Deliverables Documents, reports (10) Preparedness Workshop Report providing collected know-how, expectations and requirements from CyberRange users and manufacturing security professional and gap analysis versus existing capacity Demonstration Assessment Report report on demonstration campaigns and results of assessment by users Automotive Demonstration Public demonstration of CONTI Pilot Adversarial/Robust AI development methodology a detailed report will be completed with focus on counter against potential malicious users. Legal framework for accountability allocation and liability distribution report on the regulatory challenges exante allocation of duties and ex post distribution of liability Liability Workshop Report lessons learned, feedback and expectations from AI experts, manufacturing users, Law makers and Law Enforcement actors Maritime Demonstration Public demonstration of NAVAL Pilot Standardization guidelines landscape of standards guidelines for action towards standardization groups and further involvement of project partners in standardization activities Operational guidelines for collaborative OT forensics detailed report on the forensics framework focusing on data gathering across the whole manufacturing environment Aerospace Demonstration Public demonstration of AIRBUS Pilot Websites, patent fillings, videos etc. (1) Communication Tools website, blogs, collaborative workspace, logo, templates, posters, flyers, posters and other communication means Publications Peer reviewed articles (1) Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities Author(s): Adrien Bécue, Isabel Praça, João Gama Published in: Artificial Intelligence Review, Issue 54/5, 2021, Page(s) 3849-3886, ISSN 0269-2821 Publisher: Kluwer Academic Publishers DOI: 10.1007/s10462-020-09942-2 Conference proceedings (8) Similarity-Based Clustering For IoT Device Classification Author(s): Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle Published in: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021, Page(s) 1-7, ISBN 978-1-6654-3156-9 Publisher: IEEE DOI: 10.1109/coins51742.2021.9524201 Combining System Integrity Verification with Identity and Access Management Author(s): Markku Kylänpää, Jarno Salonen Published in: Vol. 21 No. 1 (2022): Proceedings of the 21st European Conference on Cyber Warfare and Security, Issue 16.-17.6.2022, 2022 Publisher: https://www.academic-conferences.org/conferences/eccws/ DOI: 10.34190/eccws.21.1.202 Proof-of-concept for a Granular Incident Management Information Sharing Scheme Author(s): Emanuilov Ivo, Latvala Outi-Marja, Niskanen Tatu, Raitio Pia, Salonen Jarno, Santos Diogo, Yordanova Katerina Published in: Proceedings of the IEEE World AI IoT Conference 2022, Issue 6.-9.6.2022, 2022 Publisher: IEEE Developing the Factory of the Future Cybersecurity and Resilience Author(s): Adrian Kotelba, Jarno Salonen Published in: 2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), Issue 17.-19.6.2022, 2022 Publisher: http://spiscs.net/ Experimental Remote Attestation over OPC UA Protocol Author(s): Juhola Arto, Kylänpää Markku Published in: 2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022) http://spiscs.net/, Issue 17.-19.6.2022, 2022 Publisher: http://spiscs.net/ Review on Cybersecurity Threats Related to Cyber Ranges Author(s): Noponen Sami, Pärssinen Juha, Salonen Jarno Published in: Proceedings of the 16th International Conference for Internet Technology and Secured Transactions, Issue 6.-8.12.2021, 2021 Publisher: https://icitst.org/ How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control Author(s): Salonen, Jarno; Niskanen, Tatu; Raitio, Pia Published in: 8th International Conference on Computer Science, Information Technology (CSITEC 2022), Issue 23.-24.4.2022, 2022, Page(s) 195-208 Publisher: AIRCC Publishing Corporation DOI: 10.5121/csit.2022.120717 The Digital Forensics of Cyber Attacks at Electrical Power Grid Substation Author(s): Pärssinen Juha, Raussi Petra, Noponen Sami, Opas Mikael, Salonen Jarno Published in: 10th International Symposium on Digital Forensics and Security (ISDFS 2022), 6.-7.6.2022, Istanbul, Turkey, Issue 6.-7.6.2022, 2022 Publisher: https://isdfs.org/ Book chapters (3) Secure Data Processing for Industrial Remote Diagnosis and Maintenance Author(s): Walid Arabi, Reda Yaich, Aymen Boudguiga, Mawloud Omar Published in: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, Issue 12528, 2021, Page(s) 335-346, ISBN 978-3-030-68886-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-68887-5_21 Security Through Transparency and Openness in Computer Design Author(s): Ivo Emanuilov Published in: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, Issue 12528, 2021, Page(s) 105-116, ISBN 978-3-030-68886-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-68887-5_6 A Deeper Analysis of Adversarial Examples in Intrusion Detection Author(s): Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich Published in: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, Issue 12528, 2021, Page(s) 67-84, ISBN 978-3-030-68886-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-68887-5_4 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available