European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Collaborative and Confidential Information Sharing and Analysis for Cyber Protection

Rezultaty

Final exploitation and dissemination report and plan for the future.

This final deliverable will both report on all the activities performed by the WP and its achievements in the last period and will provide an updated plans for exploitation and dissemination. In particular the Exploitation Board will depict a strategy for sustainability during the last period of the project.

Requirements for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.1.

Requirements for C3ISP Architecture.

It provides the complete requirements list coming from the prosumers as well as from the specific platform aspects (outcomes of task 7.1).

Design and Architecture for the SME Pilot.

This deliverable reports on the outcomes of task 5.2.

Requirements for the CERT Pilot.

This deliverable reports on the outcomes of task 3.1.

Final Reference Architecture.

This deliverable describes the refined and final developed version of the C3ISP platform (final outcome of task 7.2).

Second exploitation and dissemination report.

This deliverable will report the progress on C3ISP’s on all the aspects of this WP.

Design and Architecture for the ISP Pilot.

This deliverable reports on the outcomes of task 2.2.

Components requirements.

This deliverable reports on the requirements for all the components developed in the tasks 8.1-8.6.

First exploitation and dissemination report.

This deliverable will report the initial progress on C3ISP’s on all the aspects of this WP.

First version of C3ISP Architecture.

Define the first version of the overall C3ISP platform architecture as part of task 7.2.

Requirements for the SME Pilot.

This deliverable reports on the outcomes of task 5.1.

Joint operations of the Pilots - 1

This deliverable reports on the monitoring of the initial joint pilots operations described in task 6.2.

First exploitation and dissemination plan.

This deliverable will contain a preliminary analysis of business models; it will also analyse the market and the value proposition of the project results; finally it will describe the initial foreseen options and scenarios for sustainability plans for the main project results. Individual exploitation plans, focusing on innovation aspects, will be provided by industrial partners while the research partners will contribute to report how to support third parties and industrial organization to adopt and exploit the C3ISP results. It will also contains a plan for standardization and communication.

Design and Architecture for the CERT Pilot.

This deliverable reports on the outcomes of task 3.2.

Design and Architecture for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.2.

Requirements for the ISP Pilot.

This deliverable reports on the outcomes of task 2.1

Requirements for the Pilots.

This deliverable reports on the outcomes of task 6.1.

First version of the C3ISP platform and test bed.

This deliverable describes the first developed version of the platform, as part of task 7.3. It will provide a first version as test bed for running the prosumers analytics.

First implementation, test and validations of the SME Pilot.

This deliverable reports on the first implementation (task 5.2), test and validation activities defined in task 5.3.

First implementation, test and validations of the CERT Pilot.

This deliverable reports on the first implementation (tasks 3.2 and 3.3), test and validation activities defined in task 3.3.

Components first maturation.

This deliverable reports on the first maturation cycle of all the components (developed in the tasks 8.1-8.6) ready to be integrated in the C3ISP platform.

First implementation, test and validations of the Enterprise Pilot.

This deliverable reports on the first implementation (task 4.2), test and validation activities defined in task 4.3.

First implementation, test and validations of the ISP Pilot.

This deliverable reports on the first implementation (tasks 2.2 and 2.3), test and validation activities defined in task 2.3.

Publikacje

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV

Autorzy: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Opublikowane w: Security and Trust Management, Numer pp.118-133, 2018, Strona(/y) 118-133
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-68063-7_8

Introducing Usage Control in MQTT for IoT

Autorzy: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Opublikowane w: 2017
Wydawca: ....

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification

Autorzy: Mina Sheikhalishahi, Fabio Martinelli
Opublikowane w: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Strona(/y) 244-249, ISBN 978-1-5386-1759-5
Wydawca: IEEE
DOI: 10.1109/WETICE.2017.15

Implementing Usage Control in Internet of Things: A Smart Home Use Case

Autorzy: Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Opublikowane w: 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, Strona(/y) 1056-1063, ISBN 978-1-5090-4906-6
Wydawca: IEEE
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.352

Identifying Mobile Repackaged Applications through Formal Methods

Autorzy: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Opublikowane w: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Strona(/y) 673-682, ISBN 978-989-758-209-7
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006287906730682

Game Bot Detection in Online Role Player Game through Behavioural Features

Autorzy: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Opublikowane w: Proceedings of the 12th International Conference on Software Technologies, 2017, Strona(/y) 50-60, ISBN 978-989-758-262-2
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006417000500060

Privacy-Utility Feature Selection as a tool in Private Data Classification

Autorzy: Mina Sheikhalishahi, Fabio Martinelli
Opublikowane w: Advances in Intelligent Systems and Computing book series, Numer AISC, volume 620, 2017
Wydawca: Springer International

Privacy preserving clustering over horizontal and vertical partitioned data

Autorzy: Mina Sheikhalishahi, Fabio Martinelli
Opublikowane w: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Strona(/y) 1237-1244, ISBN 978-1-5386-1629-1
Wydawca: IEEE
DOI: 10.1109/ISCC.2017.8024694

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment

Autorzy: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Opublikowane w: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Numer 3rd International Conference on Information Systems Security and Privacy, 2017, Strona(/y) 487-492, ISBN 978-989-758-209-7
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006217304870492

Car hacking identification through fuzzy logic algorithms

Autorzy: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Opublikowane w: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Strona(/y) 1-7, ISBN 978-1-5090-6034-4
Wydawca: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015464

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

Autorzy: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Opublikowane w: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Strona(/y) 263-268, ISBN 978-1-5386-1759-5
Wydawca: IEEE
DOI: 10.1109/WETICE.2017.23

A time series classification approach to game bot detection

Autorzy: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Opublikowane w: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Strona(/y) 1-11, ISBN 9781-450352253
Wydawca: ACM Press
DOI: 10.1145/3102254.3102263

A fuzzy-based process mining approach for dynamic malware detection

Autorzy: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Opublikowane w: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Strona(/y) 1-8, ISBN 978-1-5090-6034-4
Wydawca: IEEE
DOI: 10.1109/FUZZ-IEEE.2017.8015490

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware

Autorzy: Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Opublikowane w: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Strona(/y) 899-901, ISBN 9781-450349444
Wydawca: ACM Press
DOI: 10.1145/3052973.3055156

Analysis of Data Sharing Agreements

Autorzy: Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi
Opublikowane w: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Strona(/y) 167-178, ISBN 978-989-758-209-7
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006207501670178

Concurrent History-based Usage Control Policies

Autorzy: Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Opublikowane w: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Strona(/y) 657-666, ISBN 978-989-758-210-3
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006232506570666

A Collaborative Tool for Modelling Multi-stage Attacks

Autorzy: Ian Herwono, Fadi Ali El-Moussa
Opublikowane w: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Strona(/y) 312-317
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006137103120317

Automated Detection of the Early Stages of Cyber Kill Chain

Autorzy: Ian Herwono, Fadi Ali El-Moussa
Opublikowane w: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Strona(/y) 182-189, ISBN 978-989-758-282-0
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006543301820189

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

Autorzy: Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton
Opublikowane w: 2018 IEEE Conference on Communications and Network Security (CNS), 2018, Strona(/y) 1-7, ISBN 978-1-5386-4586-4
Wydawca: IEEE
DOI: 10.1109/cns.2018.8433212

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud

Autorzy: Wenjun Fan, Joanna Ziembicka, Rogerio de Lemos, David Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono
Opublikowane w: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Strona(/y) 74-80, ISBN 978-1-7281-1661-7
Wydawca: IEEE
DOI: 10.1109/cscloud/edgecom.2019.00-15

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników