CORDIS - Forschungsergebnisse der EU
CORDIS

Collaborative and Confidential Information Sharing and Analysis for Cyber Protection

Leistungen

Final exploitation and dissemination report and plan for the future.

This final deliverable will both report on all the activities performed by the WP and its achievements in the last period and will provide an updated plans for exploitation and dissemination. In particular the Exploitation Board will depict a strategy for sustainability during the last period of the project.

Requirements for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.1.

Requirements for C3ISP Architecture.

It provides the complete requirements list coming from the prosumers as well as from the specific platform aspects (outcomes of task 7.1).

Design and Architecture for the SME Pilot.

This deliverable reports on the outcomes of task 5.2.

Requirements for the CERT Pilot.

This deliverable reports on the outcomes of task 3.1.

Final Reference Architecture.

This deliverable describes the refined and final developed version of the C3ISP platform (final outcome of task 7.2).

Second exploitation and dissemination report.

This deliverable will report the progress on C3ISP’s on all the aspects of this WP.

Design and Architecture for the ISP Pilot.

This deliverable reports on the outcomes of task 2.2.

Components requirements.

This deliverable reports on the requirements for all the components developed in the tasks 8.1-8.6.

First exploitation and dissemination report.

This deliverable will report the initial progress on C3ISP’s on all the aspects of this WP.

First version of C3ISP Architecture.

Define the first version of the overall C3ISP platform architecture as part of task 7.2.

Requirements for the SME Pilot.

This deliverable reports on the outcomes of task 5.1.

Joint operations of the Pilots - 1

This deliverable reports on the monitoring of the initial joint pilots operations described in task 6.2.

First exploitation and dissemination plan.

This deliverable will contain a preliminary analysis of business models; it will also analyse the market and the value proposition of the project results; finally it will describe the initial foreseen options and scenarios for sustainability plans for the main project results. Individual exploitation plans, focusing on innovation aspects, will be provided by industrial partners while the research partners will contribute to report how to support third parties and industrial organization to adopt and exploit the C3ISP results. It will also contains a plan for standardization and communication.

Design and Architecture for the CERT Pilot.

This deliverable reports on the outcomes of task 3.2.

Design and Architecture for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.2.

Requirements for the ISP Pilot.

This deliverable reports on the outcomes of task 2.1

Requirements for the Pilots.

This deliverable reports on the outcomes of task 6.1.

First version of the C3ISP platform and test bed.

This deliverable describes the first developed version of the platform, as part of task 7.3. It will provide a first version as test bed for running the prosumers analytics.

First implementation, test and validations of the SME Pilot.

This deliverable reports on the first implementation (task 5.2), test and validation activities defined in task 5.3.

First implementation, test and validations of the CERT Pilot.

This deliverable reports on the first implementation (tasks 3.2 and 3.3), test and validation activities defined in task 3.3.

Components first maturation.

This deliverable reports on the first maturation cycle of all the components (developed in the tasks 8.1-8.6) ready to be integrated in the C3ISP platform.

First implementation, test and validations of the Enterprise Pilot.

This deliverable reports on the first implementation (task 4.2), test and validation activities defined in task 4.3.

First implementation, test and validations of the ISP Pilot.

This deliverable reports on the first implementation (tasks 2.2 and 2.3), test and validation activities defined in task 2.3.

Veröffentlichungen

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV

Autoren: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Veröffentlicht in: Security and Trust Management, Ausgabe pp.118-133, 2018, Seite(n) 118-133
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-68063-7_8

Introducing Usage Control in MQTT for IoT

Autoren: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Veröffentlicht in: 2017
Herausgeber: ....

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification

Autoren: Mina Sheikhalishahi, Fabio Martinelli
Veröffentlicht in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Seite(n) 244-249, ISBN 978-1-5386-1759-5
Herausgeber: IEEE
DOI: 10.1109/WETICE.2017.15

Implementing Usage Control in Internet of Things: A Smart Home Use Case

Autoren: Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Veröffentlicht in: 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, Seite(n) 1056-1063, ISBN 978-1-5090-4906-6
Herausgeber: IEEE
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.352

Identifying Mobile Repackaged Applications through Formal Methods

Autoren: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 673-682, ISBN 978-989-758-209-7
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006287906730682

Game Bot Detection in Online Role Player Game through Behavioural Features

Autoren: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: Proceedings of the 12th International Conference on Software Technologies, 2017, Seite(n) 50-60, ISBN 978-989-758-262-2
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006417000500060

Privacy-Utility Feature Selection as a tool in Private Data Classification

Autoren: Mina Sheikhalishahi, Fabio Martinelli
Veröffentlicht in: Advances in Intelligent Systems and Computing book series, Ausgabe AISC, volume 620, 2017
Herausgeber: Springer International

Privacy preserving clustering over horizontal and vertical partitioned data

Autoren: Mina Sheikhalishahi, Fabio Martinelli
Veröffentlicht in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Seite(n) 1237-1244, ISBN 978-1-5386-1629-1
Herausgeber: IEEE
DOI: 10.1109/ISCC.2017.8024694

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment

Autoren: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Ausgabe 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 487-492, ISBN 978-989-758-209-7
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006217304870492

Car hacking identification through fuzzy logic algorithms

Autoren: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Veröffentlicht in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Seite(n) 1-7, ISBN 978-1-5090-6034-4
Herausgeber: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015464

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

Autoren: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Veröffentlicht in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Seite(n) 263-268, ISBN 978-1-5386-1759-5
Herausgeber: IEEE
DOI: 10.1109/WETICE.2017.23

A time series classification approach to game bot detection

Autoren: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Seite(n) 1-11, ISBN 9781-450352253
Herausgeber: ACM Press
DOI: 10.1145/3102254.3102263

A fuzzy-based process mining approach for dynamic malware detection

Autoren: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Veröffentlicht in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Seite(n) 1-8, ISBN 978-1-5090-6034-4
Herausgeber: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015490

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware

Autoren: Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Veröffentlicht in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Seite(n) 899-901, ISBN 9781-450349444
Herausgeber: ACM Press
DOI: 10.1145/3052973.3055156

Analysis of Data Sharing Agreements

Autoren: Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 167-178, ISBN 978-989-758-209-7
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006207501670178

Concurrent History-based Usage Control Policies

Autoren: Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Veröffentlicht in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Seite(n) 657-666, ISBN 978-989-758-210-3
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006232506570666

A Collaborative Tool for Modelling Multi-stage Attacks

Autoren: Ian Herwono, Fadi Ali El-Moussa
Veröffentlicht in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Seite(n) 312-317
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006137103120317

Automated Detection of the Early Stages of Cyber Kill Chain

Autoren: Ian Herwono, Fadi Ali El-Moussa
Veröffentlicht in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Seite(n) 182-189, ISBN 978-989-758-282-0
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006543301820189

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

Autoren: Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton
Veröffentlicht in: 2018 IEEE Conference on Communications and Network Security (CNS), 2018, Seite(n) 1-7, ISBN 978-1-5386-4586-4
Herausgeber: IEEE
DOI: 10.1109/cns.2018.8433212

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud

Autoren: Wenjun Fan, Joanna Ziembicka, Rogerio de Lemos, David Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono
Veröffentlicht in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Seite(n) 74-80, ISBN 978-1-7281-1661-7
Herausgeber: IEEE
DOI: 10.1109/cscloud/edgecom.2019.00-15

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor