CORDIS - Forschungsergebnisse der EU
CORDIS

Enhancing Critical Infrastructure Protection with innovative SECurity framework

Leistungen

Use-case evaluation and recommendations

This report will give an analysis of the field trial results assessing the performance and usability of our approach. The report will present recommendations on how the framework can be utilized for providing more reliable industrial related applications in several industrial domains. In addition, the techno-economic assessment will be presented.

Report on functionality building blocks

This deliverable will report on the pilot’s features, setting the foundations for the definition of the functionality basic blocks to be used to design the CIPSEC platform

CIPSEC annual report on project management (Year 3)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC services integration on the Unified Architecture

This deliverable will report on the services development and integration on the CIPSEC architecture for securing CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Report

This document will update D3.4 with the final outcome inferred from the inter-dependencies analysis.

Trial scenario definitions and evaluation methodology specification

This report will describe in detail the scenarios for the experiments and trials, as well as a methodology for the evaluation and validation of the results

Pilot II Integration: Hospital’s Operational Technology Management System use case.

This document will update D3.2 describing the efforts carried out to integrate the CIPSEC platform into Pilot II.

Complete Complexity Analysis

This deliverable will describe the set of policies to assess the complexity brought by general vs particular solutions in CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Preliminary Report

This document will describe a preliminary analysis on intra/inter-dependencies analysis, highlighting the potential cascading effects

Pilot I Integration: Incident Discovery and Response for Railway use case

This document will update D3.1.1 describing the efforts carried out to integrate the CIPSEC platform into Pilot I.

CIPSEC annual report on exploitation, dissemination and standardization (Year 2)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 2nd year

Business model definition

The consortium will define an appropriate business model where several details, due to real-life experimentations results will be included. Such model will help to optimize the income streams for all the parties involved in this Innovation Action

Preliminary Pilot III Integration: Air quality Monitoring System use case.

This document will describe preliminary the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC annual report on exploitation, dissemination and standardization (Year 1)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 1st year

CIPSEC Evaluation Plan

This deliverable will propose the set of activities to create and evaluate the CIPSEC solution

CIPSEC annual report on project management (Year 1)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

System ready for validation activities

This report will present the specifications of the integrated products and services (the complete security framework) for the three applications operations that will be developed and deployed for the trial.

CIPSEC Unified Architecture – First Internal Release

This deliverable will report the preliminary draft of the system level functionalities for the proposed CIPSEC platform architecture

Project management strategy: project handbook

The aforementioned management plans are designed (Validation plan etc.). Moreover, CIPSEC will design the project handbook that incorporates all procedures relating to the technical and administrative management of the project, as well as the project rules and guidelines on management of foreground and IPR.

CIPSEC Framework Final version

This deliverable consists of two parts: i) it will compile in a single public report the set of efforts carried out in T2.1, T2.3 and T2.4, including assets roadmapping, CIPSEC prototype description and final evaluation settings, and; ii) it will deliver the final version of the CIPSEC platform (SW release-FINAL).

Report on taxonomy of the CI environments

This deliverable will describe a taxonomy of different CI environments according to the expected features and functionalities, in order to properly tailor the CIPSEC design to the set of target CIs.

Pilot III Integration: Air quality Monitoring System use case

This document will update D3.3 describing the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC System design

This deliverable will describe innovation road-mapping in existing assets to support specs and requirements, defined in WP1 and needed for the architectural design in T2.2.

Preliminary certification activities

This deliverable will describe CIPSEC activities related to the preliminary certification for the security framework. In this report CIPSEC will include a cost analysis for concluding the certification in every aspect as well.

Preliminary Pilot I Integration: Incident Discovery and Response for Railway use case

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot I.

Dissemination plan and market analysis

In this report CIPSEC presents the dissemination and standardization strategy plan, the web-site structure (including the description for each security product and service) as well as a complete study related to possible competitors and market maturity.

Preliminary Pilot II Integration: Hospital’s Operational Technology Management System use case.

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot II.

Final Version of the CIPSEC Unified Architecture and Initial Version of the CIPSEC Framework Prototype.

This deliverable will describe the overall CIPSEC platform architecture as a public report, and the first confidential version of a CIPSEC prototype (internal SW release-I) leveraging existing market solutions and its further integration into the proposed pilots

CIPSEC annual report on project management (Year 2)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC products integration on the Unified Architecture

This deliverable will describe strategies for a successful CIPSEC market.

CI base security characteristics and market analysis report

This deliverable includes a survey analysis of security issues for CIs, mainly focusing on the pilots’ needs as well as a thorough analysis of market solutions, both mandatory to design the CIPSEC platform.

CIPSEC annual report on exploitation, dissemination and standardization (Year 3)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 3rd year.

