European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Secure Collaborative Intelligent Industrial Assets

Rezultaty

Preparedness Workshop Report

providing collected know-how, expectations and requirements from CyberRange users and manufacturing security professional and gap analysis versus existing capacity

Demonstration Assessment Report

report on demonstration campaigns and results of assessment by users

Automotive Demonstration

Public demonstration of CONTI Pilot

Adversarial/Robust AI development methodology

a detailed report will be completed with focus on counter against potential malicious users.

Legal framework for accountability allocation and liability distribution

report on the regulatory challenges exante allocation of duties and ex post distribution of liability

Liability Workshop Report

lessons learned, feedback and expectations from AI experts, manufacturing users, Law makers and Law Enforcement actors

Maritime Demonstration

Public demonstration of NAVAL Pilot

Standardization guidelines

landscape of standards guidelines for action towards standardization groups and further involvement of project partners in standardization activities

Operational guidelines for collaborative OT forensics

detailed report on the forensics framework focusing on data gathering across the whole manufacturing environment

Aerospace Demonstration

Public demonstration of AIRBUS Pilot

Communication Tools

website, blogs, collaborative workspace, logo, templates, posters, flyers, posters and other communication means

Publikacje

Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities

Autorzy: Adrien Bécue, Isabel Praça, João Gama
Opublikowane w: Artificial Intelligence Review, Numer 54/5, 2021, Strona(/y) 3849-3886, ISSN 0269-2821
Wydawca: Kluwer Academic Publishers
DOI: 10.1007/s10462-020-09942-2

Cybersecurity of Cyber Ranges: Threats and Mitigation (accepted)

Autorzy: Noponen Sami, Pärssinen Juha, Salonen Jarno
Opublikowane w: International Journal for Information Security Research (IJISR), 2022, ISSN 2042-4639
Wydawca: Infonomics Society

Similarity-Based Clustering For IoT Device Classification

Autorzy: Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle
Opublikowane w: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021, Strona(/y) 1-7, ISBN 978-1-6654-3156-9
Wydawca: IEEE
DOI: 10.1109/coins51742.2021.9524201

Combining System Integrity Verification with Identity and Access Management

Autorzy: Markku Kylänpää, Jarno Salonen
Opublikowane w: Vol. 21 No. 1 (2022): Proceedings of the 21st European Conference on Cyber Warfare and Security, Numer 16.-17.6.2022, 2022
Wydawca: https://www.academic-conferences.org/conferences/eccws/
DOI: 10.34190/eccws.21.1.202

Proof-of-concept for a Granular Incident Management Information Sharing Scheme

Autorzy: Emanuilov Ivo, Latvala Outi-Marja, Niskanen Tatu, Raitio Pia, Salonen Jarno, Santos Diogo, Yordanova Katerina
Opublikowane w: Proceedings of the IEEE World AI IoT Conference 2022, Numer 6.-9.6.2022, 2022
Wydawca: IEEE

Developing the Factory of the Future Cybersecurity and Resilience

Autorzy: Adrian Kotelba, Jarno Salonen
Opublikowane w: 2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), Numer 17.-19.6.2022, 2022
Wydawca: http://spiscs.net/

Experimental Remote Attestation over OPC UA Protocol

Autorzy: Juhola Arto, Kylänpää Markku
Opublikowane w: 2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022) http://spiscs.net/, Numer 17.-19.6.2022, 2022
Wydawca: http://spiscs.net/

Review on Cybersecurity Threats Related to Cyber Ranges

Autorzy: Noponen Sami, Pärssinen Juha, Salonen Jarno
Opublikowane w: Proceedings of the 16th International Conference for Internet Technology and Secured Transactions, Numer 6.-8.12.2021, 2021
Wydawca: https://icitst.org/

How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control

Autorzy: Salonen, Jarno; Niskanen, Tatu; Raitio, Pia
Opublikowane w: 8th International Conference on Computer Science, Information Technology (CSITEC 2022), Numer 23.-24.4.2022, 2022, Strona(/y) 195-208
Wydawca: AIRCC Publishing Corporation
DOI: 10.5121/csit.2022.120717

The Digital Forensics of Cyber Attacks at Electrical Power Grid Substation

Autorzy: Pärssinen Juha, Raussi Petra, Noponen Sami, Opas Mikael, Salonen Jarno
Opublikowane w: 10th International Symposium on Digital Forensics and Security (ISDFS 2022), 6.-7.6.2022, Istanbul, Turkey, Numer 6.-7.6.2022, 2022
Wydawca: https://isdfs.org/

Secure Data Processing for Industrial Remote Diagnosis and Maintenance

Autorzy: Walid Arabi, Reda Yaich, Aymen Boudguiga, Mawloud Omar
Opublikowane w: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, Numer 12528, 2021, Strona(/y) 335-346, ISBN 978-3-030-68886-8
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-68887-5_21

Security Through Transparency and Openness in Computer Design

Autorzy: Ivo Emanuilov
Opublikowane w: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, Numer 12528, 2021, Strona(/y) 105-116, ISBN 978-3-030-68886-8
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-68887-5_6

A Deeper Analysis of Adversarial Examples in Intrusion Detection

Autorzy: Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich
Opublikowane w: Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers, Numer 12528, 2021, Strona(/y) 67-84, ISBN 978-3-030-68886-8
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-68887-5_4

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników