540-0_11

On the Doubly Sparse Compressed Sensing Problem

Auteurs: Grigory Kabatiansky, Serge Vlǎduţ, Cedric Tavernier
Publié dans: Cryptography and Coding, 2015, Page(s) 184-189, ISBN 978-3-319-27239-9
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-27239-9_11

A systematic comparison of PCA-based Statistical Process Monitoring methods for high-dimensional, time-dependent Processes

Auteurs: Tiago Rato, Marco Reis, Eric Schmitt, Mia Hubert, Bart De Ketelaere
Publié dans: AIChE Journal, Numéro 62/5, 2016, Page(s) 1478-1493, ISSN 0001-1541
Éditeur: American Institute of Chemical Engineers
DOI: 10.1002/aic.15062

StreaMon: a data-plane programming abstraction for Software-defined Stream Monitoring

Auteurs: Marco Bonola, Giuseppe Bianchi, Giulio Picierro, Salvatore Pontarelli, Marco Monaci
Publié dans: IEEE Transactions on Dependable and Secure Computing, 2015, Page(s) 1-1, ISSN 1545-5971
Éditeur: IEEE Computer Society
DOI: 10.1109/TDSC.2015.2499747

Sparse PCA for high-dimensional data with outliers

Auteurs: Mia Hubert, Tom Reynkens, Eric Schmitt, Tim Verdonck
Publié dans: Technometrics, 2015, Page(s) 1-31, ISSN 0040-1706
Éditeur: American Statistical Association
DOI: 10.1080/00401706.2015.1093962

Statistical process monitoring of time-dependent data

Auteurs: Bart De Ketelaere, Tiago Rato, Eric Schmitt, Mia Hubert
Publié dans: Quality Engineering, Numéro 28/1, 2016, Page(s) 127-142, ISSN 0898-2112
Éditeur: Marcel Dekker Inc.
DOI: 10.1080/08982112.2015.1100474

RFID-based Multilevel Sensing Network for Industrial Internet of Things

Auteurs: S. Amendola, C. Occhiuzzi, S. Manzari, G. Marrocco
Publié dans: IEEE Antennas and Propagation Magazine, 2017, Page(s) 1-24, ISSN 1045-9243
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1007/978-3-319-58190-3_1

Precision and Accuracy in UHF-RFID Power Measurements for Passive Sensing

Auteurs: Cecilia Occhiuzzi, Gaetano Marrocco
Publié dans: IEEE Sensors Journal, Numéro 16/9, 2016, Page(s) 3091-3098, ISSN 1530-437X
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/JSEN.2016.2526678

On conditional truncated densities Bayesian networks

Auteurs: Santiago Cortijo, Christophe Gonzales
Publié dans: International Journal of Approximate Reasoning, Numéro 92, 2018, Page(s) 155-174, ISSN 0888-613X
Éditeur: Elsevier BV
DOI: 10.1016/j.ijar.2017.10.007

Detecting Deviating Data Cells

Auteurs: Peter J. Rousseeuw, Wannes Van Den Bossche
Publié dans: Technometrics, 2017, Page(s) 1-11, ISSN 0040-1706
Éditeur: American Statistical Association
DOI: 10.1080/00401706.2017.1340909

Parameter selection guidelines for adaptive PCA-based control charts

Auteurs: Eric Schmitt, Tiago Rato, Bart De Ketelaere, Marco Reis, Mia Hubert
Publié dans: Journal of Chemometrics, Numéro 30/4, 2016, Page(s) 163-176, ISSN 0886-9383
Éditeur: John Wiley & Sons Ltd.
DOI: 10.1002/cem.2783

Overview of PCA-Based Statistical Process-Monitoring Methods for Time-Dependent, High-Dimensional Data

Auteurs: Bart De Ketelaere, Mia Hubert, Eric Schmitt
Publié dans: Journal of Quality Technology, Numéro 47/4, 2015, Page(s) 318-335, ISSN 0022-4065
Éditeur: American Society of Quality
DOI: 10.1080/00224065.2015.11918137

Configurable radiofrequency identification sensing breadboard for industrial Internet of Things

Auteurs: C. Occhiuzzi, S. Amendola, S. Manzari, S. Caizzone, G. Marrocco
Publié dans: Electronics Letters, Numéro 53/3, 2017, Page(s) 129-130, ISSN 0013-5194
Éditeur: Institute of Electrical Engineers
DOI: 10.1049/el.2016.3669

An Identity-Based Data Aggregation Protocol for the Smart Grid

Auteurs: Zhiwei Wang
Publié dans: IEEE Transactions on Industrial Informatics, Numéro 13/5, 2017, Page(s) 2428-2435, ISSN 1551-3203
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TII.2017.2705218

Towards scalable and adaptable security monitoring

Auteurs: Christof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva
Publié dans: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), 2017, Page(s) 1-6, ISBN 978-1-5090-6468-7
Éditeur: IEEE
DOI: 10.1109/PCCC.2017.8280502

Optimized linear complementary codes implementation for hardware trojan prevention

Auteurs: Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Tliibault Porteboeuf, Cedric Tavernier
Publié dans: 2015 European Conference on Circuit Theory and Design (ECCTD), 2015, Page(s) 1-4, ISBN 978-1-4799-9877-7
Éditeur: IEEE
DOI: 10.1109/ECCTD.2015.7300075

Contour Extraction and Compression Scheme Utilizing Both the Transform and Spatial Image Domains

Auteurs: Remigiusz Baran, Andrzej Dziech, Jakob Wassermann
Publié dans: 2017, Page(s) 1-15
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-69911-0_1

Facing lateral movements using widespread behavioral probes

Auteurs: Alessandro Greco, Alberto Caponi, Giuseppe Bianchi
Publié dans: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016, Page(s) 159-160, ISBN 978-1-908320-73-5
Éditeur: IEEE
DOI: 10.1109/ICITST.2016.7856688

D-STREAMON — NFV-Capable Distributed Framework for Network Monitoring

Auteurs: Davide Palmisano, Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi
Publié dans: 2017 29th International Teletraffic Congress (ITC 29), 2017, Page(s) 30-35, ISBN 978-0-9883045-3-6
Éditeur: IEEE
DOI: 10.23919/ITC.2017.8065707

D-StreaMon: From middlebox to distributed NFV framework for network monitoring

Auteurs: Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Davide Palmisano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi
Publié dans: 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2017, Page(s) 1-2, ISBN 978-1-5386-0728-2
Éditeur: IEEE
DOI: 10.1109/LANMAN.2017.7972149

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible