Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Evaluation Methodology (si apre in una nuova finestra)

Evaluation Methodology M26 STS This deliverable will detail the evaluation and benchmarking methodology of the project

Legal and Ethical Requirements (si apre in una nuova finestra)

Legal and Ethical Requirements (M7; KUL). This deliverable will assess the existing and upcoming European legal framework applicable to CyberSANE and provide for a set of identified requirements that must be taken into account in the development of the project. The deliverable will reflect the outcomes of task T2.2.

Final Report on Dissemination and Communication Activities (si apre in una nuova finestra)

Final Report on Dissemination and Communication Activities M36 ATOS This deliverable will report on the dissemination and communication activities of the project

Training Materials and Report on Training Processes (si apre in una nuova finestra)

Training Materials and Report on Training Processes M30 SiLo This deliverable will be a detailed report on the training activities of the project ie facetoface seminar electronic webinars and will include the training materials and documentation to be used It will be based on the outcome of task T94

Technical and Business (si apre in una nuova finestra)

Technical and Business M36 SiLo Based on task T103 this deliverable will report the results of the business usability and technicaltechnological evaluation of the projects results

Dissemination, Communication and Exploitation Plans (si apre in una nuova finestra)

Dissemination, Communication Plan and Exploitation (M6, ATOS). This deliverable will be the detailed dissemination, communication and exploitation plan that will be established in the project (as part of T11.1). This plan will elaborate on the activities listed in Section 2 on the basis of concrete dates, activities, target audiences and expected outcomes.

Intermediate Report on Dissemination and Communication Activities (si apre in una nuova finestra)

Intermediate Report on Dissemination and Communication Activities M24 ATOS This deliverable will report on the dissemination and communication activities of the project

Stakeholders Evaluation (si apre in una nuova finestra)

Stakeholders Evaluation M36 KN Based on task T102 this deliverable will report on the consolidated results from stakeholders evaluation

Intelligence and Information Sharing models Specifications (si apre in una nuova finestra)

Intelligence and Information Sharing models Specifications (M18, CNR). This deliverable will be a report reflecting the outcomes of tasks T6.1 and T6.2. It will specify the project’s Intelligence and Information Sharing models in terms of stakeholders, models, collaborative workflows and interactions and more.

Initial Report on Dissemination and Communication Activities (si apre in una nuova finestra)

Initial Report on Dissemination and Communication Activities (M12, ATOS). This deliverable will report on the dissemination and communication activities of the project.

Best Practices and Policy Development Guidelines for Replicability and Wider Use (si apre in una nuova finestra)

Best Practices and Policy Development Guidelines for Replicability and Wider Use M36 KUL This deliverable will provide the assessment of legal and ethical considerations within the project T104 and it also will reflect the projects best practices to be produced by task T105

Public Final management report (si apre in una nuova finestra)

This report will be a publishable public activity report covering main aspects of the work objectives results and conclusions including the publishable results of the final plan for using the knowledge and the plan for sustaining the projects results

Cyber Incident handling Trend Analysis (si apre in una nuova finestra)

Cyber Incident handling Trend Analysis (M6; INRIA). This deliverable will include the outcomes of the Trend Analysis. The deliverable will reflect the outcomes of task T2.1

Prevention and response to advanced threats and anomalies (si apre in una nuova finestra)

Prevention and response to advanced threats and anomalies (M10, STS). This deliverable reflects the state of the art on the detection and response field, and specifies an automated approach for Cyber Fusion Models by selecting particular decision making techniques (T5.1).

Pubblicazioni

AODV-Miner: Consensus-Based Routing Using Node Reputation

Autori: Edward Staddon, Valeria Loscrì, Nathalie Mitton
Pubblicato in: Thessaloniki, Greece, 2022
Editore: IEEE

Bank Credit Risk Management based on Data Mining Techniques (si apre in una nuova finestra)

Autori: Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone
Pubblicato in: Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, Pagina/e 837-843, ISBN 978-989-758-399-5
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009371808370843

Machine Learning for Driver Detection through CAN bus (si apre in una nuova finestra)

Autori: Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), 2020, Pagina/e 1-5, ISBN 978-1-7281-5207-3
Editore: IEEE
DOI: 10.1109/vtc2020-spring48590.2020.9129371

Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory (si apre in una nuova finestra)

Autori: Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis
Pubblicato in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Numero August 2022, 2022, Pagina/e 1-8
Editore: ACM
DOI: 10.1145/3538969.3544425

Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques (si apre in una nuova finestra)

Autori: Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 2020, Pagina/e 499-506, ISBN 978-989-758-426-8
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009817804990506

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web (si apre in una nuova finestra)

Autori: George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou
Pubblicato in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, Pagina/e Article No.: 156 Pages 1–7, ISBN 978-1-4503-9051-4
Editore: Association for Computing Machinery
DOI: 10.1145/3465481.3469201

Android Run-time Permission Exploitation User Awareness by Means of Formal Methods (si apre in una nuova finestra)

Autori: Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, Pagina/e 804-814, ISBN 978-989-758-399-5
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009372308040814

Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence (si apre in una nuova finestra)

Autori: Fabio Martinelli, Fiammetta Marulli, Francesco Mercaldo, Stefano Marrone, Antonella Santone
Pubblicato in: 2020 International Joint Conference on Neural Networks (IJCNN), 2020, Pagina/e 1-8, ISBN 978-1-7281-6926-2
Editore: IEEE
DOI: 10.1109/ijcnn48605.2020.9206801

AODV-Miner : Routage par Consensus Basé sur la Réputation

Autori: Edward Staddon, Valeria Loscri & Nathalie Mitton
Pubblicato in: 7ème Rencontres Francophones sur la Conception de Protocoles, l’Évaluation de Performance et l’Expérimentation des Réseaux de Communication – CORES 2022, 2022
Editore: HAL

Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures (si apre in una nuova finestra)

Autori: Eva Papadogiannaki, Dimitris Deyannis, Sotiris Ioannidis
Pubblicato in: 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2020, Pagina/e 1-6, ISBN 978-1-7281-6339-0
Editore: IEEE
DOI: 10.1109/camad50429.2020.9209308

CyberSane 2022 - International Workshop on Cybersecurity on Critical Infrastructures Management

Autori: Jorge Manuel Martins, Luis Landeiro Ribeiro, Thanos Karantjias, Armend Duzha, Pablo Giménez Salazar, Robert Bordianu, Manfred Criegee-Rieck, Manos Athanathos, Guillermo Yuste
Pubblicato in: ARES 22 Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, Pagina/e xxiv-xxv, ISBN 978-1-4503-9670-7
Editore: ACM

Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study (si apre in una nuova finestra)

Autori: Alexander Shevtsov, Christos Tzagkarakis, Despoina Antonakaki, Sotiris Ioannidis
Pubblicato in: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, Numero Vol. 16, 2022, ISBN 978-1-57735-875-6
Editore: AAAI Press
DOI: 10.48550/arxiv.2112.04913

AODV-Miner: Consensus-Based Routing Using Node Reputation (si apre in una nuova finestra)

Autori: Edward Staddon, Valeria Loscri & Nathalie Mitton
Pubblicato in: 18th International Conference on Wireless and Mobile Computing, Networking and Communications – WiMob 2022, 2022, ISBN 978-1-6654-6975-3
Editore: IEEE
DOI: 10.1109/wimob55322.2022.9941558

This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration (si apre in una nuova finestra)

Autori: Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis & Jason Polakis
Pubblicato in: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Numero November 2021, 2021, Pagina/e 1065–1081, ISBN 978-1-4503-8454-4
Editore: Association for Computing Machinery
DOI: 10.1145/3460120.3485366

Accidental Sensitive Data Leaks Prevention via Formal Verification (si apre in una nuova finestra)

Autori: Madalina Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, Pagina/e 825-834, ISBN 978-989-758-399-5
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009380608250834

VisualDroid - automatic triage and detection of Android repackaged applications (si apre in una nuova finestra)

Autori: Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020, Pagina/e 1-7, ISBN 9781450388337
Editore: ACM
DOI: 10.1145/3407023.3407074

Network Intrusion Detection in Encrypted Traffic (si apre in una nuova finestra)

Autori: Eva Papadogiannaki, Giorgos Tsirantonakis and Sotiris Ioannidis
Pubblicato in: IEEE Conference on Dependable and Secure Computing (DSC), 2022, ISBN 978-1-6654-2142-3
Editore: IEEE
DOI: 10.1109/dsc54232.2022.9888942

Evaluating Deep Learning Classification Reliability in Android Malware Family Detection (si apre in una nuova finestra)

Autori: Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2020, Pagina/e 255-260, ISBN 978-1-7281-7735-9
Editore: IEEE
DOI: 10.1109/issrew51248.2020.00082

Malicious Collusion Detection in Mobile Environment by means of Model Checking (si apre in una nuova finestra)

Autori: Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2020 International Joint Conference on Neural Networks (IJCNN), 2020, Pagina/e 1-6, ISBN 978-1-7281-6926-2
Editore: IEEE
DOI: 10.1109/ijcnn48605.2020.9207638

Colluding Android Apps Detection via Model Checking (si apre in una nuova finestra)

Autori: Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020), Numero 1150, 2020, Pagina/e 776-786, ISBN 978-3-030-44037-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-44038-1_71

Towards an Interpretable Deep Learning Model for Mobile Malware Detection and Family Identification (si apre in una nuova finestra)

Autori: Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Computers & Security, 2021, Pagina/e 102198, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102198

Analysis and Evaluation of Capture the Flag Challenges in Secure Mobile Application Development (si apre in una nuova finestra)

Autori: Stylianos Karagiannis, Emmanouil Magkos, George Chalavazis and Maria Nefeli Nikiforos
Pubblicato in: International Journal on Integrating Technology in Education, Numero 11(2), 2022, Pagina/e 19-35, ISSN 2320-1886
Editore: Natarajan Meghanathan
DOI: 10.5121/ijite.2022.11202

Detecting Colluding Inter-App Communication in Mobile Environment (si apre in una nuova finestra)

Autori: Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Applied Sciences, Numero 10/23, 2020, Pagina/e 8351, ISSN 2076-3417
Editore: MDPI - Applied Science 2020 - Special Issue Cybersecurity
DOI: 10.3390/app10238351

Visualizing the outcome of dynamic analysis of Android malware with VizMal (si apre in una nuova finestra)

Autori: Andrea De Lorenzo, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Antonella Santone
Pubblicato in: Journal of Information Security and Applications, Numero 50, 2020, Pagina/e 102423, ISSN 2214-2126
Editore: Journal of Information Security and Applications
DOI: 10.1016/j.jisa.2019.102423

A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses (si apre in una nuova finestra)

Autori: Alfredo Cuzzocrea, Francesco Mercaldo, Fabio Martinelli
Pubblicato in: Procedia Computer Science, Numero 176, 2020, Pagina/e 2999-3008, ISSN 1877-0509
Editore: Elsevier
DOI: 10.1016/j.procs.2020.09.203

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware (si apre in una nuova finestra)

Autori: Eva Papadogiannaki, Sotiris Ioannidis
Pubblicato in: Sensors, Numero 21/4, 2021, Pagina/e 1140, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21041140

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences (si apre in una nuova finestra)

Autori: Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Information, Numero 11/6, 2020, Pagina/e 304, ISSN 2078-2489
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info11060304

Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

Autori: Edward Staddon, Valeria Loscri, Nathalie Mitton
Pubblicato in: Applied Sciences, 2021, ISSN 2076-3417
Editore: MDPI

Neural Networks for Driver Behavior Analysis (si apre in una nuova finestra)

Autori: Fabio Martinelli, Fiammetta Marulli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Electronics, Numero 10/3, 2021, Pagina/e 342, ISSN 2079-9292
Editore: MDPI - Electronics - Special Issue Security and Trust in Next Generation Cyber-Physical Systems
DOI: 10.3390/electronics10030342

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation (si apre in una nuova finestra)

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Pubblicato in: Simulation Modelling Practice and Theory, Numero 105, 2020, Pagina/e 102169, ISSN 1569-190X
Editore: Elsevier BV
DOI: 10.1016/j.simpat.2020.102169

A consensus-based approach to reputational routing in multi-hop networks (si apre in una nuova finestra)

Autori: Edward Staddon, Valeria Loscri, Nathalie Mitton
Pubblicato in: ITU Journal on Future and Evolving Technologies, 2023, 2023, ISSN 2616-8375
Editore: ITU
DOI: 10.52953/ixzf4584

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection (si apre in una nuova finestra)

Autori: Halima Ibrahim Kure, Shareeful Islam & Haralambos Mouratidis
Pubblicato in: Neural Computing and Applications, Numero Volume 34 - Numero 18 - Sep 2022, 2022, Pagina/e pp 15241–1527, ISSN 0941-0643
Editore: Springer Verlag
DOI: 10.1007/s00521-022-06959-2

Driver Identification through Formal Methods (si apre in una nuova finestra)

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: IEEE Transactions on Intelligent Transportation Systems, 2021, ISSN 1524-9050
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tits.2021.3055347

An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures (si apre in una nuova finestra)

Autori: Eleni-Maria Kalogeraki, Spyridon Papastergiou & Themis Panayiotopoulos
Pubblicato in: Electronics, Numero 11(3), 404, 2022, ISSN 2079-9292
Editore: MDPI
DOI: 10.3390/electronics11030404

Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection (si apre in una nuova finestra)

Autori: Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Applied Sciences, Numero 10/22, 2020, Pagina/e 7975, ISSN 2076-3417
Editore: MDPI - Applied Science 2020 - Special Issue Cybersecurity
DOI: 10.3390/app10227975

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern (si apre in una nuova finestra)

Autori: David G. Rosado, Antonio Santos-Olmo, Luis Enrique Sánchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis & Eduardo Fernández-Medina
Pubblicato in: Computers in Industry, Numero Vol.142, 2022, ISSN 0166-3615
Editore: Elsevier BV
DOI: 10.1016/j.compind.2022.103715

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures (si apre in una nuova finestra)

Autori: Eva Papadogiannaki and Sotiris Ioannidis
Pubblicato in: ACM Computing Surveys, Numero Volume: 54, Numero: 6, Article No: 123, 2021, Pagina/e 1-35, ISSN 0360-0300
Editore: Association for Computing Machinary, Inc.
DOI: 10.1145/3457904

"""The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks”" (si apre in una nuova finestra)

Autori: MICHALIS DIAMANTARIS, FRANCESCO MARCANTONI, SOTIRIS IOANNIDIS, JASON POLAKIS
Pubblicato in: ACM Transactions on Privacy and Security, Numero Volume 23, Numero 4, Article 19, 2020, ISSN 2471-2574
Editore: Association for Computing Machinery
DOI: 10.1145/3403947

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures (si apre in una nuova finestra)

Autori: Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
Pubblicato in: Evolving Systems, 2020, ISSN 1868-6478
Editore: Springer Verlag
DOI: 10.1007/s12530-020-09335-4

Crash Course on CyberSecurity– A manual for surviving in a networked world

Autori: Matej Kovačič
Pubblicato in: 2022, ISBN 978-961-7025-24-8
Editore: University of Nova Gorica Press

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources (si apre in una nuova finestra)

Autori: Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, Antonella Santone
Pubblicato in: Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020), Numero 1150, 2020, Pagina/e 890-901, ISBN 978-3-030-44037-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-44038-1_81

Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques (si apre in una nuova finestra)

Autori: Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone
Pubblicato in: Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020), Numero 1150, 2020, Pagina/e 959-969, ISBN 978-3-030-44037-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-44038-1_87

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation (si apre in una nuova finestra)

Autori: Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Advanced Information Networking and Applications - Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), Numero 1151, 2020, Pagina/e 1368-1382, ISBN 978-3-030-44040-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-44041-1_116

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE) (si apre in una nuova finestra)

Autori: Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
Pubblicato in: Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Xersonisos, Crete, Greece, May 24-26, 2019, Proceedings, Numero 1000, 2019, Pagina/e 476-487, ISBN 978-3-030-20256-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-20257-6_41

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0