European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Enhancing Critical Infrastructure Protection with innovative SECurity framework

Livrables

Use-case evaluation and recommendations

This report will give an analysis of the field trial results assessing the performance and usability of our approach. The report will present recommendations on how the framework can be utilized for providing more reliable industrial related applications in several industrial domains. In addition, the techno-economic assessment will be presented.

Report on functionality building blocks

This deliverable will report on the pilot’s features, setting the foundations for the definition of the functionality basic blocks to be used to design the CIPSEC platform

CIPSEC annual report on project management (Year 3)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC services integration on the Unified Architecture

This deliverable will report on the services development and integration on the CIPSEC architecture for securing CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Report

This document will update D3.4 with the final outcome inferred from the inter-dependencies analysis.

Trial scenario definitions and evaluation methodology specification

This report will describe in detail the scenarios for the experiments and trials, as well as a methodology for the evaluation and validation of the results

Pilot II Integration: Hospital’s Operational Technology Management System use case.

This document will update D3.2 describing the efforts carried out to integrate the CIPSEC platform into Pilot II.

Complete Complexity Analysis

This deliverable will describe the set of policies to assess the complexity brought by general vs particular solutions in CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Preliminary Report

This document will describe a preliminary analysis on intra/inter-dependencies analysis, highlighting the potential cascading effects

Pilot I Integration: Incident Discovery and Response for Railway use case

This document will update D3.1.1 describing the efforts carried out to integrate the CIPSEC platform into Pilot I.

CIPSEC annual report on exploitation, dissemination and standardization (Year 2)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 2nd year

Business model definition

The consortium will define an appropriate business model where several details, due to real-life experimentations results will be included. Such model will help to optimize the income streams for all the parties involved in this Innovation Action

Preliminary Pilot III Integration: Air quality Monitoring System use case.

This document will describe preliminary the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC annual report on exploitation, dissemination and standardization (Year 1)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 1st year

CIPSEC Evaluation Plan

This deliverable will propose the set of activities to create and evaluate the CIPSEC solution

CIPSEC annual report on project management (Year 1)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

System ready for validation activities

This report will present the specifications of the integrated products and services (the complete security framework) for the three applications operations that will be developed and deployed for the trial.

CIPSEC Unified Architecture – First Internal Release

This deliverable will report the preliminary draft of the system level functionalities for the proposed CIPSEC platform architecture

Project management strategy: project handbook

The aforementioned management plans are designed (Validation plan etc.). Moreover, CIPSEC will design the project handbook that incorporates all procedures relating to the technical and administrative management of the project, as well as the project rules and guidelines on management of foreground and IPR.

CIPSEC Framework Final version

This deliverable consists of two parts: i) it will compile in a single public report the set of efforts carried out in T2.1, T2.3 and T2.4, including assets roadmapping, CIPSEC prototype description and final evaluation settings, and; ii) it will deliver the final version of the CIPSEC platform (SW release-FINAL).

Report on taxonomy of the CI environments

This deliverable will describe a taxonomy of different CI environments according to the expected features and functionalities, in order to properly tailor the CIPSEC design to the set of target CIs.

Pilot III Integration: Air quality Monitoring System use case

This document will update D3.3 describing the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC System design

This deliverable will describe innovation road-mapping in existing assets to support specs and requirements, defined in WP1 and needed for the architectural design in T2.2.

Preliminary certification activities

This deliverable will describe CIPSEC activities related to the preliminary certification for the security framework. In this report CIPSEC will include a cost analysis for concluding the certification in every aspect as well.

Preliminary Pilot I Integration: Incident Discovery and Response for Railway use case

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot I.

Dissemination plan and market analysis

In this report CIPSEC presents the dissemination and standardization strategy plan, the web-site structure (including the description for each security product and service) as well as a complete study related to possible competitors and market maturity.

Preliminary Pilot II Integration: Hospital’s Operational Technology Management System use case.

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot II.

Final Version of the CIPSEC Unified Architecture and Initial Version of the CIPSEC Framework Prototype.

This deliverable will describe the overall CIPSEC platform architecture as a public report, and the first confidential version of a CIPSEC prototype (internal SW release-I) leveraging existing market solutions and its further integration into the proposed pilots

CIPSEC annual report on project management (Year 2)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC products integration on the Unified Architecture

This deliverable will describe strategies for a successful CIPSEC market.

CI base security characteristics and market analysis report

This deliverable includes a survey analysis of security issues for CIs, mainly focusing on the pilots’ needs as well as a thorough analysis of market solutions, both mandatory to design the CIPSEC platform.

CIPSEC annual report on exploitation, dissemination and standardization (Year 3)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 3rd year.

Prototype Demonstration: Field trial results

This report will describe in detail the execution of the different trials in the selected pilots and uses cases and their respective sub-systems

Publications

Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol

Auteurs: Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos
Publié dans: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Page(s) 1193-1200, ISBN 978-1-5386-1629-1
Éditeur: IEEE
DOI: 10.1109/ISCC.2017.8024687

An SDN-based Architecture for Security Provisioning in Fog-to-Cloud (F2C) Computing System

Auteurs: Sarang Kahvazadeh, Vitor Barbosa, Xavi Masip, Eva Marín Tordera, Jordi García Almiñana, Rodrígo Díaz
Publié dans: Proceedings of the Future Technologies Conference (FTC), 2017
Éditeur: EEE , FTC (2017) Future Technologies Conference 2017

Securing combined Fog-to-Cloud system Through SDN Approach

Auteurs: Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, Rodrigo Diaz
Publié dans: Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17, 2017, Page(s) 1-6, ISBN 9781-450349345
Éditeur: ACM Press
DOI: 10.1145/3069383.3069385

Hardware Security for Critical Infrastructures - The CIPSEC Project Approach

Auteurs: Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Publié dans: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2017, Page(s) 356-361, ISBN 978-1-5090-6762-6
Éditeur: IEEE
DOI: 10.1109/ISVLSI.2017.69

No Sugar but all the Taste! Memory Encryption without Architectural Support

Auteurs: Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos Markatos, Sotiris Ioannidis
Publié dans: 2017, Page(s) 362-380
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-66399-9_20

Resiliente Architekturen in der Eisenbahn-Signaltechnik

Auteurs: TUD
Publié dans: 2016
Éditeur: CYSIS workgroup

Improve SIEM capabilities within CIPSEC Project

Auteurs: Joaquin Rodriguez Rodriguez
Publié dans: 2017
Éditeur: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017),

A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures

Auteurs: Apostolos P. Fournaris, Charalambos Dimopoulos, Odysseas Koufopavlou
Publié dans: 2017 Euromicro Conference on Digital System Design (DSD), 2017, Page(s) 221-228, ISBN 978-1-5386-2146-2
Éditeur: IEEE
DOI: 10.1109/DSD.2017.82

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

Auteurs: Hatem Ismail, Stefanie Roos, Neeraj Suri
Publié dans: "2018 IEEE 19th International Symposium on ""A World of Wireless, Mobile and Multimedia Networks"" (WoWMoM)", 2018, Page(s) 1-9, ISBN 978-1-5386-4725-7
Éditeur: IEEE
DOI: 10.1109/wowmom.2018.8449812

A flexible leakage trace collection setup for arbitrary cryptographic IP cores

Auteurs: Athanassios Moschos, Apostolos P. Fournaris, Odysseas Koufopavlou
Publié dans: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Page(s) 138-142, ISBN 978-1-5386-4731-8
Éditeur: IEEE
DOI: 10.1109/hst.2018.8383902

Trusted hardware sensors for anomaly detection in critical infrastructure systems

Auteurs: Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Publié dans: 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2018, Page(s) 1-4, ISBN 978-1-5386-4788-2
Éditeur: IEEE
DOI: 10.1109/mocast.2018.8376629

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services

Auteurs: Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Publié dans: 2018
Éditeur: ARES International Conference on Availability, Reliability and Security (accepted for publication).

Whetstone: Reliable Monitoring of Cloud Services

Auteurs: Heng Zhang, Jesus Luna, Ruben Trapero, Neeraj Suri
Publié dans: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Page(s) 115-122, ISBN 978-1-5386-4705-9
Éditeur: IEEE
DOI: 10.1109/smartcomp.2018.00081

A genetic algorithm for obtaining memory constrained near-perfect hashing

Auteurs: Dan Domnita, Ciprian Oprisa
Publié dans: 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2018, Page(s) 1-6, ISBN 978-1-5386-2205-6
Éditeur: IEEE
DOI: 10.1109/aqtr.2018.8402794

Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems

Auteurs: Sarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marin-Tordera, Alejandro Jurnet, Jordi Garcia
Publié dans: 2018 3rd Cloudification of the Internet of Things (CIoT), 2018, Page(s) 1-7, ISBN 978-1-5386-4629-8
Éditeur: IEEE
DOI: 10.1109/ciot.2018.8627111

Prediction of abnormal temporal behavior in real-time systems

Auteurs: Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst
Publié dans: Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, 2018, Page(s) 359-367, ISBN 9781-450351911
Éditeur: ACM Press
DOI: 10.1145/3167132.3167172

A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

Auteurs: Hatem Ismail, Stefanie Roos, Neeraj Suri
Publié dans: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 456-464, ISBN 978-1-5386-4388-4
Éditeur: IEEE
DOI: 10.1109/trustcom/bigdatase.2018.00072

Security Analysis of the RaSTA Safety Protocol

Auteurs: Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser
Publié dans: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), 2018, Page(s) 199-204, ISBN 978-1-5386-7848-0
Éditeur: IEEE
DOI: 10.1109/isi.2018.8587371

InfoLeak: Scheduling-Based Information Leakage

Auteurs: Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Publié dans: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Page(s) 44-53, ISBN 978-1-5386-5700-3
Éditeur: IEEE
DOI: 10.1109/prdc.2018.00015

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach,

Auteurs: Ana Rodríguez-Hoyos, Jose Antonio Estrada-Jimenez, David Rebollo-Monedero, Jordi Forné, Ruben Trapero, Antonio Alvarez, Rodrigo Diaz
Publié dans: 2019
Éditeur: WiPe Paper – Privacy Risk Management in Critical Infrastructures Proceedings of the 16th ISCRAM Conference

Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System

Auteurs: Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis
Publié dans: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019, Page(s) 148-158, ISBN 978-989-758-374-2
Éditeur: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007715201480158

SeReCP: A Secure and Reliable Communication Platform for the Smart Grid

Auteurs: Kubilay Demir, Neeraj Suri
Publié dans: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017, Page(s) 175-184, ISBN 978-1-5090-5652-1
Éditeur: IEEE
DOI: 10.1109/PRDC.2017.31

A Security Architecture for Railway Signalling

Auteurs: Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Publié dans: Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017, Numéro Yearly, 2017, Page(s) 320-328
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-66266-4_21

A Framework for Ranking Cloud Security Services

Auteurs: Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Publié dans: 2017 IEEE International Conference on Services Computing (SCC), Numéro Yearly, 2017, Page(s) 322-329, ISBN 978-1-5386-2005-2
Éditeur: IEEE
DOI: 10.1109/SCC.2017.48

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

Auteurs: Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Publié dans: 2017 IEEE International Conference on Services Computing (SCC), Numéro Yearly, 2017, Page(s) 27-34, ISBN 978-1-5386-2005-2
Éditeur: IEEE
DOI: 10.1109/SCC.2017.13

C'mon - Monitoring the Compliance of Cloud Services to Contracted Properties

Auteurs: Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Publié dans: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Numéro Yearly, 2017, Page(s) 1-6, ISBN 9781-450352574
Éditeur: ACM Press
DOI: 10.1145/3098954.3098967

Towards DDoS Attack Resilient Wide Area Monitoring Systems

Auteurs: Kubilay Demir, Neeraj Suri
Publié dans: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Numéro Yearly, 2017, Page(s) 1-7, ISBN 9781-450352574
Éditeur: ACM Press
DOI: 10.1145/3098954.3103164

Challenges and Approaches in Securing Safety-Relevant Railway Signalling

Auteurs: Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Publié dans: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Numéro Yearly, 2017, Page(s) 139-145, ISBN 978-1-5386-2244-5
Éditeur: IEEE
DOI: 10.1109/EuroSPW.2017.63

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

Auteurs: Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou
Publié dans: Electronics, Numéro 6/3, 2017, Page(s) 52, ISSN 2079-9292
Éditeur: MDPI
DOI: 10.3390/electronics6030052

"Does <inline-formula> <tex-math notation=""LaTeX"">$k$ </tex-math> </inline-formula>-Anonymous Microaggregation Affect Machine-Learned Macrotrends?"

Auteurs: Ana Rodriguez-Hoyos, Jose Estrada-Jimenez, David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forne
Publié dans: IEEE Access, Numéro 6, 2018, Page(s) 28258-28277, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2018.2834858

Practical Evaluation of Protected ResidueNumber System Scalar Multiplication

Auteurs: Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
Publié dans: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, Page(s) Vol. 2019, No. 1, pp. 259–282, ISSN 2569-2925
Éditeur: IACR Transactions on Cryptographic Hardware and Embedded Systems.
DOI: 10.13154/tches.v2019.i1.259-282

MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

Auteurs: Kubilay Demir, Ferdaus Nayyer, Neeraj Suri
Publié dans: International Journal of Critical Infrastructure Protection, Numéro 25, 2019, Page(s) 84-101, ISSN 1874-5482
Éditeur: Elsevier BV
DOI: 10.1016/j.ijcip.2019.02.003

Securing the cloud-assisted smart grid

Auteurs: Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri
Publié dans: International Journal of Critical Infrastructure Protection, Numéro 23, 2018, Page(s) 100-111, ISSN 1874-5482
Éditeur: Elsevier BV
DOI: 10.1016/j.ijcip.2018.08.004

Infrastrutture critiche più sicure, grazie al progetto CIPSEC

Auteurs: Michaela Garbarino
Publié dans: 2016
Éditeur: CSI

Innovation: At the forefront of IoT security

Auteurs: WOS
Publié dans: 2016
Éditeur: WOS

Press release entitled “Innovation The CIPSEC project: UNIFIED SECURITY”.

Auteurs: WOS
Publié dans: 2016
Éditeur: WOS

“Secocard-Plattform zentrales Element in EU-Sicherheitsprojekt”

Auteurs: EMPELOR
Publié dans: PresseBox, 2016
Éditeur: EMPELOR

Launch of CIPSEC Project aiming to enhance Critical Infrastructure Protection

Auteurs: ATOS
Publié dans: 2016
Éditeur: ATOS

The Expertise Making Our Infrastructure Safe

Auteurs: Dr Paschalis Papagrigoriou
Publié dans: 2016
Éditeur: EMPELOR

ATOS coordina el desarrollo de los proyectos europeos ARIES y CIPSEC

Auteurs: ATOS
Publié dans: SIC magazine, n.122, 2016
Éditeur: ATOS

CIPSEC: A Commitment for the future of Critical Infrastructures

Auteurs: Antonio Álvarez and Joaquín Rodríguez
Publié dans: 2018
Éditeur: ERCIM News 115

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural

Auteurs: Apostolos P. Fournaris, Lidia Pocero Fraile and Odysseas Koufopavlou
Publié dans: Electronics, Volume 6, Numéro 3, Numéro Electronics Open Access Journal no. 3: 52, 2017
Éditeur: MDPI

Network Topology Effects on the Detectability of Crossfire Attacks

Auteurs: Christos Liaskos, Sotiris Ioannidis
Publié dans: IEEE Transactions on Information Forensics and Security, Numéro 13/7, 2018, Page(s) 1682-1695, ISSN 1556-6013
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2018.2799425

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures

Auteurs: Apostolos P. Fournaris, Charalambos Dimopoulos, Athanassios Moschos, Odysseas Koufopavlou
Publié dans: Microprocessors and Microsystems, Numéro 64, 2019, Page(s) 73-87, ISSN 0141-9331
Éditeur: Elsevier BV
DOI: 10.1016/j.micpro.2018.07.003

A Secure and Efficient File System Access Control Mechanism (FlexFS)

Auteurs: Jihane Najar and Vassilis Prevelakis
Publié dans: “International workshop on Information & Operational Technology (IT & OT) security systems IOSEC 2018,”, 2019
Éditeur: Springer

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

Auteurs: Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Publié dans: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Numéro 11398, 2019, Page(s) 27-38, ISBN 978-3-030-12084-9
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_3

Automated Measurements of Cross-Device Tracking

Auteurs: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis and Nicolas Kourtellis,
Publié dans: International Workshop on Information and Operational Technology Security Systems, 2018, Page(s) pp 73-80
Éditeur: 3rd CIPSEC workshop (IOSec 2018). Crete, Greece

Threat Modeling the Cloud: An Ontology Based Approach

Auteurs: Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Publié dans: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Numéro 11398, 2019, Page(s) 61-72, ISBN 978-3-030-12084-9
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_6

Full Content Search in Malware Collections

Auteurs: Andrei Mihalca and Ciprian Oprisa
Publié dans: International Workshop on Information and Operational Technology Security Systems, 2018, Page(s) pp 134-145
Éditeur: Springer

Challenges in Cybersecurity and Privacy - the European Research Landscape

Auteurs: Jorge Bernal Bernabe, University of Murcia, Spain Antonio Skarmeta, University of Murcia, Spain
Publié dans: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, ISBN 9788-770220880
Éditeur: River Publishers Series in Security and Digital Forensics

Incremental k -Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling

Auteurs: David Rebollo-Monedero ; César Hernández-Baigorri ; Jordi Forné ; Miguel Soriano
Publié dans: Numéro 18495393, 2018, Page(s) 60016 - 60044
Éditeur: IEEE
DOI: 10.1109/access.2018.2875949

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible