European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures

Resultado final

Ecosystem report

This deliverable create an industrial ecosystem around the EnergyShield solution

Regulatory requirement specification

Regulatory requirements related to the deployment and operation of the EnergyShield toolkit

Dissemination report v2

second version

Societal Impact Report

Monitor and evaluate societal impact of the project

Integration and test plan

Integration and Testing Plan

Field trial evaluation summary report

Evaluation report on the performance of the EnergyShield solution

Dissemination report final

Dissemination report final version

Test/QA report

Testing plan document

Collaboration report

Develop crossfertilization activities with ongoing EU research projects and new Horizon 2020 projects focusing on similar challenges

Standardization report

This deliverables focuses on promoting EnergyShield results in standardization groups at both European level CENCENELECETSI and ISOIEC level

Business cases

Industrial business cases development for the EnergyShield toolkit including return on investment ROI and costbenefit analyses CBA

Communication report final

Communication report final version

Communication report v1

Communication report first version

Dissemination report v1

Dissemination report first version

Commercial requirement specification

Commercial requirements that can influence the market uptake of the EnergyShield solution, such as licensing model, pricing, modularity, etc.

Communication report v2

update version of the communication report

Updated security culture framework and tool - final version

The underlying Security Culture Framework will allow automated planning and implementation of security culture programmes. This will include a version update, including documentation.This deliverable will contain the updated from 2 iterations: M18 and M30

Updated security culture framework and tool

The underlying Security Culture Framework will allow automated planning and implementation of security culture programmes. This will include a version update, including documentation. This deliverable will be updated in 2 iterations: M18 and M30

Publicaciones

Integrating Security Behavior into Attack Simulations

Autores: Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi Psarrou
Publicado en: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, Página(s) Pages 1–13
Editor: ACM
DOI: 10.1145/3465481.3470475

TOWARDS ASSESSING CRITICAL INFRASTRUCTURES’ CYBER-SECURITY CULTURE DURING COVID-19 CRISIS: A TAILOR-MADE SURVEY

Autores: Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis
Publicado en: 4th International Conference on Networks and Security (NSEC2020), Edición vol 10, 2020
Editor: Aircconline

Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness

Autores: Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Publicado en: ARES 2022: The 17th International Conference on Availability, Reliability and Security Vienna Austria, 2022, Página(s) Article No.: 77Pages 1–10, ISBN 978-1-4503-9670-7
Editor: ACM
DOI: 10.1145/3538969.3543813

Modelling DoS Attacks & Interoperability in the Smart Grid

Autores: Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg
Publicado en: 2020 29th International Conference on Computer Communications and Networks (ICCCN), Edición 3-6 Aug. 2020, 29th International Conference on Computer Communications and Networks (ICCCN), 2020, Página(s) 1-6, ISBN 978-1-7281-6607-0
Editor: IEEE
DOI: 10.1109/icccn49398.2020.9209671

Why Phishing Works on Smartphones: A Preliminary Study

Autores: Joakim Loxdal, Måns Andersson, Simon Hacks, Robert Lagerström
Publicado en: Proceedings of the 54th Hawaii International Conference on System Sciences, 2021, ISBN 978-0-9981331-4-0
Editor: Hawaii International Conference on System Sciences
DOI: 10.24251/hicss.2021.863

Vulnerabilities Manager, a platform for linking vulnerability data sources

Autores: Konstantinos Touloumis; Ariadni Michalitsi-Psarrou; Panagiotis Kapsalis; Anna Georgiadou; Dimitris Askounis
Publicado en: IEEE International Conference on Big Data, 2021, ISBN 978-1-6654-3902-2
Editor: IEEE
DOI: 10.1109/bigdata52589.2021.9672026

Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness

Autores: Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Publicado en: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, Página(s) Pages 1–8, ISBN 978-1-4503-9670-7
Editor: ACM
DOI: 10.1145/3538969.3544467

Enhancing SIEM Technology for protecting Electrical Power and Energy Sector

Autores: Iosif Sklavidis; Christos Angelidis; Rosanna Babagiannou; Angelos Liapis
Publicado en: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Página(s) pp. 473-478
Editor: IEEE
DOI: 10.1109/csr51186.2021.9527944

Security Considerations for Remote Terminal Units

Autores: Jose Eduardo Urrea Cabus; İsmail Bütün; Robert Lagerström
Publicado en: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), 2022, ISBN 978-1-6654-8374-2
Editor: IEEE
DOI: 10.1109/zinc55034.2022.9840542

Towards Smart Sensing Systems: A New Approach to Environmental Monitoring Systems by Using LoRaWAN

Autores: Junaid Qadir; Ismail Butun; Robert Lagerstrom; Paolo Gastaldo; Daniele D. Caviglia
Publicado en: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), 2022, ISBN 978-1-6654-8374-2
Editor: IEEE
DOI: 10.1109/zinc55034.2022.9840717

Detecting Insider Threat via a Cyber-Security Culture Framework

Autores: Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Publicado en: Journal of Computer Information Systems, 2021, Página(s) 1-11, ISSN 0887-4417
Editor: International Association for Computer Information Systems
DOI: 10.1080/08874417.2021.1903367

Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

Autores: Wenjun Xiong, Emeline Legrand, Oscar Åberg, Robert Lagerström
Publicado en: Software and Systems Modeling, 2021, ISSN 1619-1366
Editor: Springer Verlag
DOI: 10.1007/s10270-021-00898-7

Working from home during COVID-19 crisis: a cyber security culture assessment survey

Autores: Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Publicado en: Security Journal, Edición Security Journal, 2021, ISSN 0955-1662
Editor: Palgrave Macmillan Ltd.
DOI: 10.1057/s41284-021-00286-2

Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework

Autores: Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Publicado en: Sensors, Edición 21/9, 2021, Página(s) 3267, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21093267

Hospitals' Cybersecurity Culture during the COVID-19 Crisis

Autores: Georgiadou, A.; Michalitsi-Psarrou, A.; Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Doukas, G.; Ntanos, C.; Landeiro Ribeiro, L.; Askounis, D. Hospitals
Publicado en: MDPI, Edición 22279032, 2021, ISSN 2227-9032
Editor: MDPI
DOI: 10.3390/healthcare9101335

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis

Autores: Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Publicado en: International Journal of Network Security and its Application (IJNSA), Edición Volume 13, No.1, 2021, ISSN 0974-9330
Editor: IJNSA

Modelling smart grid IT-OT dependencies for DDoS impact propagation

Autores: DilaraAcarali, K.Rajesh Rao, MuttukrishnanRajarajan, DoronChema, MarkGinzburg
Publicado en: Computers & Security, Edición 01674048, 2021, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102528

Two decades of cyberattack simulations: A systematic literature review

Autores: ViktorEngström, RobertLagerström
Publicado en: Computers & Security, Edición 01674048, 2022, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102681

Automating threat modeling using an ontology framework

Autores: Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström
Publicado en: Cybersecurity, Edición 3/1, 2020, ISSN 2523-3246
Editor: SpringerOPen
DOI: 10.1186/s42400-020-00060-8

A Cyber-Security Culture Framework for Assessing Organization Readiness

Autores: Anna Georgiadou, Spiros Mouzakitis, Kanaris Bounas, Dimitrios Askounis
Publicado en: Journal of Computer Information Systems, 2020, Página(s) 1-11, ISSN 0887-4417
Editor: International Association for Computer Information Systems
DOI: 10.1080/08874417.2020.1845583

FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain

Autores: Akanksha Dixit; Arjun Singh; Yogachandran Rahulamathavan; Muttukrishnan Rajarajan
Publicado en: IEEE Internet of Things Journal, Edición 23274662, 2021, ISSN 2327-4662
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/jiot.2021.3120640

A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures.

Autores: Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Georgiadou, A.; Michalitsi-Psarrou, A.; Doukas, G.; Kontoulis, M.; Nikoloudakis, Y.; Marin, S.; Cabecinha, R.; Ntanos, C.
Publicado en: Healthcare, Edición 22279032, 2022, ISSN 2227-9032
Editor: MDPI
DOI: 10.3390/healthcare10020327

powerLang: a probabilistic attack simulation language for the power domain

Autores: Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt
Publicado en: Energy Informatics, Edición 3/1, 2020, ISSN 2520-8942
Editor: Springer Link
DOI: 10.1186/s42162-020-00134-4

A Method for Assigning Probability Distributions in Attack Simulation Languages

Autores: Wenjun Xiong, Simon Hacks, Robert Lagerström
Publicado en: Complex Systems Informatics and Modeling Quarterly, Edición 26, 2021, Página(s) 55-77, ISSN 2255-9922
Editor: Complex Systems Informatics and Modeling Quarterly
DOI: 10.7250/csimq.2021-26.04

A probabilistic attack simulation language for the IT domain

Autores: Sotirios Katsikea, Simon Hacks, Pontus Johnson, Mathias Eksted, Robert Lagerstrom, Joar Jacobsson, Max Wallstedt, Per Eliasson
Publicado en: GraMSec@CSF, 2020
Editor: GraMSec@CSF

Towards Measuring Test Coverage of Attack Simulations

Autores: Nicklas Hersén, Simon Hacks, Konrad Fögen
Publicado en: Enterprise, Business-Process and Information Systems Modeling - 22nd International Conference, BPMDS 2021, and 26th International Conference, EMMSAD 2021, Held at CAiSE 2021, Melbourne, VIC, Australia, June 28–29, 2021, Proceedings, Edición 421, 2021, Página(s) 303-317, ISBN 978-3-030-79185-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-79186-5_20

Towards an Ecosystem of Domain Specific Languages for Threat Modeling

Autores: Simon Hacks, Sotirios Katsikeas
Publicado en: Advanced Information Systems Engineering - 33rd International Conference, CAiSE 2021, Melbourne, VIC, Australia, June 28 – July 2, 2021, Proceedings, Edición 12751, 2021, Página(s) 3-18, ISBN 978-3-030-79381-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-79382-1_1

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience

Autores: Butun, Ismail & Sari, Alparslan
Publicado en: Smart Grid, Factories, and Cities, Chapter: Early Detection and Recovery Measures for Smart Grid Cyber-Resilience, 2021
Editor: IGI
DOI: 10.4018/978-1-7998-7468-3.ch005

Correction to: A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain

Autores: Engla Ling, Robert Lagerström, Mathias Ekstedt
Publicado en: Critical Information Infrastructures Security - 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings, Edición 12332, 2020, Página(s) C1-C1, ISBN 978-3-030-58294-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-58295-1_8

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles