Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

nIoVe’s web site - v1 (si apre in una nuova finestra)

Website structure report and branding/dissemination material and channels. Associated Task: T8.1.

nIoVe's web site - v3 (si apre in una nuova finestra)

Website structure report and branding/dissemination material and channels. This report updated D8.3 and D8.12. Associated Task: T8.1.

nIoVe’s web site - v2 (si apre in una nuova finestra)

Website structure report and branding/dissemination material and channels. The report updated D8.3. Associated Task: T8.1.

Adaptive Graphical user Interfaces - v1 (si apre in una nuova finestra)

A public software deliverable, led by CERTH, featuring the Adaptive Graphical User Interfaces. The report will be revised in the course of the project (one just after the end of the first reporting period (M25) and one just before the end of the second reporting period (M35)). Associated Task: T6.4.

Detailed dissemination and communication plan - v3 (si apre in una nuova finestra)

Strategy documentation for dissemination stakeholder engagement during project lifetime This report updated D81 and D89 Associated Task T81

Detailed dissemination and communication plan - v1 (si apre in una nuova finestra)

Strategy documentation for dissemination & stakeholder engagement during project lifetime. Associated Task: T8.1.

System Integration & Final nIoVe Prototype - v1 (si apre in una nuova finestra)

A public software led by CERTH featuring the nIoVe Prototype The report will be revised in the course of the project one just before the end of the first reporting period M23 and one just before the end of the second reporting period M33 Associated Task T62

Detailed dissemination and communication plan - v2 (si apre in una nuova finestra)

Strategy documentation for dissemination & stakeholder engagement during project lifetime. The report updated D8.1. Associated Task: T8.1.

CAVs Cybersecurity threats digest and analysis (si apre in una nuova finestra)

Report of systematic analysis of the cybersecurity landscape with a focus on digital security of CAVs Associated Task T21

Security, Privacy & Data Protection Guidelines for nIoVe (si apre in una nuova finestra)

A public report led by ICT documenting the Security Privacy Data Protection Guidelines for nIoVe Associated Task 75

CBA/CEA analysis of nIoVe solutions (si apre in una nuova finestra)

A public report led by HOPU documenting the Cost Benefit Analysis and Cost Effectiveness Analysis Associated Task T74

Contributions to the standardization bodies, consortium and Alliances - v2 (si apre in una nuova finestra)

A public report describing in details contributions to the standardization bodies consortiums and Alliances The report updated D87 Associated Task T84

nIoVe Final Dissemination, Exploitation and Standardization report (si apre in una nuova finestra)

Final report of the project that includes nIoVe Final Dissemination Exploitation and Standardization information Associated Task T83

Survey on existing CAVs security and privacy standards (si apre in una nuova finestra)

A public report describing in details security and privacy standards of CAVs Associated Task T84

Contributions to the standardization bodies, consortium and Alliances - v1 (si apre in una nuova finestra)

A public report describing in details contributions to the standardization bodies consortiums and Alliances The report will be revised in the course of the project one just before the end of the first reporting period M24 and one just before the end of the second reporting period M36 Associated Task T84

Interoperability Coordination & Open Standards - v1 (si apre in una nuova finestra)

A public report led by HOPU documenting the optimal plan for developing metadata frameworks to enable data interoperability and exchange of information between subsystems The report will be revised in the course of the project one just after the end of the first reporting period M26 and one just before the end of the second reporting period M35 Associated Task 63

Report of Stakeholder Requirements, Needs & Interests (si apre in una nuova finestra)

Report of the user requirements of the project Associated Tasks T22

Integration Roadmap of the Cybersecurity Solution for the IoV (si apre in una nuova finestra)

A public report led by RISE documenting the stepped integration process and the methods the various nIoVe components will be technically validated before final release Associated Task T61

Interoperability Coordination & Open Standards - v2 (si apre in una nuova finestra)

A public report led by HOPU documenting the optimal plan for developing metadata frameworks to enable data interoperability and exchange of information between subsystems The report updated D63 Associated Task 63

Business Models & Final plan for the use and exploitation of foreground (si apre in una nuova finestra)

A public report led by HOPU documenting the final exploitation strategy and business plans Associated Task T83

Definition of the Cybersecurity certification protocol and tools for CAVs (si apre in una nuova finestra)

A public report led by ICTLC documenting the Cybersecurity certification protocol and tools for CAVs Associated Task 76

Report on Dissemination Activities, Public Participation and Awareness (si apre in una nuova finestra)

A public report led by SEEMS documenting the dissemination strategy and plan Associated Task T81

nIoVe Pilots Installations & Lessons Learned - v1 (si apre in una nuova finestra)

The first iteration of the pilot, led by NAVYA. The report will be revised in the course of the project (one just before the end of the first reporting period (M18) and one just before the end of the second reporting period (M35)). Associated Task: T7.2.

CAVs Market analysis and nIoVe exploitation strategy - v1 (si apre in una nuova finestra)

A public report led by HOPU documenting the Market analysis for cybersecurity across the IoV The report will be revised in the course of the project one just before the end of the first reporting period M24 and one just before the end of the second reporting period M35 Associated Task T82

Detailed dissemination and communication plan - v4 (si apre in una nuova finestra)

Strategy documentation for dissemination stakeholder engagement during project lifetime This report updated D81 D89 and D810 Associated Task T81

Threat Intelligence Repository - v2 (si apre in una nuova finestra)

A public software deliverable led by TUM, featuring the Threat Intelligence Repository. The report updated D6.5. Associated Task: T6.5.

Hypothesis testing toolkit - v2 (si apre in una nuova finestra)

A confidential, only for members of the consortium software, led by SEEMS, featuring the Hypothesis Testing Toolkit. The report updated D4.2. Associated Task: T4.2.

Continuous Big Data Monitoring Tool - v2 (si apre in una nuova finestra)

A confidential, only for members of the consortium software, led by UniGe, featuring the Continuous Big Data Monitoring Tool. The report updated D4.3. Associated Task: T4.3.

Threat Intelligence Repository - v1 (si apre in una nuova finestra)

A public software deliverable, led by TUM, featuring the Threat Intelligence Repository. The report will be revised in the course of the project (one just after the end of the first reporting period (M28) and one just before the end of the second reporting period (M34)). Associated Task: T6.5.

Visual Analytics Suite for Situational Awareness Engine - v2 (si apre in una nuova finestra)

A confidential, only for members of the consortium software, led by CERTH, featuring the Visual Analytics Suite for Situational Awareness Engine. The report updated D4.4. Associated Task: T4.4.

Pubblicazioni

On the analysis of open-source datasets: validating IDS implementation for well-known and zero-day attack detection (si apre in una nuova finestra)

Autori: Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Pubblicato in: The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 16th International Conference on Future Networks and Communications (FNC), The 11th International Conference on Sustainable Energy Information Technology, 2021
Editore: Elsevier
DOI: 10.1016/j.procs.2021.07.024

Toward Generating a DoS and Scan Statistical Network Traffic Metrics for Building Intrusion Detection Solution Based on Machine and Deep Learning: I-Sec-IDS Datasets (si apre in una nuova finestra)

Autori: Serinelli, Benedetto Marco
Pubblicato in: International Conference on Computational Intelligence and Network Security (ICCINS-2022), 2022
Editore: ICCINS-2022
DOI: 10.5281/zenodo.6657210

FoRePlan: Supporting Digital Forensics Readiness Planning for Internet of Vehicles (si apre in una nuova finestra)

Autori: CHRISTINA KATSINI, GEORGE E. RAPTIS, CHRISTOS ALEXAKOS, DIMITRIOS SERPANOS
Pubblicato in: PCI 2021: 25th Pan-Hellenic Conference on Informatics, 2021, ISBN 9781450395557
Editore: Association for Computing Machinery
DOI: 10.1145/3503823.3503891

Towards a Blockchain-based Identity and Trust Management Framework for the IoV Ecosystem (si apre in una nuova finestra)

Autori: Anastasia Theodouli, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras, Jan Lauinger, Sebastian Steinhorst
Pubblicato in: 2020 Global Internet of Things Summit (GIoTS), 2020, Pagina/e 1-6, ISBN 978-1-7281-6728-2
Editore: IEEE
DOI: 10.1109/GIOTS49054.2020.9119623

SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication (si apre in una nuova finestra)

Autori: Mohammad Hamad; Emanuel Regnath; Jan Lauinger; Vassilis Prevelakis; Sebastian Steinhorst
Pubblicato in: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021, Pagina/e 529-534
Editore: IEEE
DOI: 10.23919/date51398.2021.9474070

Complex Engineering Systems as an enabler for security in Internet of Vehicles: The nIoVe approach (si apre in una nuova finestra)

Autori: Angeliki Zacharaki, Ioannis Paliokas, Konstantinos Votis, Christos Alexakos, Dimitrios Serpanos, Dimitrios Tzovaras
Pubblicato in: 2019 First International Conference on Societal Automation (SA), 2019, Pagina/e 1-8, ISBN 978-1-7281-3345-4
Editore: IEEE
DOI: 10.1109/sa47457.2019.8938044

Attack Data Generation Framework for Autonomous Vehicle Sensors (si apre in una nuova finestra)

Autori: Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad, Sebastian Steinhorst
Pubblicato in: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Numero 15581101, 2022, Pagina/e 128-131, ISSN 1558-1101
Editore: IEEE
DOI: 10.23919/date54114.2022.9774542

Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment (si apre in una nuova finestra)

Autori: George E. Raptis, Christina Katsini, Christos Alexakos
Pubblicato in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Pagina/e 366-371, ISBN 978-1-6654-0285-9
Editore: IEEE
DOI: 10.1109/csr51186.2021.9527983

A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management (si apre in una nuova finestra)

Autori: Jan Lauinger, Jens Ernstberger, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst
Pubblicato in: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2021), 2021, ISBN 978-1-6654-3578-9
Editore: IEEE
DOI: 10.1109/icbc51069.2021.9461082

Security and trust preserving inter‐ and intra‐cloud VM migrations (si apre in una nuova finestra)

Autori: Mudassar Aslam, Simon Bouget, Shahid Raza
Pubblicato in: International Journal of Network Management, 2020, ISSN 1055-7148
Editore: John Wiley & Sons Inc.
DOI: 10.1002/nem.2103

Reshaping the Intelligent Transportation Scene: Challenges of an Operational and Safe Internet of Vehicles (si apre in una nuova finestra)

Autori: Christos Alexakos, Konstantinos Votis, Dimitrios Tzovaras, Dimitrios Serpanos
Pubblicato in: Computer, Numero 15580814, 2022, Pagina/e 104-107, ISSN 1558-0814
Editore: IEEE
DOI: 10.1109/mc.2021.3125075

Crowd Monitoring in Smart Destinations Based on GDPR-Ready Opportunistic RF Scanning and Classification of WiFi Devices to Identify and Classify Visitors’ Origins (si apre in una nuova finestra)

Autori: Alberto Berenguer; David Fernández Ros; Andrea Gómez-Oliva; Josep A. Ivars-Baidal; Antonio J. Jara; Jaime Laborda; Jose-Norberto Mazón; Angel Perles
Pubblicato in: Electronics, Numero 20799292, 2022, Pagina/e 835, ISSN 2079-9292
Editore: Electronics
DOI: 10.3390/electronics11060835

Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments (si apre in una nuova finestra)

Autori: Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam
Pubblicato in: Computers & Security, Numero 01674048, 2022, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102904

The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis (si apre in una nuova finestra)

Autori: M. Benyahya, S. Kechagia, A. Collen, and N. A. Nijdam
Pubblicato in: Journal Applied Sciences, Numero 20763417, 2022, ISSN 2076-3417
Editore: MDPI
DOI: 10.3390/app12094413

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility (si apre in una nuova finestra)

Autori: Valaenthin Tratter, Mudassar Aslam, and Shahid Raza
Pubblicato in: Journal of Advanced Transportation, Numero 20423195, 2021, ISSN 2042-3195
Editore: Wiley Hindawi
DOI: 10.1155/2021/5569331

Temporal-based intrusion detection for IoV (si apre in una nuova finestra)

Autori: Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Pubblicato in: it - Information Technology, Numero 62/5-6, 2020, Pagina/e 227-239, ISSN 2196-7032
Editore: De Gruyter Oldenbourg
DOI: 10.1515/itit-2020-0009

CAVeCTIR: Matching Cyber Threat Intelligence Reports on Connected and Autonomous Vehicles Using Machine Learning (si apre in una nuova finestra)

Autori: Raptis, G.E.; Katsini, C.; Alexakos, C.; Kalogeras, A.; Serpanos, D
Pubblicato in: Applied Sciences, Numero 20763417, 2022, Pagina/e 11631, ISSN 2076-3417
Editore: Basel: MDPI AG, 2011-
DOI: 10.3390/app122211631

Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments (si apre in una nuova finestra)

Autori: Anastasija Collen, Niels Alexander Nijdam
Pubblicato in: Electronics, Numero 20799292, 2022, ISSN 2079-9292
Editore: MDPI
DOI: 10.3390/electronics11071123

Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol (si apre in una nuova finestra)

Autori: LEA SCHÖNBERGER, MOHAMMAD HAMAD, JAVIERVELASQUEZ GOMEZ, SEBASTIAN STEINHORST, SELMASAIDI
Pubblicato in: IEEE Access, Numero 21693536, 2021, Pagina/e 157398 - 157410, ISSN 2169-3536
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3127852

Enabling Digital Forensics Readiness for Internet of Vehicles (si apre in una nuova finestra)

Autori: C. Alexakos; Christina Katsini; K. Votis; Antonios Lalas; Dimitrios Tzovaras; D. Serpanos
Pubblicato in: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, Numero 23521465, 2021, Pagina/e 339-346, ISSN 2352-1465
Editore: ELSEVIER B.V.
DOI: 10.1016/j.trpro.2021.01.040

Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System (si apre in una nuova finestra)

Autori: Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Pubblicato in: Procedia Computer Science, Numero 175, 2020, Pagina/e 560-565, ISSN 1877-0509
Editore: Elsevier B.V.
DOI: 10.1016/j.procs.2020.07.080

Digital Forensic Readiness in Internet ofVehicles: The Denial-of-Service on CAN bus Case Study

Autori: Katsini C, Raptis GE, Livitckaia K, Votis K, Alexakos C
Pubblicato in: Annals of Forensic Science and Research, 2022, ISSN 2637-4900
Editore: MedDocs Publishers LLC

Quantitative System-Level Security Verification of the IoV Infrastructure (si apre in una nuova finestra)

Autori: Lauinger, Jan; Aslam, Mudassar; Hamad, Mohammad; Raza, Shahid; Steinhorst, Sebastian
Pubblicato in: 2021
Editore: arXiv
DOI: 10.48550/arxiv.2101.06137

Designing Connected and Automated Vehicles around Legal and Ethical Concerns – Data Protection as a Corporate Social Responsibility (si apre in una nuova finestra)

Autori: Balboni, P., Botsi, A., Francis, K., Taborda Barata, M.
Pubblicato in: 11th EETN Conference on Artificial Intelligence 2020 (SETN2020 Workshops), 2020
Editore: WAIEL2020
DOI: 10.5281/zenodo.7291693

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0