Deliverables Documents, reports (45) Requirements and reference architecture of the cyber-physical IDS (interim version) Requirements and reference architecture of the cyber-physical IDS (interim version) Taxonomies Taxonomies Impact assessment intermediate report Impact assessment intermediate report Design of the Distributed IDS for IACS (interim version) Design of the Distributed IDS for IACS (interim version) Innovation & IPR Plan Innovation & IPR Plan Requirements and reference architecture of the cyber-physical IDS (final version) Requirements and reference architecture of the cyber-physical IDS (final version) Exploitation management (report & post-project plan) and business model final report Exploitation management (report & post-project plan) and business model final report Final Report on the Distribution of the Community’s Contribution Final Report on the Distribution of the Community’s Contribution Final Activity Report Final Activity Report First Periodic Management Report First Periodic Management Report Integration Report (1st release) Integration Report (1st release) Integration Report (2nd release) Integration Report (2nd release) Integration Plan Integration Plan Impact assessment methodology and criteria Impact assessment methodology and criteria Design and development Plan Design and development Plan Societal Impact Interim Report Societal Impact Interim Report Final ATENA prototype validation and evaluation of validation results (Final report) Final ATENA prototype validation and evaluation of validation results (Final report) Impact assessment preliminary report Impact assessment preliminary report Design and development report of the 2nd release of components Design and development report of the 2nd release of components Requirements and reference architecture of DSS (final report) Requirements and reference architecture of DSS (final report) Patentability Report Patentability Report Design of the Distributed IDS for IACS (final version) Design of the Distributed IDS for IACS (final version) Exploitation management (report & re-viewed plan) and business model interim report Exploitation management (report & re-viewed plan) and business model interim report Validation system implementation and aggregation (Interim report) Validation system implementation and aggregation (Interim report) Impact assessment final report Impact assessment final report Validation Plan Validation Plan Training, dissemination and communication (final report) Training, dissemination and communication (final report) Societal Impact Final Report Societal Impact Final Report IACS-oriented security components IACS-oriented security components Exploitation plan Exploitation plan First Report on the Distribution of the Community’s Contribution First Report on the Distribution of the Community’s Contribution State of the art State of the art Second Periodic Activity Report Second Periodic Activity Report Standardization Final report Standardization Final report Requirements and reference architecture of DSS (interim report) Requirements and reference architecture of DSS (interim report) Second Periodic Report on the Distribution of the Community’s Contribution Second Periodic Report on the Distribution of the Community’s Contribution Design and development report of the 1st release of components Design and development report of the 1st release of components Standardization interim report Standardization interim report First Periodic Activity Report First Periodic Activity Report Security Defined Software (interim report) Security Defined Software (interim report) Final Management Report Final Management Report Second Periodic Management Report Second Periodic Management Report Quality Plan Quality Plan Security Defined Software (final report) Security Defined Software (final report) Training, dissemination and communication (interim report) Training, dissemination and communication (interim report) Websites, patent fillings, videos etc. (3) Training, dissemination and communication plan & Project Web Site Training, dissemination and communication plan & Project Web Site Training, dissemination and communication (final DEC) Training, dissemination and communication (final DEC) Training, dissemination and communication (interim DEC) Training, dissemination and communication (interim DEC) Demonstrators, pilots, prototypes (4) Final ATENA prototype validation and evaluation of validation results (Final DEM) Final ATENA prototype validation and evaluation of validation results (Final DEM) Validation system implementation and aggregation (Interim DEM) Validation system implementation and aggregation (Interim DEM) Integrated tool suite (1st release) Integrated tool suite (1st release) Integrated tool suite (2st release) Integrated tool suite (2st release) Publications Conference proceedings (26) Network composition for optimal disturbance rejection Author(s): Riccardo Santini, Andrea Gasparri, Fabio Pasqualetti, Stefano Panzieri Published in: 2016 American Control Conference (ACC), Issue 2016, 2016, Page(s) 3764-3769, ISBN 978-1-4673-8682-1 Publisher: IEEE DOI: 10.1109/ACC.2016.7525499 Improved Multi-Criteria Distribution Network Reconfiguration with Information Fusion Author(s): Dario Masucci, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri Published in: 19th International Conference on Information Fusion (FUSION 2016), Issue 2016, 2016, Page(s) 256-263, ISBN 978-0-9964-5274-8 Publisher: IEEE DOI: 10.5281/zenodo.2649901 Smart Behavioural Filter for SCADA Network Author(s): Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri Published in: Industrial Networks and Intelligent Systems. INISCOM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 188, Issue Volume 188, 2017, Page(s) 101-110, ISBN 978-3-319-52569-3 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-52569-3_9 Security implications of SCADA ICS virtualization: survey and future trends Author(s): Cruz, Tiago and Queiroz, Rui and Simoes, Paulo and Monteiro, Edmundo Published in: Proceedings of the 15th European Conference on Cyber Warfare and Security (Eccws 2016), 2016, Page(s) 74-83 Publisher: Academic Publishing International (API) DOI: 10.13140/RG.2.1.1064.2167 Attacking SCADA systems: A practical perspective Author(s): Luis Rosa, Tiago Cruz, Paulo Simoes, Edmundo Monteiro, Leonid Lev Published in: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017, Page(s) 741-746, ISBN 978-3-901882-89-0 Publisher: IEEE DOI: 10.23919/INM.2017.7987369 Active distribution grids: A MatLab-Simulink tool for energy performance analysis Author(s): E. Ciancamerla, M. Minichino, M.C. Falvo, L. Martirano Published in: 2016 AEIT International Annual Conference (AEIT), 2016, Page(s) 1-5, ISBN 978-8-8872-3730-6 Publisher: IEEE DOI: 10.23919/AEIT.2016.7892749 Building an NFV-based vRGW: Lessons learned Author(s): Jorge Proenca, Tiago Cruz, Paulo Simoes, Goncalo Gaspar, Bruno Parreira, Alexandre Laranjeira, Fernando Bastos Published in: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, Page(s) 653-658, ISBN 978-1-5090-6196-9 Publisher: IEEE DOI: 10.1109/CCNC.2017.7983208 On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks Author(s): Alessandro Di Giorgio, Alessandro Giuseppi, Francesco Liberati, Antonio Ornatelli, Antonio Rabezzano, Lorenzo Ricciardi Celsi Published in: 2017 25th Mediterranean Conference on Control and Automation (MED), 2017, Page(s) 986-992, ISBN 978-1-5090-4533-4 Publisher: IEEE DOI: 10.1109/MED.2017.7984247 Cyber attacks on SCADA of critical infrastructures by an hybrid testbed Author(s): E. Ciancamerla, B. Fresilli, M. Minichino, T. Patriarca Published in: 6th International Defense and Homeland Security Simulation Workshop, DHSS, Larnaca, Cyprus 26-28 September 201, 2016, Page(s) 15-24, ISBN 978-1-5108-3084-4 Publisher: Dime University of Genoa Controlled electricity distribution network black start with energy storage system support Author(s): Alessandro Di Giorgio, Alessandro Giuseppi, Francesco Liberati, Antonio Pietrabissa Published in: 2017 25th Mediterranean Conference on Control and Automation (MED), 2017, Page(s) 781-786, ISBN 978-1-5090-4533-4 Publisher: IEEE DOI: 10.1109/MED.2017.7984213 Security for mobile device assets: a survey Author(s): Lima, A. and Tiago Cruz and Sousa, B. and Simões P. Published in: Proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2017, Page(s) 227-236, ISBN 978-1-911218-26-5 Publisher: Academic Conferences and Publishing Limited Dynamic Risk Analyses Based on a Risk Taxonomy for Critical Infrastructures Author(s): Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann Published in: Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science, Issue vol. 10242, 2017, Page(s) 163-175, ISBN 978-3-319-71367-0 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-71368-7_14 An evolved security architecture for distributed Industrial Automation and Control Systems Author(s): Rosa, L. and Proença, J.D.G. and Henriques, J.P. and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Monteiro, E. Published in: Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017), 2017, Page(s) 380-390, ISBN 978-1-911218-43-2 Publisher: Academic Conferences and Publishing Limited Machine Learning for Reliable Network Attack Detection in SCADA Systems Author(s): Lopez Perez, Rocio; Adamsky, Florian; Soua, Ridha; Engel, Thomas Published in: Proceedings The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18). (2018)., Issue 2018 IEEE Trustcom/BigDataSE, 2018, Page(s) 633-638, ISBN 978-1-5386-4387-7 Publisher: IEEE A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning Author(s): Martina Panfili, Alessandro Giuseppi, Andrea Fiaschetti, Homoud B. Al-Jibreen, Antonio Pietrabissa, Franchisco Delli Priscoli Published in: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 460-465, ISBN 978-1-5386-7890-9 Publisher: IEEE DOI: 10.1109/MED.2018.8442695 Distributed Wardrop Load Balancing in Multi-MTU SCADA Systems Author(s): Vincenzo Suraci, Lorenzo Ricciardi Celsi, Alessandro Giuseppi, Gioacchino Manfredi, Alessandro Di Giorgio Published in: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 1-9, ISBN 978-1-5386-7890-9 Publisher: IEEE DOI: 10.1109/med.2018.8442485 Risk Adverse Virtual Power Plant Control in Unsecure Power Systems Author(s): Alessandro Giuseppi, Roberto Germana, Alessandro Di Giorgio Published in: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 1-9, ISBN 978-1-5386-7890-9 Publisher: IEEE DOI: 10.1109/med.2018.8442768 Machine Learning for Reliable Network Attack Detection in SCADA Systems Author(s): Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel Published in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 633-638, ISBN 978-1-5386-4388-4 Publisher: IEEE DOI: 10.1109/trustcom/bigdatase.2018.00094 Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems Author(s): Lopez Perez, Rocio; Adamsky, Florian; Soua, Ridha; Engel, Thomas Published in: EAI Endorsed Transactions on Security and Safety. European Alliance for Innovation (EAI) (2019)., Issue 1, 2019 Publisher: European Alliance for Innovation (EAI) DOI: 10.4108/eai.25-1-2019.159348 Detecting Integrity Attacks in IoT-based Cyber Physical Systems: a Case Study on Hydra Testbed Author(s): Federica Battisti, Giuseppe Bernieri, Marco Carli, Michela Lopardo, Federica Pascucci Published in: 2018 Global Internet of Things Summit (GIoTS), 2018, Page(s) 1-6, ISBN 978-1-5386-6451-3 Publisher: IEEE DOI: 10.1109/giots.2018.8534437 Modeling and simulation of Critical Infrastructures Interdependencies for risk mitigation Author(s): Iassinovski, Serguei; Minichino, Michele; Ciancamerla, Ester Published in: Congress on Intelligent Systems and Information Technologies (IS&IT'17), Issue 1, 2019 Publisher: Physmathlit DOI: 10.5281/zenodo.3067463 Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection Author(s): Rinaldi, Giulia; Adamsky, Florian; Soua, Ridha; Baiocchi, Andrea; Engel, Thomas Published in: 10th International Conference on Networks of the Future (NoF). (2019)., Issue 5, 2019 Publisher: authors' pre-print, to be published Heterogeneous and distributed simulation models for Critical Infrastructures Interdependencies analysis and risk mitigation Author(s): Iassinovski, Serguei; Ciancamerla, Ester; Fresilli, Benedetto; Lavalle, Luisa; Patriarca, Tatiana; Tofani, Alberto Published in: Congress on Intelligent Systems and Information Technologies (IS&IT'18), Issue 1, 2019 Publisher: Physmathlit DOI: 10.5281/zenodo.3055109 Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective Author(s): Riccardo Colelli, Stefano Panzieri, Federica Pascucci Published in: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), 2018, Page(s) 1171-1174, ISBN 978-1-5386-7108-5 Publisher: IEEE DOI: 10.1109/ETFA.2018.8502495 Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms Author(s): Alessandro Giuseppi, Andrea Tortorelli, Roberto Germana, Francesco Liberati, Andrea Fiaschetti Published in: 2019 27th Mediterranean Conference on Control and Automation (MED), 2019, Page(s) 50-56, ISBN 978-1-7281-2803-0 Publisher: IEEE DOI: 10.1109/MED.2019.8798506 A Framework for Improved Home Network Security (pre-print) Author(s): A. Craveiro, A. Oliveira, J. Proença, T. Cruz, P. Simões Published in: 18th European Conference on Cyber Warfare and Security (ECCWS 2019), 2019 Publisher: not yet published Non-peer reviewed articles (1) Leveraging virtualization techniques for improving SCADA ICS Security and Reliability Author(s): T Cruz, R Queiroz, J Proença, P Simões, E Monteiro Published in: Journal of Information Warfare, Issue Volume 15, Issue 3, 2016, Page(s) 81-100, ISSN 1445-3312 Publisher: Teamlink Australia Peer reviewed articles (11) Towards energy efficiency of interdependent urban networks Author(s): Giuseppe Alonge, Ester Ciancamerla, Alberto Mastrilli, Michele Minichino, Angelo Nicotra, Marco Ranno, Maurizio Reali, Pasquale Regina Published in: International Journal of Simulation and Process Modelling, Issue 11/6, 2016, Page(s) 529, ISSN 1740-2123 Publisher: Inderscience Publishers DOI: 10.1504/ijspm.2016.082923 Virtualizing Programmable Logic Controllers: Toward a Convergent Approach Author(s): Tiago Cruz, Paulo Simoes, Edmundo Monteiro Published in: IEEE Embedded Systems Letters, Issue 8/4, 2016, Page(s) 69-72, ISSN 1943-0663 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/les.2016.2608418 Robust protection scheme against cyber-physical attacks in power systems Author(s): Alessandro Di Giorgio, Antonio Pietrabissa, Francesco DelliPriscoli, Alberto Isidori Published in: IET Control Theory & Applications, Issue 12/13, 2018, Page(s) 1792-1801, ISSN 1751-8644 Publisher: Institution of Engineering and Technology DOI: 10.1049/iet-cta.2017.0725 Integrated protection of industrial control systems from cyber-attacks: the ATENA approach Author(s): F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa, R. Soua Published in: International Journal of Critical Infrastructure Protection, Issue 21, 2018, Page(s) 72-82, ISSN 1874-5482 Publisher: Elsevier BV DOI: 10.1016/j.ijcip.2018.04.004 Economic Model Predictive and Feedback Control of a Smart Grid Prosumer Node Author(s): Francesco Liberati, Alessandro Di Giorgio Published in: Energies, Issue 11/1, 2018, Page(s) 48, ISSN 1996-1073 Publisher: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/en11010048 A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation Author(s): Luis Rosa, Miguel Freitas, Sergey Mazo, Edmundo Monteiro, Tiago Cruz, Paulo Simoes Published in: IEEE Access, Issue 7, 2019, Page(s) 42156-42168, ISSN 2169-3536 Publisher: Institute of Electrical and Electronics Engineers Inc. DOI: 10.1109/access.2019.2906926 From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment Author(s): Chiara Foglietta, Dario Masucci, Cosimo Palazzo, Riccardo Santini, Stefano Panzieri, Luis Rosa, Tiago Cruz, Leonid Lev Published in: IEEE Systems Journal, Issue 13/1, 2019, Page(s) 424-435, ISSN 1932-8184 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/JSYST.2018.2824252 A stealth monitoring mechanism for cyber-physical systems Author(s): Vitor Graveto, Luís Rosa, Tiago Cruz, Paulo Simões Published in: International Journal of Critical Infrastructure Protection, Issue 24, 2019, Page(s) 126-143, ISSN 1874-5482 Publisher: Elsevier BV DOI: 10.1016/j.ijcip.2018.10.006 Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence Author(s): Konstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro, Paulo Simoes Published in: IEEE Access, Issue 6, 2018, Page(s) 59705-59727, ISSN 2169-3536 Publisher: Institute of Electrical and Electronics Engineers Inc. DOI: 10.1109/access.2018.2875068 Smart Behavioural Filter for Industrial Internet of Things Author(s): Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri Published in: Mobile Networks and Applications, Issue 23/4, 2018, Page(s) 809-816, ISSN 1383-469X Publisher: Baltzer Science Publishers B.V. DOI: 10.1007/s11036-017-0882-1 On the Use of Ontology Data for Protecting Critical Infrastructures (pre-print) Author(s): Henriques, J.P., Caldeira F., Cruz, T., and Simões, P. Published in: Journal of Information Warfare, Issue "Vol. 17, #4", 2019, Page(s) 38-55, ISSN 1445-3312 Publisher: Journal of Information Warfare Book chapters (2) SDN-Enabled Virtual Data Diode Author(s): Miguel Borges de Freitas, Luis Rosa, Tiago Cruz, Paulo Simões Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 102-118, ISBN 978-3-030-12785-5 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-12786-2_7 Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process Author(s): Ivo Frazão, Pedro Henriques Abreu, Tiago Cruz, Hélder Araújo, Paulo Simões Published in: Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers, Issue 11260, 2019, Page(s) 230-235, ISBN 978-3-030-05848-7 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-05849-4_19 Thesis dissertations (1) Network Softwarization for IACS Security Applications Author(s): Freitas, Miguel Rosado Borges de Published in: Issue 1, 2018 Publisher: UNIVERSIDADE DE COIMBRA Other (1) Cyber-security Modbus ICS Dataset Author(s): I. Frazão, P. Abreu, T. Cruz, H Araújo, P. Simões Published in: 2019 Publisher: IEEE DOI: 10.21227/pjff-1a03 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available