Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Collaborative and Confidential Information Sharing and Analysis for Cyber Protection

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Final exploitation and dissemination report and plan for the future. (öffnet in neuem Fenster)

This final deliverable will both report on all the activities performed by the WP and its achievements in the last period and will provide an updated plans for exploitation and dissemination. In particular the Exploitation Board will depict a strategy for sustainability during the last period of the project.

Requirements for the Enterprise Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 4.1.

Requirements for C3ISP Architecture. (öffnet in neuem Fenster)

It provides the complete requirements list coming from the prosumers as well as from the specific platform aspects (outcomes of task 7.1).

Design and Architecture for the SME Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 5.2.

Requirements for the CERT Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 3.1.

Final Reference Architecture. (öffnet in neuem Fenster)

This deliverable describes the refined and final developed version of the C3ISP platform (final outcome of task 7.2).

Second exploitation and dissemination report. (öffnet in neuem Fenster)

This deliverable will report the progress on C3ISP’s on all the aspects of this WP.

Design and Architecture for the ISP Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 2.2.

Components requirements. (öffnet in neuem Fenster)

This deliverable reports on the requirements for all the components developed in the tasks 8.1-8.6.

First exploitation and dissemination report. (öffnet in neuem Fenster)

This deliverable will report the initial progress on C3ISP’s on all the aspects of this WP.

First version of C3ISP Architecture. (öffnet in neuem Fenster)

Define the first version of the overall C3ISP platform architecture as part of task 7.2.

Requirements for the SME Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 5.1.

Joint operations of the Pilots - 1 (öffnet in neuem Fenster)

This deliverable reports on the monitoring of the initial joint pilots operations described in task 6.2.

First exploitation and dissemination plan. (öffnet in neuem Fenster)

This deliverable will contain a preliminary analysis of business models; it will also analyse the market and the value proposition of the project results; finally it will describe the initial foreseen options and scenarios for sustainability plans for the main project results. Individual exploitation plans, focusing on innovation aspects, will be provided by industrial partners while the research partners will contribute to report how to support third parties and industrial organization to adopt and exploit the C3ISP results. It will also contains a plan for standardization and communication.

Design and Architecture for the CERT Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 3.2.

Design and Architecture for the Enterprise Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 4.2.

Requirements for the ISP Pilot. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 2.1

Requirements for the Pilots. (öffnet in neuem Fenster)

This deliverable reports on the outcomes of task 6.1.

First version of the C3ISP platform and test bed. (öffnet in neuem Fenster)

This deliverable describes the first developed version of the platform, as part of task 7.3. It will provide a first version as test bed for running the prosumers analytics.

First implementation, test and validations of the SME Pilot. (öffnet in neuem Fenster)

This deliverable reports on the first implementation (task 5.2), test and validation activities defined in task 5.3.

First implementation, test and validations of the CERT Pilot. (öffnet in neuem Fenster)

This deliverable reports on the first implementation (tasks 3.2 and 3.3), test and validation activities defined in task 3.3.

Components first maturation. (öffnet in neuem Fenster)

This deliverable reports on the first maturation cycle of all the components (developed in the tasks 8.1-8.6) ready to be integrated in the C3ISP platform.

First implementation, test and validations of the Enterprise Pilot. (öffnet in neuem Fenster)

This deliverable reports on the first implementation (task 4.2), test and validation activities defined in task 4.3.

First implementation, test and validations of the ISP Pilot. (öffnet in neuem Fenster)

This deliverable reports on the first implementation (tasks 2.2 and 2.3), test and validation activities defined in task 2.3.

Veröffentlichungen

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV (öffnet in neuem Fenster)

Autoren: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Veröffentlicht in: Security and Trust Management, Ausgabe pp.118-133, 2018, Seite(n) 118-133
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-68063-7_8

Introducing Usage Control in MQTT for IoT

Autoren: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Veröffentlicht in: 2017
Herausgeber: ....

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification (öffnet in neuem Fenster)

Autoren: Mina Sheikhalishahi, Fabio Martinelli
Veröffentlicht in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Seite(n) 244-249, ISBN 978-1-5386-1759-5
Herausgeber: IEEE
DOI: 10.1109/WETICE.2017.15

Implementing Usage Control in Internet of Things: A Smart Home Use Case (öffnet in neuem Fenster)

Autoren: Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Veröffentlicht in: 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, Seite(n) 1056-1063, ISBN 978-1-5090-4906-6
Herausgeber: IEEE
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.352

Identifying Mobile Repackaged Applications through Formal Methods (öffnet in neuem Fenster)

Autoren: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 673-682, ISBN 978-989-758-209-7
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006287906730682

Game Bot Detection in Online Role Player Game through Behavioural Features (öffnet in neuem Fenster)

Autoren: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: Proceedings of the 12th International Conference on Software Technologies, 2017, Seite(n) 50-60, ISBN 978-989-758-262-2
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006417000500060

Privacy-Utility Feature Selection as a tool in Private Data Classification

Autoren: Mina Sheikhalishahi, Fabio Martinelli
Veröffentlicht in: Advances in Intelligent Systems and Computing book series, Ausgabe AISC, volume 620, 2017
Herausgeber: Springer International

Privacy preserving clustering over horizontal and vertical partitioned data (öffnet in neuem Fenster)

Autoren: Mina Sheikhalishahi, Fabio Martinelli
Veröffentlicht in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Seite(n) 1237-1244, ISBN 978-1-5386-1629-1
Herausgeber: IEEE
DOI: 10.1109/ISCC.2017.8024694

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment (öffnet in neuem Fenster)

Autoren: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Ausgabe 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 487-492, ISBN 978-989-758-209-7
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006217304870492

Car hacking identification through fuzzy logic algorithms (öffnet in neuem Fenster)

Autoren: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Veröffentlicht in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Seite(n) 1-7, ISBN 978-1-5090-6034-4
Herausgeber: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015464

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique (öffnet in neuem Fenster)

Autoren: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Veröffentlicht in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Seite(n) 263-268, ISBN 978-1-5386-1759-5
Herausgeber: IEEE
DOI: 10.1109/WETICE.2017.23

A time series classification approach to game bot detection (öffnet in neuem Fenster)

Autoren: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Seite(n) 1-11, ISBN 9781-450352253
Herausgeber: ACM Press
DOI: 10.1145/3102254.3102263

A fuzzy-based process mining approach for dynamic malware detection (öffnet in neuem Fenster)

Autoren: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Seite(n) 1-8, ISBN 978-1-5090-6034-4
Herausgeber: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015490

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware (öffnet in neuem Fenster)

Autoren: Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Veröffentlicht in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Seite(n) 899-901, ISBN 9781-450349444
Herausgeber: ACM Press
DOI: 10.1145/3052973.3055156

Analysis of Data Sharing Agreements (öffnet in neuem Fenster)

Autoren: Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 167-178, ISBN 978-989-758-209-7
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006207501670178

Concurrent History-based Usage Control Policies (öffnet in neuem Fenster)

Autoren: Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Veröffentlicht in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Seite(n) 657-666, ISBN 978-989-758-210-3
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006232506570666

A Collaborative Tool for Modelling Multi-stage Attacks (öffnet in neuem Fenster)

Autoren: Ian Herwono, Fadi Ali El-Moussa
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 312-317
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006137103120317

Automated Detection of the Early Stages of Cyber Kill Chain (öffnet in neuem Fenster)

Autoren: Ian Herwono, Fadi Ali El-Moussa
Veröffentlicht in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Seite(n) 182-189, ISBN 978-989-758-282-0
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006543301820189

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services (öffnet in neuem Fenster)

Autoren: Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton
Veröffentlicht in: 2018 IEEE Conference on Communications and Network Security (CNS), 2018, Seite(n) 1-7, ISBN 978-1-5386-4586-4
Herausgeber: IEEE
DOI: 10.1109/cns.2018.8433212

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud (öffnet in neuem Fenster)

Autoren: Wenjun Fan, Joanna Ziembicka, Rogerio de Lemos, David Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono
Veröffentlicht in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Seite(n) 74-80, ISBN 978-1-7281-1661-7
Herausgeber: IEEE
DOI: 10.1109/cscloud/edgecom.2019.00-15

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0