Risultati finali Documents, reports (31) Verification of SDN-Controller and Secure Router Design R3 Report on formal model of SDN routers and their flow rules, incremental verification methods to obtain an efficient tool for checking the correctness of distributed flow rules. Deliverable update: month M40 (final). SerIoT Architecture & Specifications R2 SerIoT End-to-end Architecture & Specifications, detailed report on dynamic SDN-based system architecture, including the SDN-Controller, secure SerIoT router, Analytics and Visual Analytics components and their interactions. Deliverable update: month M24. IoT Security threats digest and analysis Detailed report, including market analysis in respect future challenges of IoT applications & ecosystems. SerIoT requirements and guidelines R2 Technical report containing the user & system requirements of the IoT ecosystem that SerIoT envisions (based on JIRA & Volere methodology). Deliverable update: month M24. CBA/CEA analysis of SerIoT solutions Detailed report analysing in details the cost-related benefits stemming from individual SerIoT components and the framework as a whole. The report will include also end-users findings from the trials performed with end-users involvement such as the OASA large-scale trials. Survey on existing IoT security and privacy standards and identification of gaps and priorities and strategy to support the different standardization bodies Reporting the targeted contributions to standards by SerIoT. SerIoT requirements and guidelines Technical report containing the user & system requirements of the IoT ecosystem that SerIoT envisions (based on JIRA & Volere methodology). This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12, an updated version will follow in M24, while the final on shall be expected by M30. Analysis of IoT devices & recommendations for the ad-hoc SerIoT honeypots developments R2 Detailed report analysing trends in dynamic honeypots & recommendations for the IoT ecosystem. Deliverable update: month M34. Analysis of IoT devices & recommendations for the ad-hoc SerIoT honeypots developments Detailed report analysing trends in dynamic honeypots & recommendations for the IoT ecosystem. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M24 while an updated version will follow in M30. Architectural Formal Modelling, Analysis & Synthesis R3 Detailed report on formalization of SerIoT architectural models, including behavioural models, security policy architectures for SerIoT use cases, and global security and safety properties. In addition, the report includes a methodology and proposed tool chain for automated security verification and for synthesizing run-time monitors from security policy architectures. Deliverable update: month M40 (final). Plans for the dissemination and communication of project results R3 Deliverable reporting on the plans & the dissemination activities of SerIoT including dissemination & communication material. Deliverable update: month M24. Use Cases definition and requirements document Detailed report using formal description through UML for the use cases (stakeholders & actors, requirements, etc.). This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M6, two updates will follow in M12 and M24, respectivelly, while the final on shall be expected by M30. Verification of SDN-Controller and Secure Router Design Report on formal model of SDN routers and their flow rules, incremental verification methods to obtain an efficient tool for checking the correctness of distributed flow rules. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12, an updated version will follow in M24, while the final on shall be expected by M36. In particular, the final version will also include an evaluation report of the proposed security and safety verification tools applied to SerIoT use cases. SerIoT Pilots Installations & Lessons Learned Report providing in details the IoT platform & network configuration in each trial foreseen in SerIoT. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M32 while an updated version will follow in M38. Pilots Installation Methodology, Evaluation Plans & Assessment Framework R2 The 1st version of this deliverable (M18) will include the methodology, evaluation and assessment plans, while the 2nd one (M26) will include any missing information stemming from the introduction of third parties scenarios, technologies to be benchmarked with SerIoT IoT ecosystem. Deliverable update: month M26. Contributions to the standardization bodies, consortiums and Alliances R2 This report will include the mandates delivery to respective bodies. Deliverable update: month 40. SerIoT Architecture & Specifications SerIoT End-to-end Architecture & Specifications, detailed report on dynamic SDN-based system architecture, including the SDN-Controller, secure SerIoT router, Analytics and Visual Analytics components and their interactions. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12 while an updated version will follow in M24. Plans for the dissemination and communication of project results R4 Deliverable reporting on the plans & the dissemination activities of SerIoT including dissemination & communication material. Deliverable update: month M40 (final). Verification of SDN-Controller and Secure Router Design R2 Report on formal model of SDN routers and their flow rules, incremental verification methods to obtain an efficient tool for checking the correctness of distributed flow rules. Deliverable update: month M24. Plans for the dissemination and communication of project results Deliverable reporting on the plans & the dissemination activities of SerIoT including dissemination & communication material. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M6, two updates will follow in M12 and M24, respectivelly, while the final on shall be expected by M36. SerIoT Pilots Installations & Lessons Learned R2 Report providing in details the IoT platform & network configuration in each trial foreseen in SerIoT. Deliverable update: month M38. Use Cases definition and requirements document R4 Detailed report using formal description through UML for the use cases (stakeholders & actors, requirements, etc.). Deliverable update: month 34 (final). Architectural Formal Modelling, Analysis & Synthesis R2 Detailed report on formalization of SerIoT architectural models, including behavioural models, security policy architectures for SerIoT use cases, and global security and safety properties. In addition, the report includes a methodology and proposed tool chain for automated security verification and for synthesizing run-time monitors from security policy architectures. Deliverable update: month M24. Project web site Reporting on the Web site's layout & structure. Final Security assessment validated by the end users Assessment report against SerIoT IoT requirements & end-users feedback. Pilots Installation Methodology, Evaluation Plans & Assessment Framework The 1st version of this deliverable (M18) will include the methodology, evaluation and assessment plans, while the 2nd one (M26) will include any missing information stemming from the introduction of third parties scenarios, technologies to be benchmarked with SerIoT IoT ecosystem. SerIoT system evaluation & assessment Impact assessment, end-users experience including industrial stakeholders feedback, performance evaluation of SerIoT IoT ecosystem. Architectural Formal Modelling, Analysis & Synthesis Detailed report on formalization of SerIoT architectural models, including behavioural models, security policy architectures for SerIoT use cases, and global security and safety properties. In addition, the report includes a methodology and proposed tool chain for automated security verification and for synthesizing run-time monitors from security policy architectures. The final M36 version includes an evaluation of the proposed security and safety verification tool chain applied to SerIoT use cases. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12 while an updated version will follow in M24. Use Cases definition and requirements document R3 Detailed report using formal description through UML for the use cases (stakeholders & actors, requirements, etc.). Deliverable update: month M24. Contributions to the standardization bodies, consortiums and Alliances This report will include the mandates delivery to respective bodies. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M24 while an updated version will follow in M36. SerIoT requirements and guidelines R3 Technical report containing the user & system requirements of the IoT ecosystem that SerIoT envisions (based on JIRA & Volere methodology). Deliverable update: month 34 (final). Demonstrators, pilots, prototypes (5) Application-driven virtual testing environment The 1st version (M18) provides information of the overall testing environment. The final version (M26) extends the 1st version by including the outcomes and the results of the period in-between. Cross-layer applications to support SerIoT application scenarios Applications & HMIs for supporting the SerIoT use cases will be described hereing (e.g. OASA, DT; T-Sys., GRUVENTA, etc. for the Final version) This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while the final version will follow in M30. Application-driven virtual testing environment R2 The 1st version (M18) provides information of the overall testing environment. The final version (M26) extends the 1st version by including the outcomes and the results of the period in-between. Deliverable update: month M26 (final). Secure Demonstrator service Deliverable reporting a demonstrator with a robotic control, as proof of concept regarding the use case about a secure connectivity service that includes a public key infrastructure base (see Section 1.3.3.) Cross-layer applications to support SerIoT application scenarios R2 Applications & HMIs for supporting the SerIoT use cases will be described hereing (e.g. OASA, DT/T-Sys., GRUVENTA, etc. for the Final version). Deliverable update: month M34 (final). Other (28) Design-driven Security Features, Monitors and Validators Technical report including the s/w components developed to support design-driven security. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M24 while an updated version will follow in M30. Energy Consumption Monitoring & Reporting Report detailing the design and implementation of Energy Consumption Monitoring and Reporting System, and Code that implements this system, together with an evaluation of the energy gains that can be achieved. Automated penetration testing R3 Report on parameterizable models of the SerIoT IoT platform; Software tool for the automated generation of abstract test cases; methodology for deployment of the tool; implementation of adaptors that bridge the levels of abstraction between the model and the implementation; evaluation criteria for assessing the effectiveness and efficiency of the tool. Deliverable update: month M40 (final). Cross-layer anomaly detection framework Technical report describing the novel algorithms developed in details. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M30. IoT Decision Support Toolkit Technical report detailing the (visual) analytics techniques of SerIoT to support self-decision & decision making of IoT operators at mid-terms. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M26 while an updated version will follow in M32. Extension of the SDN-Controller This deliverable will include a generic design and architecture of the privacy framework extension for the SDN-Controller, as well as a software prototype implementation based on the Open-Source ONOS controller, together with the corresponding documentation. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M29. Design-driven Security Features, Monitors and Validators R2 Technical report including the s/w components developed to support design-driven security. Deliverable update: month M34. Analysis of the signal in space R2 This deliverable will first present an overview of the privacy threats in IoT based on signal processing and statistical analysis of the traffic. Then it will describe the new countermeasures developed in the project (design and implementation). Deliverable update: month M34. Automated penetration testing R2 Report on parameterizable models of the SerIoT IoT platform; Software tool for the automated generation of abstract test cases; methodology for deployment of the tool; implementation of adaptors that bridge the levels of abstraction between the model and the implementation; evaluation criteria for assessing the effectiveness and efficiency of the tool. Deliverable update: month M24. Unsupervised IoT-ready engine for threat mitigation Technical report including the unsupervised algorithms developed to support intelligence escalation strategies of the IoT network ecosystem. SerIoT SDN Security Framework R2 Technical Report describing the SDN security framework and specifying extensions to existing SDN controller. Also includes software that implements the extension to the Open-Source SDN controller ONOS. Deliverable update: month M26. SerIoT Advanced Cognitive Packets Description of Cognitive Packet based algorithms for dynamic traffic tracing and provenance certification for SerIoT, including the specification of interfaces in the SerIoT network. Also includes software detailing the implementation of SerIoT with updatable Openflow and CPs. SerIoT malicious evidence collection infrastructure Technical report detailing the datasets collected in SerIoT. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M22. SerIoT SDN Security Framework Technical Report describing the SDN security framework and specifying extensions to existing SDN controller. Also includes software that implements the extension to the Open-Source SDN controller ONOS. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M26. SerIoT multi-layer dataset access through WAPI interfaces R2 Technical report describing interoperability & API interfaces for supporting new experiments upon SerIoT architecture. Deliverable update: month M37. SDN-enabled Secure Router R2 Technical Report describing the IoT router developed in SerIoT. Deliverable update: month M26. SDN-enabled Secure Router Technical Report describing the IoT router developed in SerIoT. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M26. SerIoT multi-layer dataset access through WAPI interfaces Technical report describing interoperability & API interfaces for supporting new experiments upon SerIoT architecture. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M33. Automated penetration testing Report on parameterizable models of the SerIoT IoT platform; Software tool for the automated generation of abstract test cases; methodology for deployment of the tool; implementation of adaptors that bridge the levels of abstraction between the model and the implementation; evaluation criteria for assessing the effectiveness and efficiency of the tool. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12, an updated version will follow in M24, while the final on shall be expected by M36. In particular, the final version also contains an evaluation report on automated penetration testing applied to SerIoT use cases. Description of the authentication and identification solutions for IoT This deliverable will describe the new protocols for authentication/identification solutions that will be developed in the SerIoT project. Apart from the basic identification/authentication solutions (e.g., certificates, biometrics), the deliverable will investigate also the use of intrinsic features at the physical layer, in order to identify even IoT components with limited processing power. The deliverable will include a prototype implementation to be integrated into the SerIoT framework. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M30. Description of the Policy Based Framework R2 This deliverable will describe the architecture of the policy-based framework (PBF) and it will deliver a prototype implementation based on the existing iCore Security Toolkit developed by JRC. Deliverable update: month M24. Description of the authentication and identification solutions for IoT R2 This deliverable will describe the new protocols for authentication/identification solutions that will be developed in the SerIoT project. Apart from the basic identification/authentication solutions (e.g., certificates, biometrics), the deliverable will investigate also the use of intrinsic features at the physical layer, in order to identify even IoT components with limited processing power. The deliverable will include a prototype implementation to be integrated into the SerIoT framework. Deliverable update: month M34. Cross-layer anomaly detection framework R2 Technical report describing the novel algorithms developed in details. Deliverable update: month M34. Description of the Policy Based Framework This deliverable will describe the architecture of the policy-based framework (PBF) and it will deliver a prototype implementation based on the existing iCore Security Toolkit developed by JRC. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12 while an updated version will follow in M24. Extension of the SDN-Controller R2 This deliverable will include a generic design and architecture of the privacy framework extension for the SDN-Controller, as well as a software prototype implementation based on the Open-Source ONOS controller, together with the corresponding documentation. Deliverable update: month M34. IoT Decision Support Toolkit R2 Technical report detailing the (visual) analytics techniques of SerIoT to support self-decision & decision making of IoT operators at mid-terms. Deliverable update: month M36. SerIoT SDN network design for IoT Technical Report describing the SerIoT SDN design approach & automated mechanisms. Analysis of the signal in space This deliverable will first present an overview of the privacy threats in IoT based on signal processing and statistical analysis of the traffic. Then it will describe the new countermeasures developed in the project (design and implementation). This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M30. Open Research Data Pilot (3) Data Management Plan Report describing the project’s data management plans. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M6, an updated version will follow in M24, while the final one will be delivered by the end of the project in M36. Data Management Plan R3 Report describing the project’s data management plans. This deliverable aims to be periodically updated throughout the project's lifetime. Deliverable update: month 40 (final). Data Management Plan R2 Report describing the project’s data management plans. This deliverable aims to be periodically updated throughout the project's lifetime. Deliverable update: month 24. Pubblicazioni Conference proceedings (15) Synchrosqueezing Transform Based Methodology for Radiometric Identification Autori: Gianmarco Baldini, Gary Steri, Raimondo Giuliani Pubblicato in: 2018 41st International Conference on Telecommunications and Signal Processing (TSP), 2018, Page(s) 1-5, ISBN 978-1-5386-4695-3 Editore: IEEE DOI: 10.1109/tsp.2018.8441378 Security for Internet of Things: The SerIoT Project Autori: Erol Gelenbe, Joanna Domanska, Tadeusz Czachorski, Anastasis Drosou, Dimitrios Tzovaras Pubblicato in: 2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018, Page(s) 1-5, ISBN 978-1-5386-3779-1 Editore: IEEE DOI: 10.1109/isncc.2018.8531004 Cybersecurity Risk Analysis in Automated Vehicle Architecture Autori: L.Gonzalez, M.Vaca, R.Lattarulo, I.Calvo, J.Perez, A.Ruiz Pubblicato in: 2018 Jornadas de Automática (Automation Days, 6-7 September 2018), Badajoz, Spain., 2018 Editore: Actas de las XXXIX Jornadas de Automática, Badajoz, 5-7 de Septiembre de 2018 European Cybersecurity Research and the SerIoT Project Autori: Joanna Domańska, Mateusz Nowak, Sawomir Nowak, Tadeusz Czachórski Pubblicato in: Computer and Information Sciences - 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 20-21, 2018, Proceedings, Issue 935, 2018, Page(s) 166-173, ISBN 978-3-030-00839-0 Editore: Springer International Publishing DOI: 10.1007/978-3-030-00840-6_19 Maniobra Cooperativa STOP & GO para Vehículos Automatizados Basada en Entorno Virtual y Real Autori: L.Gonzalez, M.Vaca, R.Lattarulo, I.Calvo, J.Perez, A.Ruiz Pubblicato in: 2018 Jornadas de Automática (Automation Days, 6-7 September 2018), Badajoz, Spain., 2018 Editore: Actas de las XXXIX Jornadas de Automática, Badajoz, 5-7 de Septiembre de 2018 Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification Autori: Gianmarco Baldini, Raimondo Giuliani, Claudio Gentile, Gary Steri Pubblicato in: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018, Page(s) 1-5, ISBN 978-1-5386-3662-6 