Skip to main content
CORDIS - Forschungsergebnisse der EU
CORDIS

SYSTEMIC ANALYZER IN NETWORK THREATS

Leistungen

D3.2 Cyber-security Empirical Stochastic Econometric Modelling of Efficient Production & Cost-Effective Investment

This deliverable will contain business models and guidelines for regulatory schemes about efficiency in the production of cyber-security services and cost-effectiveness of cyber-risk management investments by potential victims of cyber-attacks.

D4.2 Cyber-security and Cyber-crime Market & Revenue Analysis

Cyber-security and cyber-crime market and revenue analysis.

D4.4 Report on Cost-Benefit Analysis of Cyber-security Solutions, Products and Models

A report on cost-benefit analysis of cyber-security solutions, products and models.

D3.5 Analysis of Legal and Illegal Vulnerability Markets and Specification of the Data Acquisition Mechanisms

This deliverable will specify the intelligent data collection mechanisms and set the specification for the tools.

D3.8 Final Validation Report

These deliverables will summarise the validation assessment of the developed methodologies and practices.

D3.7 Interim Validation Report

These deliverables will summarise the validation assessment of the developed methodologies and practices.

D2.6 Metrics for Measuring and Assessing Privacy of Network Communication

This deliverable will consist of requirements analysis for privacy metrics, analysis of existing metrics for measuring privacy, especially with respect to privacy-friendly communication techniques and if required, of proposal and evaluation of an own metric for measuring privacy based on the defined requirements.

D2.2 Final Report on Cyber-security Indicators & Open Source Intelligence Methodologies

This deliverable will be a final report with recommendations and methodologies on cyber-security indicators and open source intelligence.

D4.1 Stakeholder and Ecosystem Market Analysis

A report with a clear and comprehensive cyber-crime and cyber-security ecosystem view.

D3.6 Model for Correlating the Price of Illicit Goods and Actions with Security Methodologies and Legal Mechanisms

This deliverable will analyse the prices of illicit goods and illegal actions in order to discover correlations with security methodologies, taking into account legislation issues.

D4.5 Recommendations on Investment, Risk Management and Cyber-security Insurance

A set of recommendations on investment, risk management, and cyber-security insurance.

D5.2 Semi-Automated Traffic Analysis of Encrypted Network Traffic

This deliverable will describe a semi-automated tool to assess the degree of protection offered by privacy-friendly communication techniques (especially anonymisation methods based on onion routing) and a proposal how to improve the level of protection offered by state-of-the-art privacy-friendly communication techniques while minimising communication overhead.

D2.4 Final Report on the Comparative Analysis of Cyber-crime Victims

This deliverable will be a final report on the comparative analysis of cyber-crime victims by region, country including recommendations and forecasting.

D5.1 Requirements Specification & Architectural Design of The SAINT Tool Framework

Technical requirements related to system scalability, efficiency, reliability and security. End-users requirements related to end-user usability, usefulness, acceptance and societal compliance.

D2.5 Comparative Analysis of Incentivised, Cooperative & Regulatory Processes in Cyber-security

This deliverable of concerns a comparative analysis draft regarding the effectiveness of the different roles and actions performed by different organizations.

D6.2 Stakeholder and Consumer Requirements Survey Report

This deliverable is a report on the findings from stakeholder & consumer surveys.

D4.3 Business Modelling Report

A comparative analysis of various innovative business models to fight against cyber-crime from a systemic perspective.

D2.7 Cyber-security Standards, Benchmarking & Best Practices Overview

This deliverable will provide a comparative overview of major cyber-security standards, benchmarking and best practices.

D3.1 Cyber-security Empirical Stochastic Econometric Modelling of Information Sharing Policies & Behavioural Attitude

This deliverable will contain business models and guidelines for regulatory schemes about cyber-security information-sharing policies and cyber-security behavioural features of human attitude.

D6.3 SAINT – Website and Back-End Management Platform for Information Sharing

Web based platform for administration and management. Web information portal for the public and registered users. Social Media Accounts sites, as channels of communication and interaction with the general public.

