CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.
Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.
Leistungen
Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions.
Cyber-physical threat/ risk scenarios and pre-assessment - final (öffnet in neuem Fenster)Event ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database
KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - first (öffnet in neuem Fenster)Tabular Report and database
Risk and resilience management process for cyber-physical threats of telecom CI - first (öffnet in neuem Fenster)Report and digital specification
Countermeasures Draft Definition (öffnet in neuem Fenster)Main envisioned countermeasures definition and progress report about Decision Making Component
Description and definition of the Correlator intelligence (öffnet in neuem Fenster)Dissemination and Communication Activities - third (öffnet in neuem Fenster)
Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)
Ethical, Societal and Gender Equality Protocol - first (öffnet in neuem Fenster)Ethical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members
Methods for cyber-physical security management for telecom CI - first (öffnet in neuem Fenster)Inventory including compliance with standards, rigor, effectiveness and efficiency; Tabular Report and database
Interim Software Defined Security System and Decision Making Module (öffnet in neuem Fenster)Interim Report of T5.2 and T5.3 activities
Analysis on Scenario 2 - tests results (1st run) (öffnet in neuem Fenster)Report on the first step test with corrective actions and final analysis of the second test T85
Ethical, Societal and Gender Equality Protocol - second (öffnet in neuem Fenster)Ethical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members
Validation Assessment and Best Practices - first (öffnet in neuem Fenster)Validation Assessment and Best Practices
Analysis on Scenario 3 - test results - final (öffnet in neuem Fenster)Report on the first step test with corrective actions and final analysis of the second test T95
KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - final (öffnet in neuem Fenster)Tabular Report and database
Scenario 2 Test plan definition (öffnet in neuem Fenster)Plan of the pilot, its requirements and design (T8.1, T8.2
Analysis on Scenario 3 - tests results (1st run) (öffnet in neuem Fenster)Report on the first step test with corrective actions and final analysis of the second test T95
Exploitation Activities - first (öffnet in neuem Fenster)Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)
Scenario 3 Test plan definit (öffnet in neuem Fenster)Plan of the pilot, its requirements and design (T9.1, T9.2)
HMI definition and Platform integration (öffnet in neuem Fenster)HMI Def. & integration activities (T6.4, T6.5)
Scenario 3 - 2nd run integration and setup (öffnet in neuem Fenster)Report on the integration of the 3 scenario 3 main use cases and 1 impacted use case and end users test plans T93 T94
Active and Passive Sensor Deployment Plan (öffnet in neuem Fenster)RESISTO detection systems release
Ethical, Societal and Gender Equality Protocol - final (öffnet in neuem Fenster)Ethical Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues including AB members
Advisory Board Activities Plan (öffnet in neuem Fenster)Report on AB events
Real Time Response and Mitigation Results (öffnet in neuem Fenster)Main envisioned countermeasures definition and progress report about Decision Making Component (T5.1)
Complete propagation analysis (öffnet in neuem Fenster)Dissemination and Communication Activities - second (öffnet in neuem Fenster)
Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)
Communication material - first (öffnet in neuem Fenster)brochure, leaflets and posters to spread main RESISTO information and its results (T10.2)
Table-top read teaming results of RESISTO architecture, scenarios and use cases (öffnet in neuem Fenster)Table-top read teaming results of RESISTO architecture, scenarios and use cases Tabular report
Adaptors, DSS and Risk predictor (öffnet in neuem Fenster)Integr. Components Development (T6.2, T6.3, T6.4)
End user requirements for integrated cyber-physical risk and resilience management, platform and tools (öffnet in neuem Fenster)Report and digital user requirements specifications
Scenario 2 - 2nd run integration and setup (öffnet in neuem Fenster)Report on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84
Scenario 3 - 1st run integration and setup (öffnet in neuem Fenster)Report on the integration of the 3 scenario 3 main use cases and impacted use case and end users test plans T93 T94
RESISTO platform and tools reference architecture - final (öffnet in neuem Fenster)Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions
Cyber-physical threat/ risk scenarios and pre-assessment - first (öffnet in neuem Fenster)Event ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database
Techniques and Procedures for cyber/physical threats Detection (öffnet in neuem Fenster)Dissemination and Communication Activities - final (öffnet in neuem Fenster)
Dissemination Standardisation and communication activities initial Plans and annual plan updates and reports T102 T106
Damage/ Vulnerability models for physical and cyber threats of telecom CI - final (öffnet in neuem Fenster)Report; software module specifications and algorithms
Exploitation Activities - second (öffnet in neuem Fenster)Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)
Dissemination and Communication Activities - first (öffnet in neuem Fenster)Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)
Scenario 2 - 1st run integration and setup (öffnet in neuem Fenster)Report on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84
Communication material - final (öffnet in neuem Fenster)brochure leaflets and posters to spread main RESISTO information and its results T102
Exploitation Activities - final (öffnet in neuem Fenster)Market strategy exploitation and sustainability IPRs initial plan annual plan updates and reports innovation management report and business plan refinements T103 T104 T105
Validation Assessment and Best Practices - final (öffnet in neuem Fenster)Report on Final validation results T101
Risk and resilience management process for cyber-physical threats of telecom CI - final (öffnet in neuem Fenster)Report and digital specification
Analysis on Scenario 2 - test results - final (öffnet in neuem Fenster)Report on the first step test with corrective actions and final analysis of the second test T85
Exploitation Activities - third (öffnet in neuem Fenster)Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)
Scenario 1 Test plan definition (öffnet in neuem Fenster)Plan of the pilot, its requirements and design (T7.1, T7.2)
Analytical security assessment application to use cases and their refinement (öffnet in neuem Fenster)Report, on assessment of RESISTO solutions and refinement recommendations
Damage/ Vulnerability models for physical and cyber threats of telecom CI - first (öffnet in neuem Fenster)Report; software module specifications and algorithms
Telecommunication system model and interfaces - first (öffnet in neuem Fenster)Report and scalable, flexible and tailorable digital model as basis for simulations and parameterizations
Scenario 1 - 2nd run integration and setup (öffnet in neuem Fenster)Report on the integration of 1 scenario 7 main use cases at end users test plans T73 T74
Active and Passive Sensor Definition (öffnet in neuem Fenster)analysis RESISTO detection systems
Telecommunication system model and interfaces - final (öffnet in neuem Fenster)Report and scalable, flexible and tailorable digital model as basis for simulations and parameterizations
Analysis on Scenario 1 - test results - final (öffnet in neuem Fenster)Report on the first step test with corrective actions and final analysis of the second test T75
Interim Workflow Definition and Emergency Warning Communication Function (öffnet in neuem Fenster)Interim Report of T5.4 and T5.5
Methods for cyber-physical security management for telecom CI- final (öffnet in neuem Fenster)Inventory including compliance with standards, rigor, effectiveness and efficiency - Tabular Report and database
Scenario 1 - 1st run integration and setup (öffnet in neuem Fenster)Report on the integration of 1 scenario 7 main use cases at end users test plans T73 T74
Analysis on Scenario 1 - tests results (1st run) (öffnet in neuem Fenster)Report on the first step test with corrective actions and final analysis of the second test T75
Official web site, logo, including in its structure news, public documents download and member area (T10.2)
Veröffentlichungen
Autoren:
Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci
Veröffentlicht in:
2021 29th Mediterranean Conference on Control and Automation (MED), 2021, Seite(n) 428-434, ISBN 978-1-6654-2258-1
Herausgeber:
IEEE
DOI:
10.1109/med51440.2021.9480182
Autoren:
Riccardo Colelli, Chiara Foglietta, Roberto Fusacchia, Stefano Panzieri and Federica Pascucci
Veröffentlicht in:
IEEE 19th International Conference on Industrial Informatics, 2021
Herausgeber:
IEEE
Autoren:
Maria Belesioti, Ioannis Chochliouros, Federico Frosali and Rodoula Makri
Veröffentlicht in:
European Conference on Networks and Communications 2018 - 5G and beyond (EuCNC 2018), 2018
Herausgeber:
IEEE
Autoren:
Maria Belesioti, Rodoula Makri, Mirjam Fehling-Kaschek, Marco Carli, Alexandros Kostopoulos, Ioannis P. Chochliouros, Alberto Neri, Federico Frosali
Veröffentlicht in:
2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019, Seite(n) 212-218, ISBN 978-1-7281-0570-3
Herausgeber:
IEEE
DOI:
10.1109/dcoss.2019.00056
Autoren:
Mirjam Fehling-Kaschek, Katja Faist,, Natalie Miller, Jörg Finger, Ivo Häring, Marco Carli, Federica Battisti
Veröffentlicht in:
Proceedings of the 29th European Safety and Reliability Conference (ESREL), 2019, Seite(n) 1312-1319, ISBN 978-981-11-2724-3
Herausgeber:
Research Publishing Services
DOI:
10.3850/978-981-11-2724-3_0242-cd
Autoren:
Mirjam Fehling-Kaschek, Natalie Miller, Gael Haab, Katja Faist, Alexander Stolz, Ivo Häring, Alberto Neri, Giuseppe Celozzi, Jose Sanchez, Javier Valera, Rodoula Makri
Veröffentlicht in:
30th European Safety and Reliability Conference and 15th Probabilistic Safety Assessment and Management Conference, 2020
Herausgeber:
SREL2020-PSAM15 Organizers
Autoren:
Sara Baldoni, Giuseppe Celozzi, Alessandro Neri, Marco Carli, Federica Battisti
Veröffentlicht in:
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers, Ausgabe 12618, 2021, Seite(n) 67-76, ISBN 978-3-030-69780-8
Herausgeber:
Springer International Publishing
DOI:
10.1007/978-3-030-69781-5_5
Autoren:
Chiara Foglietta, Stefano Panzieri
Veröffentlicht in:
Ausgabes on Risk Analysis for Critical Infrastructure Protection, 2021, ISBN 978-1-83962-620-3
Herausgeber:
IntechOpen
DOI:
10.5772/intechopen.94506
Autoren:
Alberto Neri, Alessandro Neri
Veröffentlicht in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Herausgeber:
Now Publisher
DOI:
10.1561/9781680836875
Autoren:
Federica Battisti, Marco Carli, Federica Pascucci, Mirjam Fehling-Kaschek, Rodoula Makri, Maria Belesioti, Ioannis Chochliouros, Ioan Constatin, Xiao-Si Wang
Veröffentlicht in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Herausgeber:
Now Publisher
Autoren:
Luca Baldini, Marco Carli, Giuseppe Celozzi, Federico Colangelo, Alessandro Neri, Cosimo Zotti
Veröffentlicht in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Herausgeber:
Now Publisher
Autoren:
N. Miller, M. Fehling-Kaschek, G. Haab, K. Faist, A. Stolz, I. Håring
Veröffentlicht in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Herausgeber:
Now Publisher
Autoren:
Chiara Foglietta, Stefano Panzieri
Veröffentlicht in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Herausgeber:
Now Publisher
Autoren:
Rodoula Makri, Panos Karaivazoglou, Alexandros Kyritsis, Michael Skitsas, Nikolaos Koutras, Javier Valera, Jose Manuel Sanchez
Veröffentlicht in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Herausgeber:
Now Publisher
Autoren:
Ivo Häring, Mirjam Fehling-Kaschek, Natalie Miller, Katja Faist, Sebastian Ganter, Kushal Srivastava, Aishvarya Kumar Jain, Georg Fischer, Kai Fischer, Jörg Finger, Alexander Stolz, Tobias Leismann, Stefan Hiermaier, Marco Carli, Federica Battisti, Rodoula Makri, Giuseppe Celozzi, Maria Belesioti, Evangelos Sfakianakis, Evita Agrafioti, Anastasia Chalkidou, George Papadakis, Clemente Fuggini, Fa
Veröffentlicht in:
Environment Systems and Decisions, Ausgabe 41/2, 2021, Seite(n) 286-329, ISSN 2194-5403
Herausgeber:
Springer Science + Business Media
DOI:
10.1007/s10669-021-09811-5
Autoren:
Sara Baldoni, Federica Battisti, Marco Carli, Federica Pascucci
Veröffentlicht in:
IEEE Access, Ausgabe 9, 2021, Seite(n) 41787-41798, ISSN 2169-3536
Herausgeber:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2021.3065228
Suche nach OpenAIRE-Daten ...
Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten
Es liegen keine Ergebnisse vor