Prototype Demonstration: Field trial results

This report will describe in detail the execution of the different trials in the selected pilots and uses cases and their respective sub-systems

Veröffentlichungen

Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol

Autoren: Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos
Veröffentlicht in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Seite(n) 1193-1200, ISBN 978-1-5386-1629-1
Herausgeber: IEEE
DOI: 10.1109/ISCC.2017.8024687

An SDN-based Architecture for Security Provisioning in Fog-to-Cloud (F2C) Computing System

Autoren: Sarang Kahvazadeh, Vitor Barbosa, Xavi Masip, Eva Marín Tordera, Jordi García Almiñana, Rodrígo Díaz
Veröffentlicht in: Proceedings of the Future Technologies Conference (FTC), 2017
Herausgeber: EEE , FTC (2017) Future Technologies Conference 2017

Securing combined Fog-to-Cloud system Through SDN Approach

Autoren: Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, Rodrigo Diaz
Veröffentlicht in: Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17, 2017, Seite(n) 1-6, ISBN 9781-450349345
Herausgeber: ACM Press
DOI: 10.1145/3069383.3069385

Hardware Security for Critical Infrastructures - The CIPSEC Project Approach

Autoren: Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Veröffentlicht in: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2017, Seite(n) 356-361, ISBN 978-1-5090-6762-6
Herausgeber: IEEE
DOI: 10.1109/ISVLSI.2017.69

No Sugar but all the Taste! Memory Encryption without Architectural Support

Autoren: Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos Markatos, Sotiris Ioannidis
Veröffentlicht in: 2017, Seite(n) 362-380
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-66399-9_20

Resiliente Architekturen in der Eisenbahn-Signaltechnik

Autoren: TUD
Veröffentlicht in: 2016
Herausgeber: CYSIS workgroup

Improve SIEM capabilities within CIPSEC Project

Autoren: Joaquin Rodriguez Rodriguez
Veröffentlicht in: 2017
Herausgeber: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017),

A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures

Autoren: Apostolos P. Fournaris, Charalambos Dimopoulos, Odysseas Koufopavlou
Veröffentlicht in: 2017 Euromicro Conference on Digital System Design (DSD), 2017, Seite(n) 221-228, ISBN 978-1-5386-2146-2
Herausgeber: IEEE
DOI: 10.1109/DSD.2017.82

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

Autoren: Hatem Ismail, Stefanie Roos, Neeraj Suri
Veröffentlicht in: "2018 IEEE 19th International Symposium on ""A World of Wireless, Mobile and Multimedia Networks"" (WoWMoM)", 2018, Seite(n) 1-9, ISBN 978-1-5386-4725-7
Herausgeber: IEEE
DOI: 10.1109/wowmom.2018.8449812

A flexible leakage trace collection setup for arbitrary cryptographic IP cores

Autoren: Athanassios Moschos, Apostolos P. Fournaris, Odysseas Koufopavlou
Veröffentlicht in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Seite(n) 138-142, ISBN 978-1-5386-4731-8
Herausgeber: IEEE
DOI: 10.1109/hst.2018.8383902

Trusted hardware sensors for anomaly detection in critical infrastructure systems

Autoren: Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Veröffentlicht in: 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2018, Seite(n) 1-4, ISBN 978-1-5386-4788-2
Herausgeber: IEEE
DOI: 10.1109/mocast.2018.8376629

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services

Autoren: Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Veröffentlicht in: 2018
Herausgeber: ARES International Conference on Availability, Reliability and Security (accepted for publication).

Whetstone: Reliable Monitoring of Cloud Services

Autoren: Heng Zhang, Jesus Luna, Ruben Trapero, Neeraj Suri
Veröffentlicht in: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Seite(n) 115-122, ISBN 978-1-5386-4705-9
Herausgeber: IEEE
DOI: 10.1109/smartcomp.2018.00081

A genetic algorithm for obtaining memory constrained near-perfect hashing

Autoren: Dan Domnita, Ciprian Oprisa
Veröffentlicht in: 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2018, Seite(n) 1-6, ISBN 978-1-5386-2205-6
Herausgeber: IEEE
DOI: 10.1109/aqtr.2018.8402794

Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems

Autoren: Sarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marin-Tordera, Alejandro Jurnet, Jordi Garcia
Veröffentlicht in: 2018 3rd Cloudification of the Internet of Things (CIoT), 2018, Seite(n) 1-7, ISBN 978-1-5386-4629-8
Herausgeber: IEEE
DOI: 10.1109/ciot.2018.8627111

Prediction of abnormal temporal behavior in real-time systems

Autoren: Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst
Veröffentlicht in: Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, 2018, Seite(n) 359-367, ISBN 9781-450351911
Herausgeber: ACM Press
DOI: 10.1145/3167132.3167172