Veröffentlichungen

The Finnish Regulator FICORA. A Cybersecurity Reference Model

Autoren: Latif Ladid, Jart Armin
Veröffentlicht in: International Communications Projects - InterComms, Ausgabe Ausgabe 30 - May 2018, 2018
Herausgeber: International Communications (InterComms)

Systemic Analyser in Network Threats - SAINT

Autoren: Latif Ladid
Veröffentlicht in: International Communications Projects - InterComms, Ausgabe Ausgabe 29 - September 2017, 2017
Herausgeber: International Communications (InterComms)

Probing Digital Black Markets: A New Approach to Cybersecurity

Autoren: J.Bothos, A.Zalonis, V.Vlachos, Y.Stamatiou, A.Madhja, S.Thomopoulos, S.Nikoletseas
Veröffentlicht in: 4th International Conference on Operational Planning, Technological Innovations and Mathematical Applications (OPTIMA), Ausgabe May 2017, 2017, Seite(n) 222-227
Herausgeber: Hellenic Military Academy

Analysis of Fingerprinting Techniques for Tor Hidden Services

Autoren: Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel
Veröffentlicht in: Proceedings of the 2017 on Workshop on Privacy in the Electronic Society - WPES '17, Ausgabe October 2017, 2017, Seite(n) 165-175, ISBN 9781-450351751
Herausgeber: ACM Press
DOI: 10.1145/3139550.3139564

Searching for crime on the web: Legal and Ethical perspectives

Autoren: Dimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas, Georgios Germanos
Veröffentlicht in: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018, Seite(n) 1-8, ISBN 978-1-5386-4683-0
Herausgeber: IEEE
DOI: 10.1109/cybersecpods.2018.8560689

On Privacy Notions in Anonymous Communication

Autoren: Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard.Jorswieck, Thorsten Strufe
Veröffentlicht in: Proceedings of the Privacy Enhancing Technologies Symposium 2019, Ausgabe Dec 2018, 2019
Herausgeber: ArviV

Cost benefit analysis of cyber security products and solutions

Autoren: Theodoros Rokkas, Ioannis Neokosmidis
Veröffentlicht in: CTTE-FITCE 2019, Ausgabe UNDER REVIEW, 2019
Herausgeber: CTTE-FITCE

Sensing Cybercrime with Social Network Analysis and OSINT

Autoren: Pantelis Tzamalis, Vasileios Vlachos, Iwannis Stamatiou and Sotiris Nikoletseas
Veröffentlicht in: Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS 2019), Ausgabe UNDER REVIEW, 2019
Herausgeber: DCOSS 2019

Correlation and Dependence Analysis on Cyber-threat Alerts

Autoren: John M.A. Bothos, Konstantinos Georgios Thanos, Dimitris M. Kyriazanos, George Vardoulias, Andreas Zalonis, Eirini Papadopoulou, Yannis Corovesis, Stelios C.A. Thomopoulos
Veröffentlicht in: ICT Discoveries - Special Edition in Artificial Intelligence AI, Ausgabe Ausgabe 1 - March 2018, 2018, ISSN 2616-8375
Herausgeber: International Telecommunication Union
DOI: 10.5281/zenodo.1308066

Effect of Information Sharing on Productivity and Economic Efficiency of Firms

Autoren: John M.A. Bothos, Dimitrios M. Kyriazanos, Stelios C.A. Thomopoulos
Veröffentlicht in: ITU Journal: ICT Discoveries, Ausgabe UNDER REVIEW, 2019, ISSN 2616-8375
Herausgeber: ITU

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative

Autoren: Stefan Schiffner, Bettina Berendt, Triin Siil, Martin Degeling, Robert Riemann, Florian Schaub, Kim Wuyts, Massimo Attoresi, Seda Gürses, Achim Klabunde, Jules Polonetsky, Norman Sadeh, Gabriela Zanfir-Fortuna
Veröffentlicht in: Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers, Ausgabe 11079, 2018, Seite(n) 24-42, ISBN 978-3-030-02546-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-02547-2_2

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor