Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Enhancing Critical Infrastructure Protection with innovative SECurity framework

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Use-case evaluation and recommendations (se abrirá en una nueva ventana)

This report will give an analysis of the field trial results assessing the performance and usability of our approach. The report will present recommendations on how the framework can be utilized for providing more reliable industrial related applications in several industrial domains. In addition, the techno-economic assessment will be presented.

Report on functionality building blocks (se abrirá en una nueva ventana)

This deliverable will report on the pilot’s features, setting the foundations for the definition of the functionality basic blocks to be used to design the CIPSEC platform

CIPSEC annual report on project management (Year 3) (se abrirá en una nueva ventana)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC services integration on the Unified Architecture (se abrirá en una nueva ventana)

This deliverable will report on the services development and integration on the CIPSEC architecture for securing CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Report (se abrirá en una nueva ventana)

This document will update D3.4 with the final outcome inferred from the inter-dependencies analysis.

Trial scenario definitions and evaluation methodology specification (se abrirá en una nueva ventana)

This report will describe in detail the scenarios for the experiments and trials, as well as a methodology for the evaluation and validation of the results

Pilot II Integration: Hospital’s Operational Technology Management System use case. (se abrirá en una nueva ventana)

This document will update D3.2 describing the efforts carried out to integrate the CIPSEC platform into Pilot II.

Complete Complexity Analysis (se abrirá en una nueva ventana)

This deliverable will describe the set of policies to assess the complexity brought by general vs particular solutions in CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Preliminary Report (se abrirá en una nueva ventana)

This document will describe a preliminary analysis on intra/inter-dependencies analysis, highlighting the potential cascading effects

Pilot I Integration: Incident Discovery and Response for Railway use case (se abrirá en una nueva ventana)

This document will update D3.1.1 describing the efforts carried out to integrate the CIPSEC platform into Pilot I.

CIPSEC annual report on exploitation, dissemination and standardization (Year 2) (se abrirá en una nueva ventana)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 2nd year

Business model definition (se abrirá en una nueva ventana)

The consortium will define an appropriate business model where several details, due to real-life experimentations results will be included. Such model will help to optimize the income streams for all the parties involved in this Innovation Action

Preliminary Pilot III Integration: Air quality Monitoring System use case. (se abrirá en una nueva ventana)

This document will describe preliminary the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC annual report on exploitation, dissemination and standardization (Year 1) (se abrirá en una nueva ventana)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 1st year

CIPSEC Evaluation Plan (se abrirá en una nueva ventana)

This deliverable will propose the set of activities to create and evaluate the CIPSEC solution

CIPSEC annual report on project management (Year 1) (se abrirá en una nueva ventana)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

System ready for validation activities (se abrirá en una nueva ventana)

This report will present the specifications of the integrated products and services (the complete security framework) for the three applications operations that will be developed and deployed for the trial.

CIPSEC Unified Architecture – First Internal Release (se abrirá en una nueva ventana)

This deliverable will report the preliminary draft of the system level functionalities for the proposed CIPSEC platform architecture

Project management strategy: project handbook (se abrirá en una nueva ventana)

The aforementioned management plans are designed (Validation plan etc.). Moreover, CIPSEC will design the project handbook that incorporates all procedures relating to the technical and administrative management of the project, as well as the project rules and guidelines on management of foreground and IPR.

CIPSEC Framework Final version (se abrirá en una nueva ventana)

This deliverable consists of two parts: i) it will compile in a single public report the set of efforts carried out in T2.1, T2.3 and T2.4, including assets roadmapping, CIPSEC prototype description and final evaluation settings, and; ii) it will deliver the final version of the CIPSEC platform (SW release-FINAL).

Report on taxonomy of the CI environments (se abrirá en una nueva ventana)

This deliverable will describe a taxonomy of different CI environments according to the expected features and functionalities, in order to properly tailor the CIPSEC design to the set of target CIs.

Pilot III Integration: Air quality Monitoring System use case (se abrirá en una nueva ventana)

This document will update D3.3 describing the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC System design (se abrirá en una nueva ventana)

This deliverable will describe innovation road-mapping in existing assets to support specs and requirements, defined in WP1 and needed for the architectural design in T2.2.

Preliminary certification activities (se abrirá en una nueva ventana)

This deliverable will describe CIPSEC activities related to the preliminary certification for the security framework. In this report CIPSEC will include a cost analysis for concluding the certification in every aspect as well.

Preliminary Pilot I Integration: Incident Discovery and Response for Railway use case (se abrirá en una nueva ventana)

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot I.

Dissemination plan and market analysis (se abrirá en una nueva ventana)

In this report CIPSEC presents the dissemination and standardization strategy plan, the web-site structure (including the description for each security product and service) as well as a complete study related to possible competitors and market maturity.

Preliminary Pilot II Integration: Hospital’s Operational Technology Management System use case. (se abrirá en una nueva ventana)

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot II.

Final Version of the CIPSEC Unified Architecture and Initial Version of the CIPSEC Framework Prototype. (se abrirá en una nueva ventana)

This deliverable will describe the overall CIPSEC platform architecture as a public report, and the first confidential version of a CIPSEC prototype (internal SW release-I) leveraging existing market solutions and its further integration into the proposed pilots

CIPSEC annual report on project management (Year 2) (se abrirá en una nueva ventana)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC products integration on the Unified Architecture (se abrirá en una nueva ventana)

This deliverable will describe strategies for a successful CIPSEC market.

CI base security characteristics and market analysis report (se abrirá en una nueva ventana)

This deliverable includes a survey analysis of security issues for CIs, mainly focusing on the pilots’ needs as well as a thorough analysis of market solutions, both mandatory to design the CIPSEC platform.

CIPSEC annual report on exploitation, dissemination and standardization (Year 3) (se abrirá en una nueva ventana)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 3rd year.

Prototype Demonstration: Field trial results (se abrirá en una nueva ventana)

This report will describe in detail the execution of the different trials in the selected pilots and uses cases and their respective sub-systems

Publicaciones

Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol (se abrirá en una nueva ventana)

Autores: Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos
Publicado en: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Página(s) 1193-1200, ISBN 978-1-5386-1629-1
Editor: IEEE
DOI: 10.1109/ISCC.2017.8024687

An SDN-based Architecture for Security Provisioning in Fog-to-Cloud (F2C) Computing System

Autores: Sarang Kahvazadeh, Vitor Barbosa, Xavi Masip, Eva Marín Tordera, Jordi García Almiñana, Rodrígo Díaz
Publicado en: Proceedings of the Future Technologies Conference (FTC), 2017
Editor: EEE , FTC (2017) Future Technologies Conference 2017

Securing combined Fog-to-Cloud system Through SDN Approach (se abrirá en una nueva ventana)

Autores: Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, Rodrigo Diaz
Publicado en: Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17, 2017, Página(s) 1-6, ISBN 9781-450349345
Editor: ACM Press
DOI: 10.1145/3069383.3069385

Hardware Security for Critical Infrastructures - The CIPSEC Project Approach (se abrirá en una nueva ventana)

Autores: Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Publicado en: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2017, Página(s) 356-361, ISBN 978-1-5090-6762-6
Editor: IEEE
DOI: 10.1109/ISVLSI.2017.69

No Sugar but all the Taste! Memory Encryption without Architectural Support (se abrirá en una nueva ventana)

Autores: Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos Markatos, Sotiris Ioannidis
Publicado en: 2017, Página(s) 362-380
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-66399-9_20

Resiliente Architekturen in der Eisenbahn-Signaltechnik

Autores: TUD
Publicado en: 2016
Editor: CYSIS workgroup

Improve SIEM capabilities within CIPSEC Project

Autores: Joaquin Rodriguez Rodriguez
Publicado en: 2017
Editor: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017),

A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures (se abrirá en una nueva ventana)

Autores: Apostolos P. Fournaris, Charalambos Dimopoulos, Odysseas Koufopavlou
Publicado en: 2017 Euromicro Conference on Digital System Design (DSD), 2017, Página(s) 221-228, ISBN 978-1-5386-2146-2
Editor: IEEE
DOI: 10.1109/DSD.2017.82

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems (se abrirá en una nueva ventana)

Autores: Hatem Ismail, Stefanie Roos, Neeraj Suri
Publicado en: "2018 IEEE 19th International Symposium on ""A World of Wireless, Mobile and Multimedia Networks"" (WoWMoM)", 2018, Página(s) 1-9, ISBN 978-1-5386-4725-7
Editor: IEEE
DOI: 10.1109/wowmom.2018.8449812

A flexible leakage trace collection setup for arbitrary cryptographic IP cores (se abrirá en una nueva ventana)

Autores: Athanassios Moschos, Apostolos P. Fournaris, Odysseas Koufopavlou
Publicado en: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Página(s) 138-142, ISBN 978-1-5386-4731-8
Editor: IEEE
DOI: 10.1109/hst.2018.8383902

Trusted hardware sensors for anomaly detection in critical infrastructure systems (se abrirá en una nueva ventana)

Autores: Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Publicado en: 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2018, Página(s) 1-4, ISBN 978-1-5386-4788-2
Editor: IEEE
DOI: 10.1109/mocast.2018.8376629

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services

Autores: Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Publicado en: 2018
Editor: ARES International Conference on Availability, Reliability and Security (accepted for publication).

Whetstone: Reliable Monitoring of Cloud Services (se abrirá en una nueva ventana)

Autores: Heng Zhang, Jesus Luna, Ruben Trapero, Neeraj Suri
Publicado en: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Página(s) 115-122, ISBN 978-1-5386-4705-9
Editor: IEEE
DOI: 10.1109/smartcomp.2018.00081

A genetic algorithm for obtaining memory constrained near-perfect hashing (se abrirá en una nueva ventana)

Autores: Dan Domnita, Ciprian Oprisa
Publicado en: 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2018, Página(s) 1-6, ISBN 978-1-5386-2205-6
Editor: IEEE
DOI: 10.1109/aqtr.2018.8402794

Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems (se abrirá en una nueva ventana)

Autores: Sarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marin-Tordera, Alejandro Jurnet, Jordi Garcia
Publicado en: 2018 3rd Cloudification of the Internet of Things (CIoT), 2018, Página(s) 1-7, ISBN 978-1-5386-4629-8
Editor: IEEE
DOI: 10.1109/ciot.2018.8627111

Prediction of abnormal temporal behavior in real-time systems (se abrirá en una nueva ventana)

Autores: Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst
Publicado en: Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, 2018, Página(s) 359-367, ISBN 9781-450351911
Editor: ACM Press
DOI: 10.1145/3167132.3167172

A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems (se abrirá en una nueva ventana)

Autores: Hatem Ismail, Stefanie Roos, Neeraj Suri
Publicado en: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Página(s) 456-464, ISBN 978-1-5386-4388-4
Editor: IEEE
DOI: 10.1109/trustcom/bigdatase.2018.00072

Security Analysis of the RaSTA Safety Protocol (se abrirá en una nueva ventana)

Autores: Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser
Publicado en: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), 2018, Página(s) 199-204, ISBN 978-1-5386-7848-0
Editor: IEEE
DOI: 10.1109/isi.2018.8587371

InfoLeak: Scheduling-Based Information Leakage (se abrirá en una nueva ventana)

Autores: Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Publicado en: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Página(s) 44-53, ISBN 978-1-5386-5700-3
Editor: IEEE
DOI: 10.1109/prdc.2018.00015

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach,

Autores: Ana Rodríguez-Hoyos, Jose Antonio Estrada-Jimenez, David Rebollo-Monedero, Jordi Forné, Ruben Trapero, Antonio Alvarez, Rodrigo Diaz
Publicado en: 2019
Editor: WiPe Paper – Privacy Risk Management in Critical Infrastructures Proceedings of the 16th ISCRAM Conference

Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System (se abrirá en una nueva ventana)

Autores: Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis
Publicado en: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019, Página(s) 148-158, ISBN 978-989-758-374-2
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007715201480158

SeReCP: A Secure and Reliable Communication Platform for the Smart Grid (se abrirá en una nueva ventana)

Autores: Kubilay Demir, Neeraj Suri
Publicado en: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017, Página(s) 175-184, ISBN 978-1-5090-5652-1
Editor: IEEE
DOI: 10.1109/PRDC.2017.31

A Security Architecture for Railway Signalling (se abrirá en una nueva ventana)

Autores: Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Publicado en: Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017, Edición Yearly, 2017, Página(s) 320-328
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-66266-4_21

A Framework for Ranking Cloud Security Services (se abrirá en una nueva ventana)

Autores: Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Publicado en: 2017 IEEE International Conference on Services Computing (SCC), Edición Yearly, 2017, Página(s) 322-329, ISBN 978-1-5386-2005-2
Editor: IEEE
DOI: 10.1109/SCC.2017.48

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services (se abrirá en una nueva ventana)

Autores: Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Publicado en: 2017 IEEE International Conference on Services Computing (SCC), Edición Yearly, 2017, Página(s) 27-34, ISBN 978-1-5386-2005-2
Editor: IEEE
DOI: 10.1109/SCC.2017.13

C'mon - Monitoring the Compliance of Cloud Services to Contracted Properties (se abrirá en una nueva ventana)

Autores: Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Publicado en: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Edición Yearly, 2017, Página(s) 1-6, ISBN 9781-450352574
Editor: ACM Press
DOI: 10.1145/3098954.3098967

Towards DDoS Attack Resilient Wide Area Monitoring Systems (se abrirá en una nueva ventana)

Autores: Kubilay Demir, Neeraj Suri
Publicado en: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Edición Yearly, 2017, Página(s) 1-7, ISBN 9781-450352574
Editor: ACM Press
DOI: 10.1145/3098954.3103164

Challenges and Approaches in Securing Safety-Relevant Railway Signalling (se abrirá en una nueva ventana)

Autores: Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Publicado en: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Edición Yearly, 2017, Página(s) 139-145, ISBN 978-1-5386-2244-5
Editor: IEEE
DOI: 10.1109/EuroSPW.2017.63

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks (se abrirá en una nueva ventana)

Autores: Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou
Publicado en: Electronics, Edición 6/3, 2017, Página(s) 52, ISSN 2079-9292
Editor: MDPI
DOI: 10.3390/electronics6030052

"Does <inline-formula> <tex-math notation=""LaTeX"">$k$ </tex-math> </inline-formula>-Anonymous Microaggregation Affect Machine-Learned Macrotrends?" (se abrirá en una nueva ventana)

Autores: Ana Rodriguez-Hoyos, Jose Estrada-Jimenez, David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forne
Publicado en: IEEE Access, Edición 6, 2018, Página(s) 28258-28277, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2018.2834858

Practical Evaluation of Protected ResidueNumber System Scalar Multiplication (se abrirá en una nueva ventana)

Autores: Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
Publicado en: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, Página(s) Vol. 2019, No. 1, pp. 259–282, ISSN 2569-2925
Editor: IACR Transactions on Cryptographic Hardware and Embedded Systems.
DOI: 10.13154/tches.v2019.i1.259-282

MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems (se abrirá en una nueva ventana)

Autores: Kubilay Demir, Ferdaus Nayyer, Neeraj Suri
Publicado en: International Journal of Critical Infrastructure Protection, Edición 25, 2019, Página(s) 84-101, ISSN 1874-5482
Editor: Elsevier BV
DOI: 10.1016/j.ijcip.2019.02.003

Securing the cloud-assisted smart grid (se abrirá en una nueva ventana)

Autores: Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri
Publicado en: International Journal of Critical Infrastructure Protection, Edición 23, 2018, Página(s) 100-111, ISSN 1874-5482
Editor: Elsevier BV
DOI: 10.1016/j.ijcip.2018.08.004

Infrastrutture critiche più sicure, grazie al progetto CIPSEC

Autores: Michaela Garbarino
Publicado en: 2016
Editor: CSI

Innovation: At the forefront of IoT security

Autores: WOS
Publicado en: 2016
Editor: WOS

Press release entitled “Innovation The CIPSEC project: UNIFIED SECURITY”.

Autores: WOS
Publicado en: 2016
Editor: WOS

“Secocard-Plattform zentrales Element in EU-Sicherheitsprojekt”

Autores: EMPELOR
Publicado en: PresseBox, 2016
Editor: EMPELOR

Launch of CIPSEC Project aiming to enhance Critical Infrastructure Protection

Autores: ATOS
Publicado en: 2016
Editor: ATOS

The Expertise Making Our Infrastructure Safe

Autores: Dr Paschalis Papagrigoriou
Publicado en: 2016
Editor: EMPELOR

ATOS coordina el desarrollo de los proyectos europeos ARIES y CIPSEC

Autores: ATOS
Publicado en: SIC magazine, n.122, 2016
Editor: ATOS

CIPSEC: A Commitment for the future of Critical Infrastructures

Autores: Antonio Álvarez and Joaquín Rodríguez
Publicado en: 2018
Editor: ERCIM News 115

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural

Autores: Apostolos P. Fournaris, Lidia Pocero Fraile and Odysseas Koufopavlou
Publicado en: Electronics, Volume 6, Edición 3, Edición Electronics Open Access Journal no. 3: 52, 2017
Editor: MDPI

Network Topology Effects on the Detectability of Crossfire Attacks (se abrirá en una nueva ventana)

Autores: Christos Liaskos, Sotiris Ioannidis
Publicado en: IEEE Transactions on Information Forensics and Security, Edición 13/7, 2018, Página(s) 1682-1695, ISSN 1556-6013
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2018.2799425

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures (se abrirá en una nueva ventana)

Autores: Apostolos P. Fournaris, Charalambos Dimopoulos, Athanassios Moschos, Odysseas Koufopavlou
Publicado en: Microprocessors and Microsystems, Edición 64, 2019, Página(s) 73-87, ISSN 0141-9331
Editor: Elsevier BV
DOI: 10.1016/j.micpro.2018.07.003

A Secure and Efficient File System Access Control Mechanism (FlexFS)

Autores: Jihane Najar and Vassilis Prevelakis
Publicado en: “International workshop on Information & Operational Technology (IT & OT) security systems IOSEC 2018,”, 2019
Editor: Springer

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level (se abrirá en una nueva ventana)

Autores: Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Publicado en: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Edición 11398, 2019, Página(s) 27-38, ISBN 978-3-030-12084-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_3

Automated Measurements of Cross-Device Tracking

Autores: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis and Nicolas Kourtellis,
Publicado en: International Workshop on Information and Operational Technology Security Systems, 2018, Página(s) pp 73-80
Editor: 3rd CIPSEC workshop (IOSec 2018). Crete, Greece

Threat Modeling the Cloud: An Ontology Based Approach (se abrirá en una nueva ventana)

Autores: Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Publicado en: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Edición 11398, 2019, Página(s) 61-72, ISBN 978-3-030-12084-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_6

Full Content Search in Malware Collections

Autores: Andrei Mihalca and Ciprian Oprisa
Publicado en: International Workshop on Information and Operational Technology Security Systems, 2018, Página(s) pp 134-145
Editor: Springer

Challenges in Cybersecurity and Privacy - the European Research Landscape

Autores: Jorge Bernal Bernabe, University of Murcia, Spain Antonio Skarmeta, University of Murcia, Spain
Publicado en: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, ISBN 9788-770220880
Editor: River Publishers Series in Security and Digital Forensics

Incremental k -Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling (se abrirá en una nueva ventana)

Autores: David Rebollo-Monedero ; César Hernández-Baigorri ; Jordi Forné ; Miguel Soriano
Publicado en: Edición 18495393, 2018, Página(s) 60016 - 60044
Editor: IEEE
DOI: 10.1109/access.2018.2875949

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0