European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Collaborative and Confidential Information Sharing and Analysis for Cyber Protection

Risultati finali

Final exploitation and dissemination report and plan for the future.

This final deliverable will both report on all the activities performed by the WP and its achievements in the last period and will provide an updated plans for exploitation and dissemination. In particular the Exploitation Board will depict a strategy for sustainability during the last period of the project.

Requirements for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.1.

Requirements for C3ISP Architecture.

It provides the complete requirements list coming from the prosumers as well as from the specific platform aspects (outcomes of task 7.1).

Design and Architecture for the SME Pilot.

This deliverable reports on the outcomes of task 5.2.

Requirements for the CERT Pilot.

This deliverable reports on the outcomes of task 3.1.

Final Reference Architecture.

This deliverable describes the refined and final developed version of the C3ISP platform (final outcome of task 7.2).

Second exploitation and dissemination report.

This deliverable will report the progress on C3ISP’s on all the aspects of this WP.

Design and Architecture for the ISP Pilot.

This deliverable reports on the outcomes of task 2.2.

Components requirements.

This deliverable reports on the requirements for all the components developed in the tasks 8.1-8.6.

First exploitation and dissemination report.

This deliverable will report the initial progress on C3ISP’s on all the aspects of this WP.

First version of C3ISP Architecture.

Define the first version of the overall C3ISP platform architecture as part of task 7.2.

Requirements for the SME Pilot.

This deliverable reports on the outcomes of task 5.1.

Joint operations of the Pilots - 1

This deliverable reports on the monitoring of the initial joint pilots operations described in task 6.2.

First exploitation and dissemination plan.

This deliverable will contain a preliminary analysis of business models; it will also analyse the market and the value proposition of the project results; finally it will describe the initial foreseen options and scenarios for sustainability plans for the main project results. Individual exploitation plans, focusing on innovation aspects, will be provided by industrial partners while the research partners will contribute to report how to support third parties and industrial organization to adopt and exploit the C3ISP results. It will also contains a plan for standardization and communication.

Design and Architecture for the CERT Pilot.

This deliverable reports on the outcomes of task 3.2.

Design and Architecture for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.2.

Requirements for the ISP Pilot.

This deliverable reports on the outcomes of task 2.1

Requirements for the Pilots.

This deliverable reports on the outcomes of task 6.1.

First version of the C3ISP platform and test bed.

This deliverable describes the first developed version of the platform, as part of task 7.3. It will provide a first version as test bed for running the prosumers analytics.

First implementation, test and validations of the SME Pilot.

This deliverable reports on the first implementation (task 5.2), test and validation activities defined in task 5.3.

First implementation, test and validations of the CERT Pilot.

This deliverable reports on the first implementation (tasks 3.2 and 3.3), test and validation activities defined in task 3.3.

Components first maturation.

This deliverable reports on the first maturation cycle of all the components (developed in the tasks 8.1-8.6) ready to be integrated in the C3ISP platform.

First implementation, test and validations of the Enterprise Pilot.

This deliverable reports on the first implementation (task 4.2), test and validation activities defined in task 4.3.

First implementation, test and validations of the ISP Pilot.

This deliverable reports on the first implementation (tasks 2.2 and 2.3), test and validation activities defined in task 2.3.

Pubblicazioni

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV

Autori: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Pubblicato in: Security and Trust Management, Numero pp.118-133, 2018, Pagina/e 118-133
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-68063-7_8

Introducing Usage Control in MQTT for IoT

Autori: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Pubblicato in: 2017
Editore: ....

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification

Autori: Mina Sheikhalishahi, Fabio Martinelli
Pubblicato in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Pagina/e 244-249, ISBN 978-1-5386-1759-5
Editore: IEEE
DOI: 10.1109/WETICE.2017.15

Implementing Usage Control in Internet of Things: A Smart Home Use Case

Autori: Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Pubblicato in: 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, Pagina/e 1056-1063, ISBN 978-1-5090-4906-6
Editore: IEEE
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.352

Identifying Mobile Repackaged Applications through Formal Methods

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Pubblicato in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 673-682, ISBN 978-989-758-209-7
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006287906730682

Game Bot Detection in Online Role Player Game through Behavioural Features

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Proceedings of the 12th International Conference on Software Technologies, 2017, Pagina/e 50-60, ISBN 978-989-758-262-2
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006417000500060

Privacy-Utility Feature Selection as a tool in Private Data Classification

Autori: Mina Sheikhalishahi, Fabio Martinelli
Pubblicato in: Advances in Intelligent Systems and Computing book series, Numero AISC, volume 620, 2017
Editore: Springer International

Privacy preserving clustering over horizontal and vertical partitioned data

Autori: Mina Sheikhalishahi, Fabio Martinelli
Pubblicato in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Pagina/e 1237-1244, ISBN 978-1-5386-1629-1
Editore: IEEE
DOI: 10.1109/ISCC.2017.8024694

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment

Autori: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Numero 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 487-492, ISBN 978-989-758-209-7
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006217304870492

Car hacking identification through fuzzy logic algorithms

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Pagina/e 1-7, ISBN 978-1-5090-6034-4
Editore: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015464

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

Autori: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Pagina/e 263-268, ISBN 978-1-5386-1759-5
Editore: IEEE
DOI: 10.1109/WETICE.2017.23

A time series classification approach to game bot detection

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Pagina/e 1-11, ISBN 9781-450352253
Editore: ACM Press
DOI: 10.1145/3102254.3102263

A fuzzy-based process mining approach for dynamic malware detection

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Pagina/e 1-8, ISBN 978-1-5090-6034-4
Editore: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015490

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware

Autori: Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Pubblicato in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Pagina/e 899-901, ISBN 9781-450349444
Editore: ACM Press
DOI: 10.1145/3052973.3055156

Analysis of Data Sharing Agreements

Autori: Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi
Pubblicato in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 167-178, ISBN 978-989-758-209-7
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006207501670178

Concurrent History-based Usage Control Policies

Autori: Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Pubblicato in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Pagina/e 657-666, ISBN 978-989-758-210-3
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006232506570666

A Collaborative Tool for Modelling Multi-stage Attacks

Autori: Ian Herwono, Fadi Ali El-Moussa
Pubblicato in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 312-317
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006137103120317

Automated Detection of the Early Stages of Cyber Kill Chain

Autori: Ian Herwono, Fadi Ali El-Moussa
Pubblicato in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 182-189, ISBN 978-989-758-282-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006543301820189

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

Autori: Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton
Pubblicato in: 2018 IEEE Conference on Communications and Network Security (CNS), 2018, Pagina/e 1-7, ISBN 978-1-5386-4586-4
Editore: IEEE
DOI: 10.1109/cns.2018.8433212

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud

Autori: Wenjun Fan, Joanna Ziembicka, Rogerio de Lemos, David Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono
Pubblicato in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Pagina/e 74-80, ISBN 978-1-7281-1661-7
Editore: IEEE
DOI: 10.1109/cscloud/edgecom.2019.00-15

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile