European Commission logo
English English
CORDIS - EU research results
CORDIS

Democratizing a Cyber Security Toolkit for SMEs and MEs

Deliverables

Initial Services for Data Protection

Report summarizing the work done and tools provided to WP3 during the first project reporting period

CyberKit4SME toolkit specifications

CyberKit4SME toolkit specifications M12

CyberKit4SME requirements analysis

CyberKit4SME requirements analysis M06

CyberKit4SME handbook

CyberKit4SME handbook M36

2nd report on dissemination actions and final results

2nd report on dissemination actions including crossproject collaboration and results M36 Lead UoS Cyber Status PU

1st report on dissemination actions and preliminary results

1st report on dissemination actions including crossproject collaboration and results M18 Lead UoS Cyber Status PU

Cyber range training course content

Cyber range training course content M24 Lead UoS Cyber Status PU

Final Services for Data Protection

Report summarizing the work done and tools provided to WP3 during the subsequent project reporting period

Marketing material, website, D&C Plan

Marketing material website DC Plan M03 Lead UoS Cyber Status PU

Collaborative Working Environment and its maintenance

Collaborative Working Environment and its maintenance M2 Release of the online environment that the Consortium will use as working environment including internal communication tasks monitoring and document sharing It could also provide an area for sharing files with the EC Officers if necessary

Publications

Privacy-Aware IoT: State-of-the-Art and Challenges

Author(s): Shukun Tokas, Gencer Erdogan, Ketil Stølen
Published in: Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP), Issue pp. 450-461, 2023
Publisher: SciTePress
DOI: 10.5220/0011656400003405

Information Security & Risk Management: Trustworthiness and Human Interaction

Author(s): Erdogan, G., Tverdal, S., Phillips, S. & Fair, N.
Published in: Tutorial on International Conference on Research Challenges in Information Science (RCIS), 2022
Publisher: Springer Nature
DOI: 10.1007/978-3-031-05760-1

The HORM Diagramming Tool: A Domain-Specific Modelling Tool for SME Cybersecurity Awareness

Author(s): Costas Boletsis; Sefat Orni; Ragnhild Halvorsrud
Published in: Proceedings of the 18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2023), Issue Volume 3, 2023
Publisher: SciTePress
DOI: 10.5220/0011786600003417

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.

Author(s): Gencer Erdogan, Iver Bakken Sperstad, Michele Garau, Oddbjørn Gjerde, Inger Anne Tøndel, Shukun Tokas, Martin Gilje Jaatun
Published in: Software Technologies - 17th International Conference, ICSOFT 2022, Issue Volume 1859, pp. 98-121, 2022
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-37231-5_5

Tell me what that means to you: Small-story narratives in technology adoption.

Author(s): Pickering, J. B., Phillips, S. & Surridge, M.
Published in: Human-Computer Interaction. Theoretical Approaches and Design Methods - Thematic Area, HCI 2022, Held as Part of the 24th HCI International Conference, (HCII), Issue Volume 13302, pp. 274-289, 2022
Publisher: ACM
DOI: 10.1007/978-3-031-05311-5_19

Private Data Harvesting on Alexa using Third-Party Skills

Author(s): Jack Corbett and Erisa Karafili
Published in: Emerging Technologies for Authorization and Authentication - 4th International Workshop (ETAA), Issue Volume 13136, pp. 127-142, 2021
Publisher: Springer, Lecture Notes in Computer Science
DOI: 10.1007/978-3-030-93747-8_9

Forensic analysis of Tor in Windows environment: A case study

Author(s): Vaia-Maria Angeli; Ahmad Atamli; Erisa Karafili
Published in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Issue Article No.: 156, 2022
Publisher: ACM
DOI: 10.1145/3538969.3543808

An end-to-end framework for privacy risk assessment of AI models

Author(s): Goldsteen, A., Shachor, S. & Razinkov, N.
Published in: SYSTOR '22: The 15th ACM International Systems and Storage Conference, 2022
Publisher: ACM
DOI: 10.1145/3534056.3534998

Cybersecurity for SMEs: Introducing the Human Element into Socio-Technical Cybersecurity Risk Assessment

Author(s): Konstantinos Boletsis, Ragnhild Halvorsrud, J. Brian Pickering, Stephen Phillips, Mike Surridge
Published in: Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), Issue Volume 3, pp. 266-274, 2021
Publisher: SciTePress
DOI: 10.5220/0010332902660274

A Need for Privacy-Assistive Technology in Notice and Consent Paradigm in IoT

Author(s): Shukun Tokas, Gencer Erdogan
Published in: Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe, Issue Volume 1807, pp. 35-49, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-36096-1_3

Cybersecurity Awareness and Capacities of SMEs

Author(s): Erdogan, Gencer; Halvorsrud, Ragnhild; Boletsis, Costas; Tverdal, Simeon; Pickering, John Brian
Published in: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), 2023
Publisher: Scitepress
DOI: 10.5220/0011609600003405

Pickering, J. B., Phillips, S. & Erdogan, G.

Author(s): I Just Want to Help: SMEs Engaging with Cybersecurity Technology.
Published in: HCI for Cybersecurity, Privacy and Trust - 5th International Conference (HCI-CPT), Held as Part of the 25th HCI International Conference (HCII), Issue Volume 14045, pp. 338-352, 2023
Publisher: SPRINGER
DOI: 10.1007/978-3-031-35822-7_23

Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)

Author(s): Kaiying Luan; Ragnhild Halvorsrud; Costas Boletsis
Published in: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), Issue Volume 1, 509-518, 2023
Publisher: scitepress
DOI: 10.5220/0011680500003405

Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles.

Author(s): Sorin Mihai Grigorescu; Tiberiu T. Cocias; Bogdan Trasnea; Andrea Margheri; Federico Lombardi; Leonardo Aniello
Published in: Sensors, Issue Volume 20, 2020, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20195450

A Hybrid Threat Model for Smart Systems

Author(s): Fulvio Valenza; Erisa Karafili; Rodrigo Vieira Steiner; Emil C. Lupu
Published in: IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3213577

It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness.

Author(s): J. Brian Pickering; Costas Boletsis; Ragnhild Halvorsrud; Stephen Phillips; Mike Surridge
Published in: HCI for Cybersecurity, Privacy and Trust - Third International Conference (HCI-CPT), 2021
Publisher: Springer
DOI: 10.1007/978-3-030-77392-2_22

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available