CORDIS - Forschungsergebnisse der EU
CORDIS

Democratizing a Cyber Security Toolkit for SMEs and MEs

Leistungen

Initial Services for Data Protection

Report summarizing the work done and tools provided to WP3 during the first project reporting period

CyberKit4SME toolkit specifications

CyberKit4SME toolkit specifications M12

CyberKit4SME requirements analysis

CyberKit4SME requirements analysis M06

CyberKit4SME handbook

CyberKit4SME handbook M36

2nd report on dissemination actions and final results

2nd report on dissemination actions including crossproject collaboration and results M36 Lead UoS Cyber Status PU

1st report on dissemination actions and preliminary results

1st report on dissemination actions including crossproject collaboration and results M18 Lead UoS Cyber Status PU

Cyber range training course content

Cyber range training course content M24 Lead UoS Cyber Status PU

Final Services for Data Protection

Report summarizing the work done and tools provided to WP3 during the subsequent project reporting period

Marketing material, website, D&C Plan

Marketing material website DC Plan M03 Lead UoS Cyber Status PU

Collaborative Working Environment and its maintenance

Collaborative Working Environment and its maintenance M2 Release of the online environment that the Consortium will use as working environment including internal communication tasks monitoring and document sharing It could also provide an area for sharing files with the EC Officers if necessary

Veröffentlichungen

Privacy-Aware IoT: State-of-the-Art and Challenges

Autoren: Shukun Tokas, Gencer Erdogan, Ketil Stølen
Veröffentlicht in: Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP), Ausgabe pp. 450-461, 2023
Herausgeber: SciTePress
DOI: 10.5220/0011656400003405

Information Security & Risk Management: Trustworthiness and Human Interaction

Autoren: Erdogan, G., Tverdal, S., Phillips, S. & Fair, N.
Veröffentlicht in: Tutorial on International Conference on Research Challenges in Information Science (RCIS), 2022
Herausgeber: Springer Nature
DOI: 10.1007/978-3-031-05760-1

The HORM Diagramming Tool: A Domain-Specific Modelling Tool for SME Cybersecurity Awareness

Autoren: Costas Boletsis; Sefat Orni; Ragnhild Halvorsrud
Veröffentlicht in: Proceedings of the 18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2023), Ausgabe Volume 3, 2023
Herausgeber: SciTePress
DOI: 10.5220/0011786600003417

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.

Autoren: Gencer Erdogan, Iver Bakken Sperstad, Michele Garau, Oddbjørn Gjerde, Inger Anne Tøndel, Shukun Tokas, Martin Gilje Jaatun
Veröffentlicht in: Software Technologies - 17th International Conference, ICSOFT 2022, Ausgabe Volume 1859, pp. 98-121, 2022
Herausgeber: Springer, Cham
DOI: 10.1007/978-3-031-37231-5_5

Tell me what that means to you: Small-story narratives in technology adoption.

Autoren: Pickering, J. B., Phillips, S. & Surridge, M.
Veröffentlicht in: Human-Computer Interaction. Theoretical Approaches and Design Methods - Thematic Area, HCI 2022, Held as Part of the 24th HCI International Conference, (HCII), Ausgabe Volume 13302, pp. 274-289, 2022
Herausgeber: ACM
DOI: 10.1007/978-3-031-05311-5_19

Private Data Harvesting on Alexa using Third-Party Skills

Autoren: Jack Corbett and Erisa Karafili
Veröffentlicht in: Emerging Technologies for Authorization and Authentication - 4th International Workshop (ETAA), Ausgabe Volume 13136, pp. 127-142, 2021
Herausgeber: Springer, Lecture Notes in Computer Science
DOI: 10.1007/978-3-030-93747-8_9

Forensic analysis of Tor in Windows environment: A case study

Autoren: Vaia-Maria Angeli; Ahmad Atamli; Erisa Karafili
Veröffentlicht in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Ausgabe Article No.: 156, 2022
Herausgeber: ACM
DOI: 10.1145/3538969.3543808

An end-to-end framework for privacy risk assessment of AI models

Autoren: Goldsteen, A., Shachor, S. & Razinkov, N.
Veröffentlicht in: SYSTOR '22: The 15th ACM International Systems and Storage Conference, 2022
Herausgeber: ACM
DOI: 10.1145/3534056.3534998

Cybersecurity for SMEs: Introducing the Human Element into Socio-Technical Cybersecurity Risk Assessment

Autoren: Konstantinos Boletsis, Ragnhild Halvorsrud, J. Brian Pickering, Stephen Phillips, Mike Surridge
Veröffentlicht in: Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), Ausgabe Volume 3, pp. 266-274, 2021
Herausgeber: SciTePress
DOI: 10.5220/0010332902660274

A Need for Privacy-Assistive Technology in Notice and Consent Paradigm in IoT

Autoren: Shukun Tokas, Gencer Erdogan
Veröffentlicht in: Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe, Ausgabe Volume 1807, pp. 35-49, 2022
Herausgeber: Springer
DOI: 10.1007/978-3-031-36096-1_3

Cybersecurity Awareness and Capacities of SMEs

Autoren: Erdogan, Gencer; Halvorsrud, Ragnhild; Boletsis, Costas; Tverdal, Simeon; Pickering, John Brian
Veröffentlicht in: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), 2023
Herausgeber: Scitepress
DOI: 10.5220/0011609600003405

Pickering, J. B., Phillips, S. & Erdogan, G.

Autoren: I Just Want to Help: SMEs Engaging with Cybersecurity Technology.
Veröffentlicht in: HCI for Cybersecurity, Privacy and Trust - 5th International Conference (HCI-CPT), Held as Part of the 25th HCI International Conference (HCII), Ausgabe Volume 14045, pp. 338-352, 2023
Herausgeber: SPRINGER
DOI: 10.1007/978-3-031-35822-7_23

Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)

Autoren: Kaiying Luan; Ragnhild Halvorsrud; Costas Boletsis
Veröffentlicht in: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), Ausgabe Volume 1, 509-518, 2023
Herausgeber: scitepress
DOI: 10.5220/0011680500003405

Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles.

Autoren: Sorin Mihai Grigorescu; Tiberiu T. Cocias; Bogdan Trasnea; Andrea Margheri; Federico Lombardi; Leonardo Aniello
Veröffentlicht in: Sensors, Ausgabe Volume 20, 2020, ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20195450

A Hybrid Threat Model for Smart Systems

Autoren: Fulvio Valenza; Erisa Karafili; Rodrigo Vieira Steiner; Emil C. Lupu
Veröffentlicht in: IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, ISSN 1545-5971
Herausgeber: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3213577

It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness.

Autoren: J. Brian Pickering; Costas Boletsis; Ragnhild Halvorsrud; Stephen Phillips; Mike Surridge
Veröffentlicht in: HCI for Cybersecurity, Privacy and Trust - Third International Conference (HCI-CPT), 2021
Herausgeber: Springer
DOI: 10.1007/978-3-030-77392-2_22

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor