Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

nIoVe’s web site - v1 (se abrirá en una nueva ventana)

Website structure report and branding/dissemination material and channels. Associated Task: T8.1.

nIoVe's web site - v3 (se abrirá en una nueva ventana)

Website structure report and branding/dissemination material and channels. This report updated D8.3 and D8.12. Associated Task: T8.1.

nIoVe’s web site - v2 (se abrirá en una nueva ventana)

Website structure report and branding/dissemination material and channels. The report updated D8.3. Associated Task: T8.1.

Adaptive Graphical user Interfaces - v1 (se abrirá en una nueva ventana)

A public software deliverable, led by CERTH, featuring the Adaptive Graphical User Interfaces. The report will be revised in the course of the project (one just after the end of the first reporting period (M25) and one just before the end of the second reporting period (M35)). Associated Task: T6.4.

Detailed dissemination and communication plan - v3 (se abrirá en una nueva ventana)

Strategy documentation for dissemination stakeholder engagement during project lifetime This report updated D81 and D89 Associated Task T81

Detailed dissemination and communication plan - v1 (se abrirá en una nueva ventana)

Strategy documentation for dissemination & stakeholder engagement during project lifetime. Associated Task: T8.1.

System Integration & Final nIoVe Prototype - v1 (se abrirá en una nueva ventana)

A public software led by CERTH featuring the nIoVe Prototype The report will be revised in the course of the project one just before the end of the first reporting period M23 and one just before the end of the second reporting period M33 Associated Task T62

Detailed dissemination and communication plan - v2 (se abrirá en una nueva ventana)

Strategy documentation for dissemination & stakeholder engagement during project lifetime. The report updated D8.1. Associated Task: T8.1.

CAVs Cybersecurity threats digest and analysis (se abrirá en una nueva ventana)

Report of systematic analysis of the cybersecurity landscape with a focus on digital security of CAVs Associated Task T21

Security, Privacy & Data Protection Guidelines for nIoVe (se abrirá en una nueva ventana)

A public report led by ICT documenting the Security Privacy Data Protection Guidelines for nIoVe Associated Task 75

CBA/CEA analysis of nIoVe solutions (se abrirá en una nueva ventana)

A public report led by HOPU documenting the Cost Benefit Analysis and Cost Effectiveness Analysis Associated Task T74

Contributions to the standardization bodies, consortium and Alliances - v2 (se abrirá en una nueva ventana)

A public report describing in details contributions to the standardization bodies consortiums and Alliances The report updated D87 Associated Task T84

nIoVe Final Dissemination, Exploitation and Standardization report (se abrirá en una nueva ventana)

Final report of the project that includes nIoVe Final Dissemination Exploitation and Standardization information Associated Task T83

Survey on existing CAVs security and privacy standards (se abrirá en una nueva ventana)

A public report describing in details security and privacy standards of CAVs Associated Task T84

Contributions to the standardization bodies, consortium and Alliances - v1 (se abrirá en una nueva ventana)

A public report describing in details contributions to the standardization bodies consortiums and Alliances The report will be revised in the course of the project one just before the end of the first reporting period M24 and one just before the end of the second reporting period M36 Associated Task T84

Interoperability Coordination & Open Standards - v1 (se abrirá en una nueva ventana)

A public report led by HOPU documenting the optimal plan for developing metadata frameworks to enable data interoperability and exchange of information between subsystems The report will be revised in the course of the project one just after the end of the first reporting period M26 and one just before the end of the second reporting period M35 Associated Task 63

Report of Stakeholder Requirements, Needs & Interests (se abrirá en una nueva ventana)

Report of the user requirements of the project Associated Tasks T22

Integration Roadmap of the Cybersecurity Solution for the IoV (se abrirá en una nueva ventana)

A public report led by RISE documenting the stepped integration process and the methods the various nIoVe components will be technically validated before final release Associated Task T61

Interoperability Coordination & Open Standards - v2 (se abrirá en una nueva ventana)

A public report led by HOPU documenting the optimal plan for developing metadata frameworks to enable data interoperability and exchange of information between subsystems The report updated D63 Associated Task 63

Business Models & Final plan for the use and exploitation of foreground (se abrirá en una nueva ventana)

A public report led by HOPU documenting the final exploitation strategy and business plans Associated Task T83

Definition of the Cybersecurity certification protocol and tools for CAVs (se abrirá en una nueva ventana)

A public report led by ICTLC documenting the Cybersecurity certification protocol and tools for CAVs Associated Task 76

Report on Dissemination Activities, Public Participation and Awareness (se abrirá en una nueva ventana)

A public report led by SEEMS documenting the dissemination strategy and plan Associated Task T81

nIoVe Pilots Installations & Lessons Learned - v1 (se abrirá en una nueva ventana)

The first iteration of the pilot, led by NAVYA. The report will be revised in the course of the project (one just before the end of the first reporting period (M18) and one just before the end of the second reporting period (M35)). Associated Task: T7.2.

CAVs Market analysis and nIoVe exploitation strategy - v1 (se abrirá en una nueva ventana)

A public report led by HOPU documenting the Market analysis for cybersecurity across the IoV The report will be revised in the course of the project one just before the end of the first reporting period M24 and one just before the end of the second reporting period M35 Associated Task T82

Detailed dissemination and communication plan - v4 (se abrirá en una nueva ventana)

Strategy documentation for dissemination stakeholder engagement during project lifetime This report updated D81 D89 and D810 Associated Task T81

Threat Intelligence Repository - v2 (se abrirá en una nueva ventana)

A public software deliverable led by TUM, featuring the Threat Intelligence Repository. The report updated D6.5. Associated Task: T6.5.

Hypothesis testing toolkit - v2 (se abrirá en una nueva ventana)

A confidential, only for members of the consortium software, led by SEEMS, featuring the Hypothesis Testing Toolkit. The report updated D4.2. Associated Task: T4.2.

Continuous Big Data Monitoring Tool - v2 (se abrirá en una nueva ventana)

A confidential, only for members of the consortium software, led by UniGe, featuring the Continuous Big Data Monitoring Tool. The report updated D4.3. Associated Task: T4.3.

Threat Intelligence Repository - v1 (se abrirá en una nueva ventana)

A public software deliverable, led by TUM, featuring the Threat Intelligence Repository. The report will be revised in the course of the project (one just after the end of the first reporting period (M28) and one just before the end of the second reporting period (M34)). Associated Task: T6.5.

Visual Analytics Suite for Situational Awareness Engine - v2 (se abrirá en una nueva ventana)

A confidential, only for members of the consortium software, led by CERTH, featuring the Visual Analytics Suite for Situational Awareness Engine. The report updated D4.4. Associated Task: T4.4.

Publicaciones

On the analysis of open-source datasets: validating IDS implementation for well-known and zero-day attack detection (se abrirá en una nueva ventana)

Autores: Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Publicado en: The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 16th International Conference on Future Networks and Communications (FNC), The 11th International Conference on Sustainable Energy Information Technology, 2021
Editor: Elsevier
DOI: 10.1016/j.procs.2021.07.024

Toward Generating a DoS and Scan Statistical Network Traffic Metrics for Building Intrusion Detection Solution Based on Machine and Deep Learning: I-Sec-IDS Datasets (se abrirá en una nueva ventana)

Autores: Serinelli, Benedetto Marco
Publicado en: International Conference on Computational Intelligence and Network Security (ICCINS-2022), 2022
Editor: ICCINS-2022
DOI: 10.5281/zenodo.6657210

FoRePlan: Supporting Digital Forensics Readiness Planning for Internet of Vehicles (se abrirá en una nueva ventana)

Autores: CHRISTINA KATSINI, GEORGE E. RAPTIS, CHRISTOS ALEXAKOS, DIMITRIOS SERPANOS
Publicado en: PCI 2021: 25th Pan-Hellenic Conference on Informatics, 2021, ISBN 9781450395557
Editor: Association for Computing Machinery
DOI: 10.1145/3503823.3503891

Towards a Blockchain-based Identity and Trust Management Framework for the IoV Ecosystem (se abrirá en una nueva ventana)

Autores: Anastasia Theodouli, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras, Jan Lauinger, Sebastian Steinhorst
Publicado en: 2020 Global Internet of Things Summit (GIoTS), 2020, Página(s) 1-6, ISBN 978-1-7281-6728-2
Editor: IEEE
DOI: 10.1109/GIOTS49054.2020.9119623

SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication (se abrirá en una nueva ventana)

Autores: Mohammad Hamad; Emanuel Regnath; Jan Lauinger; Vassilis Prevelakis; Sebastian Steinhorst
Publicado en: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021, Página(s) 529-534
Editor: IEEE
DOI: 10.23919/date51398.2021.9474070

Complex Engineering Systems as an enabler for security in Internet of Vehicles: The nIoVe approach (se abrirá en una nueva ventana)

Autores: Angeliki Zacharaki, Ioannis Paliokas, Konstantinos Votis, Christos Alexakos, Dimitrios Serpanos, Dimitrios Tzovaras
Publicado en: 2019 First International Conference on Societal Automation (SA), 2019, Página(s) 1-8, ISBN 978-1-7281-3345-4
Editor: IEEE
DOI: 10.1109/sa47457.2019.8938044

Attack Data Generation Framework for Autonomous Vehicle Sensors (se abrirá en una nueva ventana)

Autores: Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad, Sebastian Steinhorst
Publicado en: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Edición 15581101, 2022, Página(s) 128-131, ISSN 1558-1101
Editor: IEEE
DOI: 10.23919/date54114.2022.9774542

Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment (se abrirá en una nueva ventana)

Autores: George E. Raptis, Christina Katsini, Christos Alexakos
Publicado en: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Página(s) 366-371, ISBN 978-1-6654-0285-9
Editor: IEEE
DOI: 10.1109/csr51186.2021.9527983

A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management (se abrirá en una nueva ventana)

Autores: Jan Lauinger, Jens Ernstberger, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst
Publicado en: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2021), 2021, ISBN 978-1-6654-3578-9
Editor: IEEE
DOI: 10.1109/icbc51069.2021.9461082

Security and trust preserving inter‐ and intra‐cloud VM migrations (se abrirá en una nueva ventana)

Autores: Mudassar Aslam, Simon Bouget, Shahid Raza
Publicado en: International Journal of Network Management, 2020, ISSN 1055-7148
Editor: John Wiley & Sons Inc.
DOI: 10.1002/nem.2103

Reshaping the Intelligent Transportation Scene: Challenges of an Operational and Safe Internet of Vehicles (se abrirá en una nueva ventana)

Autores: Christos Alexakos, Konstantinos Votis, Dimitrios Tzovaras, Dimitrios Serpanos
Publicado en: Computer, Edición 15580814, 2022, Página(s) 104-107, ISSN 1558-0814
Editor: IEEE
DOI: 10.1109/mc.2021.3125075

Crowd Monitoring in Smart Destinations Based on GDPR-Ready Opportunistic RF Scanning and Classification of WiFi Devices to Identify and Classify Visitors’ Origins (se abrirá en una nueva ventana)

Autores: Alberto Berenguer; David Fernández Ros; Andrea Gómez-Oliva; Josep A. Ivars-Baidal; Antonio J. Jara; Jaime Laborda; Jose-Norberto Mazón; Angel Perles
Publicado en: Electronics, Edición 20799292, 2022, Página(s) 835, ISSN 2079-9292
Editor: Electronics
DOI: 10.3390/electronics11060835

Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments (se abrirá en una nueva ventana)

Autores: Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam
Publicado en: Computers & Security, Edición 01674048, 2022, ISSN 0167-4048
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102904

The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis (se abrirá en una nueva ventana)

Autores: M. Benyahya, S. Kechagia, A. Collen, and N. A. Nijdam
Publicado en: Journal Applied Sciences, Edición 20763417, 2022, ISSN 2076-3417
Editor: MDPI
DOI: 10.3390/app12094413

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility (se abrirá en una nueva ventana)

Autores: Valaenthin Tratter, Mudassar Aslam, and Shahid Raza
Publicado en: Journal of Advanced Transportation, Edición 20423195, 2021, ISSN 2042-3195
Editor: Wiley Hindawi
DOI: 10.1155/2021/5569331

Temporal-based intrusion detection for IoV (se abrirá en una nueva ventana)

Autores: Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Publicado en: it - Information Technology, Edición 62/5-6, 2020, Página(s) 227-239, ISSN 2196-7032
Editor: De Gruyter Oldenbourg
DOI: 10.1515/itit-2020-0009

CAVeCTIR: Matching Cyber Threat Intelligence Reports on Connected and Autonomous Vehicles Using Machine Learning (se abrirá en una nueva ventana)

Autores: Raptis, G.E.; Katsini, C.; Alexakos, C.; Kalogeras, A.; Serpanos, D
Publicado en: Applied Sciences, Edición 20763417, 2022, Página(s) 11631, ISSN 2076-3417
Editor: Basel: MDPI AG, 2011-
DOI: 10.3390/app122211631

Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments (se abrirá en una nueva ventana)

Autores: Anastasija Collen, Niels Alexander Nijdam
Publicado en: Electronics, Edición 20799292, 2022, ISSN 2079-9292
Editor: MDPI
DOI: 10.3390/electronics11071123

Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol (se abrirá en una nueva ventana)

Autores: LEA SCHÖNBERGER, MOHAMMAD HAMAD, JAVIERVELASQUEZ GOMEZ, SEBASTIAN STEINHORST, SELMASAIDI
Publicado en: IEEE Access, Edición 21693536, 2021, Página(s) 157398 - 157410, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3127852

Enabling Digital Forensics Readiness for Internet of Vehicles (se abrirá en una nueva ventana)

Autores: C. Alexakos; Christina Katsini; K. Votis; Antonios Lalas; Dimitrios Tzovaras; D. Serpanos
Publicado en: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, Edición 23521465, 2021, Página(s) 339-346, ISSN 2352-1465
Editor: ELSEVIER B.V.
DOI: 10.1016/j.trpro.2021.01.040

Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System (se abrirá en una nueva ventana)

Autores: Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Publicado en: Procedia Computer Science, Edición 175, 2020, Página(s) 560-565, ISSN 1877-0509
Editor: Elsevier B.V.
DOI: 10.1016/j.procs.2020.07.080

Digital Forensic Readiness in Internet ofVehicles: The Denial-of-Service on CAN bus Case Study

Autores: Katsini C, Raptis GE, Livitckaia K, Votis K, Alexakos C
Publicado en: Annals of Forensic Science and Research, 2022, ISSN 2637-4900
Editor: MedDocs Publishers LLC

Quantitative System-Level Security Verification of the IoV Infrastructure (se abrirá en una nueva ventana)

Autores: Lauinger, Jan; Aslam, Mudassar; Hamad, Mohammad; Raza, Shahid; Steinhorst, Sebastian
Publicado en: 2021
Editor: arXiv
DOI: 10.48550/arxiv.2101.06137

Designing Connected and Automated Vehicles around Legal and Ethical Concerns – Data Protection as a Corporate Social Responsibility (se abrirá en una nueva ventana)

Autores: Balboni, P., Botsi, A., Francis, K., Taborda Barata, M.
Publicado en: 11th EETN Conference on Artificial Intelligence 2020 (SETN2020 Workshops), 2020
Editor: WAIEL2020
DOI: 10.5281/zenodo.7291693

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0