Editore: IEEE DOI: 10.1109/ntms.2018.8328703 New vulnerabilities in 4G and 5G cellular access network protocols - exposing device capabilities Autori: Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert Pubblicato in: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19, 2019, Page(s) 221-231, ISBN 9781-450367264 Editore: ACM Press DOI: 10.1145/3317549.3319728 Cognitive Packet Networks for the Secure Internet of Things Autori: Mateusz Nowak, Slawomir Nowak, Joanna Domanska, Tadeusz Czachorski Pubblicato in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-4, ISBN 978-1-7281-2171-0 Editore: IEEE DOI: 10.1109/giots.2019.8766380 Cognitive Routing for Improvement of IoT Security Autori: Mateusz Nowak, Sławomir Nowak, Joanna Domanska Pubblicato in: 2019 IEEE International Conference on Fog Computing, 2019 Editore: IEEE An Architectural Framework Proposal for IoT Driven Agriculture Autori: Godlove Suila Kuaban, Piotr Czekalski, Ernest L. Molua, Krzysztof Grochla Pubblicato in: Computer Networks - 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25–27, 2019, Proceedings, Issue 1039, 2019, Page(s) 18-33, ISBN 978-3-030-21951-2 Editore: Springer International Publishing DOI: 10.1007/978-3-030-21952-9_2 An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN Autori: Gianmarco Baldini, Raimondo Giuliani Pubblicato in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0 Editore: IEEE DOI: 10.1109/giots.2019.8766385 An assessment of the impact of IQ imbalances on the physical layer authentication of IoT wireless devices Autori: Gianmarco Baldini, Raimondo Giuliani, Claudio Gentile Pubblicato in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0 Editore: IEEE DOI: 10.1109/giots.2019.8766387 Zone Keys Trust Management in Vehicular Networks based on Blockchain Autori: Gianmarco Baldini, Jose L. Hernandez-Ramos, Gary Steri, Sara N. Matheu Pubblicato in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0 Editore: IEEE DOI: 10.1109/giots.2019.8766375 A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS Autori: Jose L. Hernandez-Ramos, Gianmarco Baldini, Ricardo Neisse, Mays Al-Naday, Martin J. Reed Pubblicato in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0 Editore: IEEE DOI: 10.1109/giots.2019.8766360 Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks Autori: Konstantinos Papachristou, Traianos Theodorou, Stavros Papadopoulos, Aikaterini Protogerou, Anastasios Drosou, Dimitrios Tzovaras Pubblicato in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0 Editore: IEEE DOI: 10.1109/giots.2019.8766404 Peer reviewed articles (4) Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform Autori: Gianmarco Baldini, Raimondo Giuliani, Gary Steri Pubblicato in: Applied Sciences, Issue 8/11, 2018, Page(s) 2167, ISSN 2076-3417 Editore: MDPI AG DOI: 10.3390/app8112167 Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures Autori: Salvador Pérez, Dan Garcia-Carrillo, Rafael Marín-López, José L. Hernández-Ramos, Rafael Marín-Pérez, Antonio F. Skarmeta Pubblicato in: Future Generation Computer Systems, Issue 95, 2019, Page(s) 570-585, ISSN 0167-739X Editore: Elsevier BV DOI: 10.1016/j.future.2019.01.038 Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks Autori: Jun Du, Erol Gelenbe, Chunxiao Jiang, Haijun Zhang, Yong Ren, H. Vincent Poor Pubblicato in: IEEE Transactions on Information Forensics and Security, Issue 14/6, 2019, Page(s) 1582-1594, ISSN 1556-6013 Editore: Institute of Electrical and Electronics Engineers DOI: 10.1109/tifs.2018.2883000 Microphone Identification Using Convolutional Neural Networks Autori: Gianmarco Baldini, Irene Amerini, Claudio Gentile Pubblicato in: IEEE Sensors Letters, Issue 3/7, 2019, Page(s) 1-4, ISSN 2475-1472 Editore: IEEE DOI: 10.1109/lsens.2019.2923590 Book chapters (3) Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project Autori: Joanna Domanska, Erol Gelenbe, Tadek Czachorski, Anastasis Drosou, Dimitrios Tzovaras Pubblicato in: Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Issue 821, 2018, Page(s) 101-118, ISBN 978-3-319-95188-1 Editore: Springer International Publishing DOI: 10.1007/978-3-319-95189-8_10 Towards a Mobile Malware Detection Framework with the Support of Machine Learning Autori: Dimitris Geneiatakis, Gianmarco Baldini, Igor Nai Fovino, Ioannis Vakalis Pubblicato in: Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Issue 821, 2018, Page(s) 119-129, ISBN 978-3-319-95188-1 Editore: Springer International Publishing DOI: 10.1007/978-3-319-95189-8_11 Next Generation Internet of Things Autori: Ovidiu Vermesan, Joël Bacquet Pubblicato in: Next Generation Internet of Things, Issue 1, 2018, Page(s) 1-352, ISBN 9788-770220071 Editore: River Publishers DOI: 10.13052/rp-9788770220071 Monographic books (1) Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers Autori: E.Gelenbe, P.Campegiani, T.Czachórski, S.K.Katsikas, I.Komnios, L.Romano, D.Tzovaras Pubblicato in: Communications in Computer and Information Science book series (CCIS, volume 821), Issue 821, 2018, ISBN 978-3-319-95189-8 Editore: Springer DOI: 10.1007/978-3-319-95189-8 È in corso la ricerca di dati su OpenAIRE... Si è verificato un errore durante la ricerca dei dati su OpenAIRE Nessun risultato disponibile