Skip to main content

Secure Collaborative Intelligent Industrial Assets

Deliverables

Preparedness Workshop Report

providing collected know-how, expectations and requirements from CyberRange users and manufacturing security professional and gap analysis versus existing capacity

Demonstration Assessment Report

report on demonstration campaigns and results of assessment by users

Automotive Demonstration

Public demonstration of CONTI Pilot

Adversarial/Robust AI development methodology

a detailed report will be completed with focus on counter against potential malicious users.

Legal framework for accountability allocation and liability distribution

report on the regulatory challenges exante allocation of duties and ex post distribution of liability

Liability Workshop Report

lessons learned, feedback and expectations from AI experts, manufacturing users, Law makers and Law Enforcement actors

Maritime Demonstration

Public demonstration of NAVAL Pilot

Standardization guidelines

landscape of standards guidelines for action towards standardization groups and further involvement of project partners in standardization activities

Operational guidelines for collaborative OT forensics

detailed report on the forensics framework focusing on data gathering across the whole manufacturing environment

Aerospace Demonstration

Public demonstration of AIRBUS Pilot

Communication Tools

website, blogs, collaborative workspace, logo, templates, posters, flyers, posters and other communication means

Publications

Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities

Author(s): Adrien Bécue, Isabel Praça, João Gama
Published in: Artificial Intelligence Review, 54/5, 2021, Page(s) 3849-3886, ISSN 0269-2821
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10462-020-09942-2

Similarity-Based Clustering For IoT Device Classification

Author(s): Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle
Published in: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021, Page(s) 1-7, ISBN 978-1-6654-3156-9
Publisher: IEEE
DOI: 10.1109/coins51742.2021.9524201

Combining System Integrity Verification with Identity and Access Management

Author(s): Markku Kylänpää, Jarno Salonen
Published in: Vol. 21 No. 1 (2022): Proceedings of the 21st European Conference on Cyber Warfare and Security, 16.-17.6.2022, 2022
Publisher: https://www.academic-conferences.org/conferences/eccws/
DOI: 10.34190/eccws.21.1.202

Proof-of-concept for a Granular Incident Management Information Sharing Scheme

Author(s): Emanuilov Ivo, Latvala Outi-Marja, Niskanen Tatu, Raitio Pia, Salonen Jarno, Santos Diogo, Yordanova Katerina
Published in: Proceedings of the IEEE World AI IoT Conference 2022, 6.-9.6.2022, 2022
Publisher: IEEE

Developing the Factory of the Future Cybersecurity and Resilience

Author(s): Adrian Kotelba, Jarno Salonen
Published in: 2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), 17.-19.6.2022, 2022
Publisher: http://spiscs.net/

Experimental Remote Attestation over OPC UA Protocol

Author(s): Juhola Arto, Kylänpää Markku
Published in: 2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022) http://spiscs.net/, 17.-19.6.2022, 2022
Publisher: http://spiscs.net/

Review on Cybersecurity Threats Related to Cyber Ranges

Author(s): Noponen Sami, Pärssinen Juha, Salonen Jarno
Published in: Proceedings of the 16th International Conference for Internet Technology and Secured Transactions, 6.-8.12.2021, 2021
Publisher: https://icitst.org/

How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control

Author(s): Salonen, Jarno; Niskanen, Tatu; Raitio, Pia
Published in: 8th International Conference on Computer Science, Information Technology (CSITEC 2022), 23.-24.4.2022, 2022, Page(s) 195-208
Publisher: AIRCC Publishing Corporation
DOI: 10.5121/csit.2022.120717

The Digital Forensics of Cyber Attacks at Electrical Power Grid Substation

Author(s): Pärssinen Juha, Raussi Petra, Noponen Sami, Opas Mikael, Salonen Jarno
Published in: 10th International Symposium on Digital Forensics and Security (ISDFS 2022), 6.-7.6.2022, Istanbul, Turkey, 6.-7.6.2022, 2022
Publisher: https://isdfs.org/

Secure Data Processing for Industrial Remote Diagnosis and Maintenance

Author(s): Walid Arabi, Reda Yaich, Aymen Boudguiga, Mawloud Omar
Published in: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, 12528, 2021, Page(s) 335-346, ISBN 978-3-030-68886-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-68887-5_21

Security Through Transparency and Openness in Computer Design

Author(s): Ivo Emanuilov
Published in: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, 12528, 2021, Page(s) 105-116, ISBN 978-3-030-68886-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-68887-5_6

A Deeper Analysis of Adversarial Examples in Intrusion Detection

Author(s): Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich
Published in: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, 12528, 2021, Page(s) 67-84, ISBN 978-3-030-68886-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-68887-5_4