A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

Autoren: Hatem Ismail, Stefanie Roos, Neeraj Suri
Veröffentlicht in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Seite(n) 456-464, ISBN 978-1-5386-4388-4
Herausgeber: IEEE
DOI: 10.1109/trustcom/bigdatase.2018.00072

Security Analysis of the RaSTA Safety Protocol

Autoren: Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser
Veröffentlicht in: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), 2018, Seite(n) 199-204, ISBN 978-1-5386-7848-0
Herausgeber: IEEE
DOI: 10.1109/isi.2018.8587371

InfoLeak: Scheduling-Based Information Leakage

Autoren: Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Veröffentlicht in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Seite(n) 44-53, ISBN 978-1-5386-5700-3
Herausgeber: IEEE
DOI: 10.1109/prdc.2018.00015

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach,

Autoren: Ana Rodríguez-Hoyos, Jose Antonio Estrada-Jimenez, David Rebollo-Monedero, Jordi Forné, Ruben Trapero, Antonio Alvarez, Rodrigo Diaz
Veröffentlicht in: 2019
Herausgeber: WiPe Paper – Privacy Risk Management in Critical Infrastructures Proceedings of the 16th ISCRAM Conference

Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System

Autoren: Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis
Veröffentlicht in: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019, Seite(n) 148-158, ISBN 978-989-758-374-2
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007715201480158

SeReCP: A Secure and Reliable Communication Platform for the Smart Grid

Autoren: Kubilay Demir, Neeraj Suri
Veröffentlicht in: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017, Seite(n) 175-184, ISBN 978-1-5090-5652-1
Herausgeber: IEEE
DOI: 10.1109/PRDC.2017.31

A Security Architecture for Railway Signalling

Autoren: Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Veröffentlicht in: Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017, Ausgabe Yearly, 2017, Seite(n) 320-328
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-66266-4_21

A Framework for Ranking Cloud Security Services

Autoren: Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Veröffentlicht in: 2017 IEEE International Conference on Services Computing (SCC), Ausgabe Yearly, 2017, Seite(n) 322-329, ISBN 978-1-5386-2005-2
Herausgeber: IEEE
DOI: 10.1109/SCC.2017.48

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

Autoren: Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Veröffentlicht in: 2017 IEEE International Conference on Services Computing (SCC), Ausgabe Yearly, 2017, Seite(n) 27-34, ISBN 978-1-5386-2005-2
Herausgeber: IEEE
DOI: 10.1109/SCC.2017.13

C'mon - Monitoring the Compliance of Cloud Services to Contracted Properties

Autoren: Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Veröffentlicht in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Ausgabe Yearly, 2017, Seite(n) 1-6, ISBN 9781-450352574
Herausgeber: ACM Press
DOI: 10.1145/3098954.3098967

Towards DDoS Attack Resilient Wide Area Monitoring Systems

Autoren: Kubilay Demir, Neeraj Suri
Veröffentlicht in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Ausgabe Yearly, 2017, Seite(n) 1-7, ISBN 9781-450352574
Herausgeber: ACM Press
DOI: 10.1145/3098954.3103164

Challenges and Approaches in Securing Safety-Relevant Railway Signalling

Autoren: Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Veröffentlicht in: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Ausgabe Yearly, 2017, Seite(n) 139-145, ISBN 978-1-5386-2244-5
Herausgeber: IEEE
DOI: 10.1109/EuroSPW.2017.63

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

Autoren: Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou
Veröffentlicht in: Electronics, Ausgabe 6/3, 2017, Seite(n) 52, ISSN 2079-9292
Herausgeber: MDPI
DOI: 10.3390/electronics6030052

"Does <inline-formula> <tex-math notation=""LaTeX"">$k$ </tex-math> </inline-formula>-Anonymous Microaggregation Affect Machine-Learned Macrotrends?"

Autoren: Ana Rodriguez-Hoyos, Jose Estrada-Jimenez, David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forne
Veröffentlicht in: IEEE Access, Ausgabe 6, 2018, Seite(n) 28258-28277, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2018.2834858

Practical Evaluation of Protected ResidueNumber System Scalar Multiplication

Autoren: Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
Veröffentlicht in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, Seite(n) Vol. 2019, No. 1, pp. 259–282, ISSN 2569-2925
Herausgeber: IACR Transactions on Cryptographic Hardware and Embedded Systems.
DOI: 10.13154/tches.v2019.i1.259-282

MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

Autoren: Kubilay Demir, Ferdaus Nayyer, Neeraj Suri
Veröffentlicht in: International Journal of Critical Infrastructure Protection, Ausgabe 25, 2019, Seite(n) 84-101, ISSN 1874-5482
Herausgeber: Elsevier BV
DOI: 10.1016/j.ijcip.2019.02.003

Securing the cloud-assisted smart grid

Autoren: Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri
Veröffentlicht in: International Journal of Critical Infrastructure Protection, Ausgabe 23, 2018, Seite(n) 100-111, ISSN 1874-5482
Herausgeber: Elsevier BV
DOI: 10.1016/j.ijcip.2018.08.004

Infrastrutture critiche più sicure, grazie al progetto CIPSEC

Autoren: Michaela Garbarino
Veröffentlicht in: 2016
Herausgeber: CSI

Innovation: At the forefront of IoT security

Autoren: WOS
Veröffentlicht in: 2016
Herausgeber: WOS

Press release entitled “Innovation The CIPSEC project: UNIFIED SECURITY”.

Autoren: WOS
Veröffentlicht in: 2016
Herausgeber: WOS

“Secocard-Plattform zentrales Element in EU-Sicherheitsprojekt”

Autoren: EMPELOR
Veröffentlicht in: PresseBox, 2016
Herausgeber: EMPELOR

Launch of CIPSEC Project aiming to enhance Critical Infrastructure Protection

Autoren: ATOS
Veröffentlicht in: 2016
Herausgeber: ATOS

The Expertise Making Our Infrastructure Safe

Autoren: Dr Paschalis Papagrigoriou
Veröffentlicht in: 2016
Herausgeber: EMPELOR

ATOS coordina el desarrollo de los proyectos europeos ARIES y CIPSEC

Autoren: ATOS
Veröffentlicht in: SIC magazine, n.122, 2016
Herausgeber: ATOS

CIPSEC: A Commitment for the future of Critical Infrastructures

Autoren: Antonio Álvarez and Joaquín Rodríguez
Veröffentlicht in: 2018
Herausgeber: ERCIM News 115

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural

Autoren: Apostolos P. Fournaris, Lidia Pocero Fraile and Odysseas Koufopavlou
Veröffentlicht in: Electronics, Volume 6, Ausgabe 3, Ausgabe Electronics Open Access Journal no. 3: 52, 2017
Herausgeber: MDPI

Network Topology Effects on the Detectability of Crossfire Attacks

Autoren: Christos Liaskos, Sotiris Ioannidis
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, Ausgabe 13/7, 2018, Seite(n) 1682-1695, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2018.2799425

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures

Autoren: Apostolos P. Fournaris, Charalambos Dimopoulos, Athanassios Moschos, Odysseas Koufopavlou
Veröffentlicht in: Microprocessors and Microsystems, Ausgabe 64, 2019, Seite(n) 73-87, ISSN 0141-9331
Herausgeber: Elsevier BV
DOI: 10.1016/j.micpro.2018.07.003

A Secure and Efficient File System Access Control Mechanism (FlexFS)

Autoren: Jihane Najar and Vassilis Prevelakis
Veröffentlicht in: “International workshop on Information & Operational Technology (IT & OT) security systems IOSEC 2018,”, 2019
Herausgeber: Springer

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

Autoren: Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Veröffentlicht in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Ausgabe 11398, 2019, Seite(n) 27-38, ISBN 978-3-030-12084-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_3

Automated Measurements of Cross-Device Tracking

Autoren: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis and Nicolas Kourtellis,
Veröffentlicht in: International Workshop on Information and Operational Technology Security Systems, 2018, Seite(n) pp 73-80
Herausgeber: 3rd CIPSEC workshop (IOSec 2018). Crete, Greece

Threat Modeling the Cloud: An Ontology Based Approach

Autoren: Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Veröffentlicht in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Ausgabe 11398, 2019, Seite(n) 61-72, ISBN 978-3-030-12084-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_6

Full Content Search in Malware Collections

Autoren: Andrei Mihalca and Ciprian Oprisa
Veröffentlicht in: International Workshop on Information and Operational Technology Security Systems, 2018, Seite(n) pp 134-145
Herausgeber: Springer

Challenges in Cybersecurity and Privacy - the European Research Landscape

Autoren: Jorge Bernal Bernabe, University of Murcia, Spain Antonio Skarmeta, University of Murcia, Spain
Veröffentlicht in: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, ISBN 9788-770220880
Herausgeber: River Publishers Series in Security and Digital Forensics

Incremental k -Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling

Autoren: David Rebollo-Monedero ; César Hernández-Baigorri ; Jordi Forné ; Miguel Soriano
Veröffentlicht in: Ausgabe 18495393, 2018, Seite(n) 60016 - 60044
Herausgeber: IEEE
DOI: 10.1109/access.2018.2875949

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor