Skip to main content

European network of Cybersecurity centres and competence Hub for innovation and Operations

Deliverables

Governance needs and objectives

A report on indentified governance needs and objectives will be based on analysis of the initial experience of the Consortium in implementation of the governance and management for the included in the project centers. Study of typical needs and objectives for the network governance and management of publicly available cases will contribute to improving and verification of the initial proposal.

Governance alternatives

This report will present the results of the study of existing models and their comparison with the experience within the consortium. In parallel, we will develop goal and specific criteria for the assessment of these alternatives for the purposes of the project.

ECHO Multi-sector Assessment Framework

The deliverable will report on the analysis of challenges and opportunities derived from sector-specific use cases, and will contribute to the development of the ECHO multi-sector risk assessment framework. The document will focus on horizontal technologies and cybersecurity in selected critical sectors, as well as addressing inter-sector dependencies and transversal security aspects. The developed framework will provide a foundational approach for organisations to assess their current security standing and to develop a roadmap to investments in technological advancements, training and process innovations aimed to protect their assets against cyber-attacks.

Transversal technical cybersecurity challenges report

This deliverable will provide an initial analysis and categorisation of transversal technical cybersecurity challenges based on WP2 outcomes and expert reports by relevant agencies.

Inter-sector cybersecurity technology roadmap

This deliverable provides details of inter-sector cybersecurity challenges and needs along with conceptual solution roadmaps and their associated requirements.

Inter-sector technical cybersecurity challenges report

This deliverable will provide an initial analysis and categorisation of inter-sector technical cybersecurity challenges based on WP2 outcomes and expert reports by relevant agencies.

ECHO Information sharing models

This deliverable consists of a comprehensive review of information sharing and trust models from within the cyber domain, as well as models from other domains (e.g., healthcare information sharing models). From these models a set of system requirements and features will be established to support a model that promotes information sharing among partners, while also meeting regulatory requirements. The deliverable includes a set of system requirements and features will be established to support a model that promotes information sharing among partners, while also meeting regulatory requirements. Moreover, the final analysis includes the requirements for information sharing within and between partners across organizational boundaries as derived from multi-sector analysis.

Project leaflets

This deliverable includes project promotional material such as leaflets and brochures. All marketing material and collateral shall have a common look and associated branding.

ECHO Web Platform

Describe the design of the web-based platform including web-based templates and of the web graphical layouts. The approach for the implementation and maintenance of graphic design & branding will also be included.

Communication collateral, social media channels set-up

Details the communication strategy and all the used communication formats, such as brochures, press releases, video clips, collateral, banners, etc. ensuring a common look and feel to all social media activities including LinkedIn, Twitter, etc.. Regular social media activities will be carried out and continuously managed. Presents the coordination strategy and the main steps regarding production of ECHO branding and material and visual presentations such as word documents, presentation files, project leaflets, etc.

Event calendar

Continuously updated calendar of the relevant conferences, workshops and other public or industry specific expert events.

Searching for OpenAIRE data...

Publications

A New Steganographic Algorithm for Hiding Messages in Music

Author(s): Michał Bajor, Marcin Niemiec
Published in: Information & Security: An International Journal, Issue 47/2, 2020, Page(s) 261-275, ISSN 0861-5160
DOI: 10.11610/isij.4718

Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence

Author(s): Jyri Rajamäki, Vasilis Katos
Published in: Information & Security: An International Journal, Issue 46/2, 2020, Page(s) 198-214, ISSN 0861-5160
DOI: 10.11610/isij.4614

Organizational Learning in the Academic Literature – Systematic Literature Review

Author(s): Harri Ruoslahti, Amir Trent
Published in: Information & Security: An International Journal, Issue 46/1, 2020, Page(s) 65-78, ISSN 0861-5160
DOI: 10.11610/isij.4605

From Classroom to Online Teaching – A Case during COVID19

Author(s): Harri Ruoslahti
Published in: Information & Security: An International Journal, Issue 46/3, 2020, Page(s) 285-292, ISSN 0861-5160
DOI: 10.11610/isij.4620

Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application

Author(s): Vyacheslav Kharchenko, Sergiy Dotsenko, Yuriy Ponochovnyi, Oleg Illiashenko
Published in: Information & Security: An International Journal, Issue 47/1, 2020, Page(s) 77-90, ISSN 0861-5160
DOI: 10.11610/isij.4705

MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness

Author(s): George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, Georgi Zahariev
Published in: Information & Security: An International Journal, Issue 46/2, 2020, Page(s) 155-167, ISSN 0861-5160
DOI: 10.11610/isij.4611

Addressing the Security Gap in IoT: Towards an IoT Cyber Range

Author(s): Oliver Nock, Jonathan Starkey, Constantinos Marios Angelopoulos
Published in: Sensors, Issue 20/18, 2020, Page(s) 5439, ISSN 1424-8220
DOI: 10.3390/s20185439

A Governance Model of a Collaborative Networked Organization for Cybersecurity Research

Author(s): Yantsislav Yanakiev
Published in: Information & Security: An International Journal, Issue 46/1, 2020, Page(s) 79-98, ISSN 0861-5160
DOI: 10.11610/isij.4606

Societal Impact Assessment of a Cyber Security Network Project

Author(s): Kirsi Aaltola, Harri Ruoslahti
Published in: Information & Security: An International Journal, Issue 46/1, 2020, Page(s) 53-64, ISSN 0861-5160
DOI: 10.11610/isij.4604

Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives

Author(s): Todor Tagarev
Published in: Future Internet, Issue 12/4, 2020, Page(s) 62, ISSN 1999-5903
DOI: 10.3390/fi12040062

Unravelling Ariadne’s Thread: Exploring the Threats of Decentralised DNS

Author(s): Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos
Published in: IEEE Access, Issue 8, 2020, Page(s) 118559-118571, ISSN 2169-3536
DOI: 10.1109/ACCESS.2020.3004727

Integrated Security Management System for Enterprises in Industry 4.0

Author(s): Sergiy Dotsenko, Oleg Illiashenko, Sergii Kamenskyi, Vyacheslav Kharchenko
Published in: Information & Security: An International Journal, Issue 43/3, 2019, Page(s) 294-304, ISSN 0861-5160
DOI: 10.11610/isij.4322

Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities

Author(s): Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
Published in: Information & Security: An International Journal, Issue 43/1, 2019, Page(s) 21-33, ISSN 0861-5160
DOI: 10.11610/isij.4302

CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain

Author(s): Jyri Rajamäki, Ilkka Tikanmäki, Jari Räsänen
Published in: Information & Security: An International Journal, Issue 43/2, 2019, Page(s) 215-235, ISSN 0861-5160
DOI: 10.11610/isij.4317

An architecture for resilient intrusion detection in ad-hoc networks

Author(s): Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos
Published in: Journal of Information Security and Applications, Issue 53, 2020, Page(s) 102530, ISSN 2214-2126
DOI: 10.1016/j.jisa.2020.102530

Comparative Research of Cybersecurity Information Sharing Models

Author(s): Jussi Simola
Published in: Information & Security: An International Journal, Issue 43/2, 2019, Page(s) 175-195, ISSN 0861-5160
DOI: 10.11610/isij.4315

Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045

Author(s): Sergiy Dotsenko, Oleg Illiashenko, Sergii Kamenskyi, Vyacheslav Kharchenko
Published in: Information & Security: An International Journal, Issue 43/3, 2019, Page(s) 305-317, ISSN 0861-5160
DOI: 10.11610/isij.4323

Improving Forensic Triage Efficiency through Cyber Threat Intelligence

Author(s): Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, Georgios Pangalos
Published in: Future Internet, Issue 11/7, 2019, Page(s) 162, ISSN 1999-5903
DOI: 10.3390/fi11070162

Quantum-Based Solutions for the Next-Generation Internet

Author(s): Marcin Niemiec, Andrzej Dziech, Miłosz Stypiński, Jan Derkacz
Published in: Information & Security: An International Journal, Issue 43/1, 2019, Page(s) 62-72, ISSN 0861-5160
DOI: 10.11610/isij.4306

Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training

Author(s): Kirsi Aaltola, Petteri Taitto
Published in: Information & Security: An International Journal, Issue 43/2, 2019, Page(s) 123-133, ISSN 0861-5160
DOI: 10.11610/isij.4311

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Author(s): Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos
Published in: Computers, Issue 9/1, 2020, Page(s) 18, ISSN 2073-431X
DOI: 10.3390/computers9010018

Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations

Author(s): Jouni Pöyhönen, Viivi Nuojua, Martti Lehto, Jyri Rajamäki
Published in: Information & Security: An International Journal, Issue 43/2, 2019, Page(s) 236-256, ISSN 0861-5160
DOI: 10.11610/isij.4318

A Governance Model for an EU Cyber Security Collaborative Network – ECSCON

Author(s): Georgi Penchev, Antoniya Shalamanova
Published in: Information & Security: An International Journal, Issue 46/1, 2020, Page(s) 99-113, ISSN 0861-5160
DOI: 10.11610/isij.4607

A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT

Author(s): Vyacheslav Kharchenko
Published in: Information & Security: An International Journal, Issue 47/1, 2020, Page(s) 125-134, ISSN 0861-5160
DOI: 10.11610/isij.4708

A Logical Model for Multi-Sector Cyber Risk Management

Author(s): Todor Tagarev, Salvatore Marco Pappalardo, Nikolai Stoianov
Published in: Information & Security: An International Journal, Issue 47/1, 2020, Page(s) 13-26, ISSN 0861-5160
DOI: 10.11610/isij.4701

National Cyber Threat Prevention Mechanism as a part of the E-EWS

Author(s): Simola Jussi; Lehto Martti
Published in: ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security, Issue 1, 2020, Page(s) 539-548
DOI: 10.34190/ICCWS.20.106

Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises

Author(s): Kaie Maennel
Published in: 2020
DOI: 10.1109/euros&pw51379.2020.00012

Error Reconciliation in Quantum Key Distribution Protocols

Author(s): Miralem Mehic, Marcin Niemiec, Harun Siljak, Miroslav Voznak
Published in: Reversible Computation: Extending Horizons of Computing - Selected Results of the COST Action IC1405, Issue 12070, 2020, Page(s) 222-236
DOI: 10.1007/978-3-030-47361-7_11