Livrables
This report will deal with user definitions, end-user needs, requirement analysis and deployment guidelines.
FORTIKA requirements and guidelines.v3Final Report
Use Cases definition and requirements document.v3Intermediate Report
Use Cases definition and requirements document.v4Final Report
FORTIKA requirements and guidelines.v1A report about system Requirements and Specifications for information security and cyber-security issues to be solved by respective novel technologies. Report findings will be initially provided on M12.
Interoperability Requirements including Compliance to International Standards.v1First version, report on existing technology for interoperability and communications requirements for the FORTIKA Ecosystem.
Interoperability Requirements including Compliance to International Standards.v2Final report on existing technology for interoperability and communications including recommendations for adoption for the FORTIKA Ecosystem.
Pilot plans including evaluation framework and training material for IT support personnel and IS managers.v2Final Report
Use Cases definition and requirements document.v2Intermediate Report
FORTIKA legal and policy requirements.v1A detailed report on FORTIKA legal and policy requirements.
Pilot plans including evaluation framework and training material for IT support personnel and IS managers.v1A first version of the evaluation plan will be delivered early (T3.2) in the project lifetime (M18). This plan will be a working document which will be finalised by M28
Cost benefit & Cost effectiveness analysis of FORTIKA prototype.v2Final Report
FORTIKA legal and policy requirements.v2Final Report
A set of standards stemming from the application of cybersecurity technologies on SMEs.v2Intermediate Report
A set of standards stemming from the application of cybersecurity technologies on SMEs.v3Final Report
Report on Dissemination Activities, Public Participation and Awareness.v1Report on Dissemination Activities, Public Participation and Awareness. The report will be yearly available. (M12, M24 & M36)
Report on Dissemination Activities, Public Participation and Awareness.v2Second Year Report
A set of standards stemming from the application of cybersecurity technologies on SMEs.v1A report on the corresponding standards stemming the application of cybersecurity technologies on SMEs (updated at M12, M24 and M36)
Ethical HelpDesk Reports.v1Annual Ethical HelpDesk Reports. An initial version will be available at M18
FORTIKA requirements and guidelines.v2Intermediate Report
SMEs Cyber Security threats digest and analysisAn analysis of current SMEs Cyber Security threats.
Final Plan for the use and Dissemination of foregroundA report on final Plan for the use and Dissemination of foreground.
Ethical HelpDesk Reports.v2Final Report
Cost benefit & Cost effectiveness analysis of FORTIKA prototype.v1A CBA/CEA analysis will be provided taking into consideration the feedback of the cyber-security trials. An initial version will be provided at M24
Report on Dissemination Activities, Public Participation and Awareness.v3Final Report
Report on FORTIKA Ecosystem Risk analysis, modeling and level assessmentA detailed report on the Ecosystem Risk analysis, modeling and level assessment
The final report will include details for the use case preparation and components and the results of the deployment installations.
Pilots Installations and Stakeholders training.v1The report will include details for the use case preparation and components and the initial results of the deployments.
Detailed report for the data management policy of the project
By Month 12 the dissemination and communication plans will be described in details. U
Publications
Auteurs:
K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak, Muttukrishnan Rajarajan
Publié dans:
IEEE Access, Numéro 7, 2019, Page(s) 133274-133289, ISSN 2169-3536
Éditeur:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2019.2941560
Auteurs:
Evangelos Markakis, Yannis Nikoloudakis, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, Anargyros Sideris, Nikolaos Zotos, Jan Antic, Ales Cernivec, Diana Fejzic, Joze Kulovic, Antonio Jara, Anastasios Drosou, Konstantinos Giannoutakis, Dimitrios Tzovaras
Publié dans:
IEEE Communications Magazine, Numéro 57/2, 2019, Page(s) 41-47, ISSN 0163-6804
Éditeur:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/mcom.2019.1800506
Auteurs:
Dimitra Markopoulou, Vagelis Papakonstantinou, Paul de Hert
Publié dans:
Computer Law & Security Review, Numéro 35/6, 2019, Page(s) 105336, ISSN 0267-3649
Éditeur:
Pergamon Press Ltd.
DOI:
10.1016/j.clsr.2019.06.007
Auteurs:
Kimon Karras, Evangelos Pallis, George Mastorakis, Yannis Nikoloudakis, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Evangelos Markakis
Publié dans:
Circuits, Systems, and Signal Processing, Numéro 39/2, 2020, Page(s) 1059-1070, ISSN 0278-081X
Éditeur:
Birkhaeuser
DOI:
10.1007/s00034-019-01226-7
Auteurs:
Faruk Catal, Nikolay Tcholtchev, Edzard Höfig, Andreas Hoffmann
Publié dans:
Procedia Computer Science, Numéro 151, 2019, Page(s) 279-286, ISSN 1877-0509
Éditeur:
Elsevier
DOI:
10.1016/j.procs.2019.04.040
Auteurs:
Nikolaos Tsinganos, Georgios Sakellariou, Panagiotis Fouliras, Ioannis Mavridis
Publié dans:
Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Page(s) 1-10, ISBN 9781450364485
Éditeur:
ACM Press
DOI:
10.1145/3230833.3233277
Auteurs:
Yacine Rebahi, Faruk Catal, Nikolay Tcholtchev, Laurenz Maedje, Omar Alkhateeb, Vinoth Kumar Elangovan, Dimitris Apostolakis
Publié dans:
2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020, Page(s) 104-111, ISBN 978-1-7281-7216-3
Éditeur:
IEEE
DOI:
10.1109/fmec49853.2020.9144926
Auteurs:
Eleni Ketzaki, Anastasios Drosou, Stavros Papadopoulos, Dimitrios Tzovaras
Publié dans:
2019 10th International Conference on Networks of the Future (NoF), 2019, Page(s) 17-24, ISBN 978-1-7281-4445-0
Éditeur:
IEEE
DOI:
10.1109/nof47743.2019.9015063
Auteurs:
Petros Toupas, Dimitra Chamou, Konstantinos M. Giannoutakis, Anastasios Drosou, Dimitrios Tzovaras
Publié dans:
2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), 2019, Page(s) 1253-1258, ISBN 978-1-7281-4550-1
Éditeur:
IEEE
DOI:
10.1109/icmla.2019.00206
Auteurs:
Ketzaki,Eleni; Toupas,Petros; Giannoutakis,Konstantinos M.; Drosou,Anastasios; Tzovaras,Dimitrios
Publié dans:
2020
Éditeur:
IEEE
Auteurs:
Dimitra Chamou, Petros Toupas, Eleni Ketzaki, Stavros Papadopoulos, Konstantinos M. Giannoutakis, Anastasios Drosou, Dimitrios Tzovaras
Publié dans:
2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Éditeur:
IEEE
DOI:
10.1109/camad.2019.8858475
Auteurs:
Jorge Bernal Bernabe, Antonio Skarmeta
Publié dans:
Challenges in Cybersecurity and Privacy - the European Research Landscape, Numéro 1, 2019, Page(s) 1-372, ISBN 9788770220873
Éditeur:
River Publisher
DOI:
10.13052/rp-9788770220873
Recherche de données OpenAIRE...
Une erreur s’est produite lors de la recherche de données OpenAIRE
Aucun résultat disponible