European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures

Risultati finali

Ecosystem report

This deliverable create an industrial ecosystem around the EnergyShield solution

Regulatory requirement specification

Regulatory requirements related to the deployment and operation of the EnergyShield toolkit

Dissemination report v2

second version

Societal Impact Report

Monitor and evaluate societal impact of the project

Integration and test plan

Integration and Testing Plan

Field trial evaluation summary report

Evaluation report on the performance of the EnergyShield solution

Dissemination report final

Dissemination report final version

Test/QA report

Testing plan document

Collaboration report

Develop crossfertilization activities with ongoing EU research projects and new Horizon 2020 projects focusing on similar challenges

Standardization report

This deliverables focuses on promoting EnergyShield results in standardization groups at both European level CENCENELECETSI and ISOIEC level

Business cases

Industrial business cases development for the EnergyShield toolkit including return on investment ROI and costbenefit analyses CBA

Communication report final

Communication report final version

Communication report v1

Communication report first version

Dissemination report v1

Dissemination report first version

Commercial requirement specification

Commercial requirements that can influence the market uptake of the EnergyShield solution, such as licensing model, pricing, modularity, etc.

Communication report v2

update version of the communication report

Updated security culture framework and tool - final version

The underlying Security Culture Framework will allow automated planning and implementation of security culture programmes. This will include a version update, including documentation.This deliverable will contain the updated from 2 iterations: M18 and M30

Updated security culture framework and tool

The underlying Security Culture Framework will allow automated planning and implementation of security culture programmes. This will include a version update, including documentation. This deliverable will be updated in 2 iterations: M18 and M30

Pubblicazioni

Integrating Security Behavior into Attack Simulations

Autori: Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi Psarrou
Pubblicato in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, Pagina/e Pages 1–13
Editore: ACM
DOI: 10.1145/3465481.3470475

TOWARDS ASSESSING CRITICAL INFRASTRUCTURES’ CYBER-SECURITY CULTURE DURING COVID-19 CRISIS: A TAILOR-MADE SURVEY

Autori: Anna Georgiadou, Spiros Mouzakitis and Dimitrios Askounis
Pubblicato in: 4th International Conference on Networks and Security (NSEC2020), Numero vol 10, 2020
Editore: Aircconline

Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness

Autori: Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Pubblicato in: ARES 2022: The 17th International Conference on Availability, Reliability and Security Vienna Austria, 2022, Pagina/e Article No.: 77Pages 1–10, ISBN 978-1-4503-9670-7
Editore: ACM
DOI: 10.1145/3538969.3543813

Modelling DoS Attacks & Interoperability in the Smart Grid

Autori: Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg
Pubblicato in: 2020 29th International Conference on Computer Communications and Networks (ICCCN), Numero 3-6 Aug. 2020, 29th International Conference on Computer Communications and Networks (ICCCN), 2020, Pagina/e 1-6, ISBN 978-1-7281-6607-0
Editore: IEEE
DOI: 10.1109/icccn49398.2020.9209671

Why Phishing Works on Smartphones: A Preliminary Study

Autori: Joakim Loxdal, Måns Andersson, Simon Hacks, Robert Lagerström
Pubblicato in: Proceedings of the 54th Hawaii International Conference on System Sciences, 2021, ISBN 978-0-9981331-4-0
Editore: Hawaii International Conference on System Sciences
DOI: 10.24251/hicss.2021.863

Vulnerabilities Manager, a platform for linking vulnerability data sources

Autori: Konstantinos Touloumis; Ariadni Michalitsi-Psarrou; Panagiotis Kapsalis; Anna Georgiadou; Dimitris Askounis
Pubblicato in: IEEE International Conference on Big Data, 2021, ISBN 978-1-6654-3902-2
Editore: IEEE
DOI: 10.1109/bigdata52589.2021.9672026

Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness

Autori: Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
Pubblicato in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, Pagina/e Pages 1–8, ISBN 978-1-4503-9670-7
Editore: ACM
DOI: 10.1145/3538969.3544467

Enhancing SIEM Technology for protecting Electrical Power and Energy Sector

Autori: Iosif Sklavidis; Christos Angelidis; Rosanna Babagiannou; Angelos Liapis
Pubblicato in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Pagina/e pp. 473-478
Editore: IEEE
DOI: 10.1109/csr51186.2021.9527944

Security Considerations for Remote Terminal Units

Autori: Jose Eduardo Urrea Cabus; İsmail Bütün; Robert Lagerström
Pubblicato in: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), 2022, ISBN 978-1-6654-8374-2
Editore: IEEE
DOI: 10.1109/zinc55034.2022.9840542

Towards Smart Sensing Systems: A New Approach to Environmental Monitoring Systems by Using LoRaWAN

Autori: Junaid Qadir; Ismail Butun; Robert Lagerstrom; Paolo Gastaldo; Daniele D. Caviglia
Pubblicato in: 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), 2022, ISBN 978-1-6654-8374-2
Editore: IEEE
DOI: 10.1109/zinc55034.2022.9840717

Detecting Insider Threat via a Cyber-Security Culture Framework

Autori: Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Pubblicato in: Journal of Computer Information Systems, 2021, Pagina/e 1-11, ISSN 0887-4417
Editore: International Association for Computer Information Systems
DOI: 10.1080/08874417.2021.1903367

Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

Autori: Wenjun Xiong, Emeline Legrand, Oscar Åberg, Robert Lagerström
Pubblicato in: Software and Systems Modeling, 2021, ISSN 1619-1366
Editore: Springer Verlag
DOI: 10.1007/s10270-021-00898-7

Working from home during COVID-19 crisis: a cyber security culture assessment survey

Autori: Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Pubblicato in: Security Journal, Numero Security Journal, 2021, ISSN 0955-1662
Editore: Palgrave Macmillan Ltd.
DOI: 10.1057/s41284-021-00286-2

Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework

Autori: Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
Pubblicato in: Sensors, Numero 21/9, 2021, Pagina/e 3267, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21093267

Hospitals' Cybersecurity Culture during the COVID-19 Crisis

Autori: Georgiadou, A.; Michalitsi-Psarrou, A.; Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Doukas, G.; Ntanos, C.; Landeiro Ribeiro, L.; Askounis, D. Hospitals
Pubblicato in: MDPI, Numero 22279032, 2021, ISSN 2227-9032
Editore: MDPI
DOI: 10.3390/healthcare9101335

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis

Autori: Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece
Pubblicato in: International Journal of Network Security and its Application (IJNSA), Numero Volume 13, No.1, 2021, ISSN 0974-9330
Editore: IJNSA

Modelling smart grid IT-OT dependencies for DDoS impact propagation

Autori: DilaraAcarali, K.Rajesh Rao, MuttukrishnanRajarajan, DoronChema, MarkGinzburg
Pubblicato in: Computers & Security, Numero 01674048, 2021, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102528

Two decades of cyberattack simulations: A systematic literature review

Autori: ViktorEngström, RobertLagerström
Pubblicato in: Computers & Security, Numero 01674048, 2022, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102681

Automating threat modeling using an ontology framework

Autori: Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström
Pubblicato in: Cybersecurity, Numero 3/1, 2020, ISSN 2523-3246
Editore: SpringerOPen
DOI: 10.1186/s42400-020-00060-8

A Cyber-Security Culture Framework for Assessing Organization Readiness

Autori: Anna Georgiadou, Spiros Mouzakitis, Kanaris Bounas, Dimitrios Askounis
Pubblicato in: Journal of Computer Information Systems, 2020, Pagina/e 1-11, ISSN 0887-4417
Editore: International Association for Computer Information Systems
DOI: 10.1080/08874417.2020.1845583

FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain

Autori: Akanksha Dixit; Arjun Singh; Yogachandran Rahulamathavan; Muttukrishnan Rajarajan
Pubblicato in: IEEE Internet of Things Journal, Numero 23274662, 2021, ISSN 2327-4662
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/jiot.2021.3120640

A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures.

Autori: Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Georgiadou, A.; Michalitsi-Psarrou, A.; Doukas, G.; Kontoulis, M.; Nikoloudakis, Y.; Marin, S.; Cabecinha, R.; Ntanos, C.
Pubblicato in: Healthcare, Numero 22279032, 2022, ISSN 2227-9032
Editore: MDPI
DOI: 10.3390/healthcare10020327

powerLang: a probabilistic attack simulation language for the power domain

Autori: Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt
Pubblicato in: Energy Informatics, Numero 3/1, 2020, ISSN 2520-8942
Editore: Springer Link
DOI: 10.1186/s42162-020-00134-4

A Method for Assigning Probability Distributions in Attack Simulation Languages

Autori: Wenjun Xiong, Simon Hacks, Robert Lagerström
Pubblicato in: Complex Systems Informatics and Modeling Quarterly, Numero 26, 2021, Pagina/e 55-77, ISSN 2255-9922
Editore: Complex Systems Informatics and Modeling Quarterly
DOI: 10.7250/csimq.2021-26.04

A probabilistic attack simulation language for the IT domain

Autori: Sotirios Katsikea, Simon Hacks, Pontus Johnson, Mathias Eksted, Robert Lagerstrom, Joar Jacobsson, Max Wallstedt, Per Eliasson
Pubblicato in: GraMSec@CSF, 2020
Editore: GraMSec@CSF

Towards Measuring Test Coverage of Attack Simulations

Autori: Nicklas Hersén, Simon Hacks, Konrad Fögen
Pubblicato in: Enterprise, Business-Process and Information Systems Modeling - 22nd International Conference, BPMDS 2021, and 26th International Conference, EMMSAD 2021, Held at CAiSE 2021, Melbourne, VIC, Australia, June 28–29, 2021, Proceedings, Numero 421, 2021, Pagina/e 303-317, ISBN 978-3-030-79185-8
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-79186-5_20

Towards an Ecosystem of Domain Specific Languages for Threat Modeling

Autori: Simon Hacks, Sotirios Katsikeas
Pubblicato in: Advanced Information Systems Engineering - 33rd International Conference, CAiSE 2021, Melbourne, VIC, Australia, June 28 – July 2, 2021, Proceedings, Numero 12751, 2021, Pagina/e 3-18, ISBN 978-3-030-79381-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-79382-1_1

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience

Autori: Butun, Ismail & Sari, Alparslan
Pubblicato in: Smart Grid, Factories, and Cities, Chapter: Early Detection and Recovery Measures for Smart Grid Cyber-Resilience, 2021
Editore: IGI
DOI: 10.4018/978-1-7998-7468-3.ch005

Correction to: A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain

Autori: Engla Ling, Robert Lagerström, Mathias Ekstedt
Pubblicato in: Critical Information Infrastructures Security - 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings, Numero 12332, 2020, Pagina/e C1-C1, ISBN 978-3-030-58294-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-58295-1_8

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile