Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Data management plan

The plan for data management in view of the open research data pilot.

Mid-term meeting

The meeting for the mid-term review of the project.

Publications

BRIDGE: BRIDGing the gap bEtween CTI production and consumption

Author(s): Marios Karatisoglou; Aristeidis Farao; Vaios Bolgouras; Christos Xenakis
Published in: International Conference on Communications (COMM), 2022
Publisher: IEEE
DOI: 10.1109/comm54429.2022.9817359

Analyzing Coverages of Cyber Insurance Policies Using Ontology

Author(s): Markos Charalambous; Aristeidis Farao; George Kalantzantonakis; Panagiotis Kanakakis; Nikos Salamanos; Evangelos Kotsifakos; Evangellos Froudakis
Published in: ARES '22, 2022
Publisher: Association for Computing Machinery
DOI: 10.1145/3538969.3544453

A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces

Author(s): Leonidou, Pantelitsa and Salamanos, Nikos and Farao, Aristeidis and Aspri, Maria and Sirivianos, Michael
Published in: 2023
Publisher: ACM
DOI: 10.1145/3600160.3605087

MITRE ATT&CK-driven Cyber Risk Assessment

Author(s): Mohamed Ahmed,Sakshyam Panda,Christos Xenakis,Emmanouil Panaousis
Published in: 2022
Publisher: ACM
DOI: 10.1145/3538969.3544420

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic

Author(s): Pantelakis, Vasileios and Bountakas, Panagiotis and Farao, Aristeidis and Xenakis, Christos
Published in: 2023
Publisher: ACM
DOI: 10.1145/3600160.3605086

A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection

Author(s): Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis
Published in: 2021
Publisher: ACM
DOI: 10.1145/3465481.3469205

ObjectMap - detecting insecure object deserialization

Author(s): Nikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis
Published in: Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019, Page(s) 67-72, ISBN 9781450372923
Publisher: ACM
DOI: 10.1145/3368640.3368680

A Bring Your Own Device security awareness survey among professionals

Author(s): Petihakis, George and Kiritsis, Dimitrios and Farao, Aristeidis and Bountakas, Panagiotis and Panou, Aggeliki and Xenakis, Christos
Published in: 2023
Publisher: ACM
DOI: 10.1145/3600160.3605072

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

Author(s): Ioannis Kalderemidis; Aristeidis Farao; Panagiotis Bountakas; Sakshyam Panda; Christos Xenakis
Published in: 2022
Publisher: ACM
DOI: 10.1145/3538969.3544431

ObjectMap: detecting insecure object deserialization

Author(s): Nikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, and Christos Xenakis
Published in: 2019
Publisher: PCI
DOI: 10.1145/3368640.3368680

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

Author(s): Aristeidis Farao; Georgios Paparis; Sakshyam Panda; Emmanouil Panaousis; Apostolis Zarras; Christos Xenakis
Published in: International Journal of Information Security, Issue 2, 2023, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-023-00741-8

[m]allotROPism: a metamorphic engine for malicious software variation development

Author(s): Christos Lyvas, Christoforos Ntantogian & Christos Xenakis
Published in: International Journal of Information Security, 2022, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-021-00541-y

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements

Author(s): Antonio Muñoz; Aristeidis Farao; Jordy Ryan Casas Correia; Christos Xenakis
Published in: Information, Issue 15, 2021, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12090357

EKnad: Exploit Kits’ network activity detection

Author(s): Panagiotis Bountakas, Christoforos Ntantogian, Christos Xenakis
Published in: Future Generation Computer Systems, 2022, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2022.04.001

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats

Author(s): Anna Angelogianni, Ilias Politis, Farnaz Mohammadi, Christos Xenakis
Published in: IEEE Access, Issue 8, 2020, Page(s) 224677-224701, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.3045322

Defense strategies for Adversarial Machine Learning: A survey

Author(s): Panagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, Christos Xenakis
Published in: Defense strategies for Adversarial Machine Learning: A survey, 2023, ISSN 1574-0137
Publisher: Elsevier BV
DOI: 10.1016/j.cosrev.2023.100573

HELPHED: Hybrid Ensemble Learning PHishing Email Detection

Author(s): Panagiotis Bountakas, Christos Xenakis
Published in: Journal of Network and Computer Applications, 2022, ISSN 1084-8045
Publisher: Academic Press
DOI: 10.1016/j.jnca.2022.103545

Post-incident audits on cyber insurance discounts

Author(s): Sakshyam Panda, Daniel W Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis
Published in: Computers & Security, Issue 87, 2019, Page(s) 101593, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.101593

Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits

Author(s): Aron Laszka, Emmanouil Panaousis, Jens Grossklags
Published in: Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings, Issue 11199, 2018, Page(s) 508-520, ISBN 978-3-030-01553-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-01554-1_29

SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions

Author(s): Aristeidis Farao, Sakshyam Panda, Sofia Anna Menesidou, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi, Nikolaos Georgopoulos, Michael Sirivianos, Nikos Salamanos, Spyros Loizou, Michalis Pingos, John Polley, Andrew Fielder, Emmanouil Panaousis, Christos Xenakis
Published in: Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings, Issue 12395, 2020, Page(s) 65-74, ISBN 978-3-030-58985-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-58986-8_5

Cyber-Insurance: Past, Present and Future

Author(s): Sakshyam Panda; Farao, Aristeidis; Panaousis, Emmanouil; Xenakis, Christos
Published in: Issue 12, 2021
Publisher: Springer
DOI: 10.5281/zenodo.4541119

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available