Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Security In trusted SCADA and smart-grids

Risultati finali

SCISSOR SIEM final design and development

pro-vides the final specification and prototype description for the SCISSOR SIEM

Revision of control framework: design and im-plementation

Intermediate revision of the design and components prototyping of the control framework defined in D4.1.1

SCISSOR architecture specification

This deliverable will document the first stage of architectural specifications in terms of system-as-a-whole platform.

Final revision of monitoring layer components: design and prototype

This deliverable will document the final monitoring layer design and components prototyping by revising D3.2

Revision of control layer techniques: semantic modeling and data protection

Intermediate revision of the design and components prototyping of the semantic mod-eling and data protection techniques

Revision of Human Machine Interface layer de-sign and implementation

This document provides the final specification and prototype description for the HMI layer

Decision and Analytics layer: Advanced detec-tion algorithms

describes the design and implementation of the statistical and probabilistic algorithms at month 12.

Control framework: design and implementation

This deliverable documents the first stage of the design and components prototyping of the control frame-work.

Human Machine Interface layer design and im-plementation

This document describes the early design/implementation of the HMI layer components

Report on dissemination, standardization and ex-ploitation: first year

Report on dissemination, standardization and exploitation: first year

Final integration status and Platform Assessment

reports the final status of the SCISSOR integration activities. Moreover, this deliverable reports the final stage of security and resilience platform assessment

Report on dissemination, standardization and ex-ploitation: second year

Report on dissemination, standardization and exploitation: second year

Revision of the advanced detection algorithms

provides the final description of the statistical and probabilistic algorithms

Final report on dissemination, standardization and exploitation
Revision of SCISSOR SIEM design and devel-opment

describes the progress regarding the design and development of the SIEM

SCISSOR SIEM design and development

This deliverable documents the status of the early design and prototype of the SCISSOR SIEM

Revision of use case scenarios and requirements analysis

This deliverable will revise the use cases and requirements defined in D2.1 taking into account feedbacks coming from activities of WP3, WP4, WP5 and WP6.

Revision of the SCISSOR architecture specifica-tion

This de-liverable will revise architectural specifications provided in D2.2 integrating it with feedbacks from the early vali-dation stage

Use case scenarios and requirements analysis

This deliverable will document the first stage of the identification of the application scenarios as well as the architectural requirements of SCISSOR project.

Integration Status and Platform Assessment

This deliverable reports of the system integration activities at month 20, the status of the SCADA platform integration at month 20 and the second resilience and security assessment of the SCISSOR framework

Control layer techniques: semantic modeling and data protection

First stage of the design and components prototyping of the semantic modeling and data protection techniques.

Monitoring layer components: design and proto-type

This deliverable will document the first stage of monitoring layer design and components prototyping

Final revision of control layer techniques: seman-tic modeling and data protection

Final design/implementation of semantic modeling and data protection

Revision of monitoring layer components: design and prototype

This deliverable will document the intermediate revision of monitoring layer design and components prototyping defined in D3.1

Revision of Decision and Analytics layer: Ad-vanced detection algorithms

updates the descriptions of the statistical and probabilistic algorithms

Cloud platform initial design and security as-sessment

This deliverable documents the early activities carried out in the WP6 regarding the design and deployment of the SCISSOR cloud platform. Moreover, T6.4 contributes to this deliverable by reporting the first resilience and security assessment of the SCISSOR framework

Control framework: final design and implementa-tion

This deliverable documents the final design and implementation of the control framework

Final SCISSOR cloud platform

This deliverable describes the final design and deployment of the SCISSOR cloud platform.

Validation and Demonstration initial report

Prelimi-nary trial plans, specification of validation methodologies and objectives, documentation of early stage validation activities.

Validation and Demonstration final report

This doc-uments describes the final status of the validation activities, for both the controlled and the uncontrolled environment

Validation and Demonstration intermediate report

This document updates D7.1.1 with the report of the first results on from the real world trial.

Pubblicazioni

Agent-Based Multi-variant Crisis Handling Strategies for SCADA Systems

Autori: Grzegorz Dobrowolski, Aleksander Byrski, Leszek Siwik
Pubblicato in: Multimedia Communications, Services and Security, 2015, Pagina/e 61-71, ISBN 978-3-319-26404-2
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-26404-2_5

Multivariate Cluster-Based Discretization for Bayesian Network Structure Learning

Autori: Ahmed Mabrouk, Christophe Gonzales, Karine Jabet-Chevalier, Eric Chojnaki
Pubblicato in: Scalable Uncertainty Management, 2015, Pagina/e 155-169, ISBN 978-3-319-23540-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-23540-0_11

On the Doubly Sparse Compressed Sensing Problem

Autori: Grigory Kabatiansky, Serge Vlǎduţ, Cedric Tavernier
Pubblicato in: Cryptography and Coding, 2015, Pagina/e 184-189, ISBN 978-3-319-27239-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-27239-9_11

A systematic comparison of PCA-based Statistical Process Monitoring methods for high-dimensional, time-dependent Processes

Autori: Tiago Rato, Marco Reis, Eric Schmitt, Mia Hubert, Bart De Ketelaere
Pubblicato in: AIChE Journal, Numero 62/5, 2016, Pagina/e 1478-1493, ISSN 0001-1541
Editore: American Institute of Chemical Engineers
DOI: 10.1002/aic.15062

StreaMon: a data-plane programming abstraction for Software-defined Stream Monitoring

Autori: Marco Bonola, Giuseppe Bianchi, Giulio Picierro, Salvatore Pontarelli, Marco Monaci
Pubblicato in: IEEE Transactions on Dependable and Secure Computing, 2015, Pagina/e 1-1, ISSN 1545-5971
Editore: IEEE Computer Society
DOI: 10.1109/TDSC.2015.2499747

Sparse PCA for high-dimensional data with outliers

Autori: Mia Hubert, Tom Reynkens, Eric Schmitt, Tim Verdonck
Pubblicato in: Technometrics, 2015, Pagina/e 1-31, ISSN 0040-1706
Editore: American Statistical Association
DOI: 10.1080/00401706.2015.1093962

Statistical process monitoring of time-dependent data

Autori: Bart De Ketelaere, Tiago Rato, Eric Schmitt, Mia Hubert
Pubblicato in: Quality Engineering, Numero 28/1, 2016, Pagina/e 127-142, ISSN 0898-2112
Editore: Marcel Dekker Inc.
DOI: 10.1080/08982112.2015.1100474

RFID-based Multilevel Sensing Network for Industrial Internet of Things

Autori: S. Amendola, C. Occhiuzzi, S. Manzari, G. Marrocco
Pubblicato in: IEEE Antennas and Propagation Magazine, 2017, Pagina/e 1-24, ISSN 1045-9243
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1007/978-3-319-58190-3_1

Precision and Accuracy in UHF-RFID Power Measurements for Passive Sensing

Autori: Cecilia Occhiuzzi, Gaetano Marrocco
Pubblicato in: IEEE Sensors Journal, Numero 16/9, 2016, Pagina/e 3091-3098, ISSN 1530-437X
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/JSEN.2016.2526678

On conditional truncated densities Bayesian networks

Autori: Santiago Cortijo, Christophe Gonzales
Pubblicato in: International Journal of Approximate Reasoning, Numero 92, 2018, Pagina/e 155-174, ISSN 0888-613X
Editore: Elsevier BV
DOI: 10.1016/j.ijar.2017.10.007

Detecting Deviating Data Cells

Autori: Peter J. Rousseeuw, Wannes Van Den Bossche
Pubblicato in: Technometrics, 2017, Pagina/e 1-11, ISSN 0040-1706
Editore: American Statistical Association
DOI: 10.1080/00401706.2017.1340909

Parameter selection guidelines for adaptive PCA-based control charts

Autori: Eric Schmitt, Tiago Rato, Bart De Ketelaere, Marco Reis, Mia Hubert
Pubblicato in: Journal of Chemometrics, Numero 30/4, 2016, Pagina/e 163-176, ISSN 0886-9383
Editore: John Wiley & Sons Ltd.
DOI: 10.1002/cem.2783

Overview of PCA-Based Statistical Process-Monitoring Methods for Time-Dependent, High-Dimensional Data

Autori: Bart De Ketelaere, Mia Hubert, Eric Schmitt
Pubblicato in: Journal of Quality Technology, Numero 47/4, 2015, Pagina/e 318-335, ISSN 0022-4065
Editore: American Society of Quality
DOI: 10.1080/00224065.2015.11918137

Configurable radiofrequency identification sensing breadboard for industrial Internet of Things

Autori: C. Occhiuzzi, S. Amendola, S. Manzari, S. Caizzone, G. Marrocco
Pubblicato in: Electronics Letters, Numero 53/3, 2017, Pagina/e 129-130, ISSN 0013-5194
Editore: Institute of Electrical Engineers
DOI: 10.1049/el.2016.3669

An Identity-Based Data Aggregation Protocol for the Smart Grid

Autori: Zhiwei Wang
Pubblicato in: IEEE Transactions on Industrial Informatics, Numero 13/5, 2017, Pagina/e 2428-2435, ISSN 1551-3203
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TII.2017.2705218

Towards scalable and adaptable security monitoring

Autori: Christof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva
Pubblicato in: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), 2017, Pagina/e 1-6, ISBN 978-1-5090-6468-7
Editore: IEEE
DOI: 10.1109/PCCC.2017.8280502

Optimized linear complementary codes implementation for hardware trojan prevention

Autori: Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Tliibault Porteboeuf, Cedric Tavernier
Pubblicato in: 2015 European Conference on Circuit Theory and Design (ECCTD), 2015, Pagina/e 1-4, ISBN 978-1-4799-9877-7
Editore: IEEE
DOI: 10.1109/ECCTD.2015.7300075

Contour Extraction and Compression Scheme Utilizing Both the Transform and Spatial Image Domains

Autori: Remigiusz Baran, Andrzej Dziech, Jakob Wassermann
Pubblicato in: 2017, Pagina/e 1-15
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-69911-0_1

Facing lateral movements using widespread behavioral probes

Autori: Alessandro Greco, Alberto Caponi, Giuseppe Bianchi
Pubblicato in: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016, Pagina/e 159-160, ISBN 978-1-908320-73-5
Editore: IEEE
DOI: 10.1109/ICITST.2016.7856688

D-STREAMON — NFV-Capable Distributed Framework for Network Monitoring

Autori: Davide Palmisano, Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi
Pubblicato in: 2017 29th International Teletraffic Congress (ITC 29), 2017, Pagina/e 30-35, ISBN 978-0-9883045-3-6
Editore: IEEE
DOI: 10.23919/ITC.2017.8065707

D-StreaMon: From middlebox to distributed NFV framework for network monitoring

Autori: Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Davide Palmisano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi
Pubblicato in: 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2017, Pagina/e 1-2, ISBN 978-1-5386-0728-2
Editore: IEEE
DOI: 10.1109/LANMAN.2017.7972149

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile