European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Democratizing a Cyber Security Toolkit for SMEs and MEs

Resultado final

Initial Services for Data Protection

Report summarizing the work done and tools provided to WP3 during the first project reporting period

CyberKit4SME toolkit specifications

CyberKit4SME toolkit specifications M12

CyberKit4SME requirements analysis

CyberKit4SME requirements analysis M06

CyberKit4SME handbook

CyberKit4SME handbook M36

2nd report on dissemination actions and final results

2nd report on dissemination actions including crossproject collaboration and results M36 Lead UoS Cyber Status PU

1st report on dissemination actions and preliminary results

1st report on dissemination actions including crossproject collaboration and results M18 Lead UoS Cyber Status PU

Cyber range training course content

Cyber range training course content M24 Lead UoS Cyber Status PU

Final Services for Data Protection

Report summarizing the work done and tools provided to WP3 during the subsequent project reporting period

Marketing material, website, D&C Plan

Marketing material website DC Plan M03 Lead UoS Cyber Status PU

Collaborative Working Environment and its maintenance

Collaborative Working Environment and its maintenance M2 Release of the online environment that the Consortium will use as working environment including internal communication tasks monitoring and document sharing It could also provide an area for sharing files with the EC Officers if necessary

Publicaciones

Privacy-Aware IoT: State-of-the-Art and Challenges

Autores: Shukun Tokas, Gencer Erdogan, Ketil Stølen
Publicado en: Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP), Edición pp. 450-461, 2023
Editor: SciTePress
DOI: 10.5220/0011656400003405

Information Security & Risk Management: Trustworthiness and Human Interaction

Autores: Erdogan, G., Tverdal, S., Phillips, S. & Fair, N.
Publicado en: Tutorial on International Conference on Research Challenges in Information Science (RCIS), 2022
Editor: Springer Nature
DOI: 10.1007/978-3-031-05760-1

The HORM Diagramming Tool: A Domain-Specific Modelling Tool for SME Cybersecurity Awareness

Autores: Costas Boletsis; Sefat Orni; Ragnhild Halvorsrud
Publicado en: Proceedings of the 18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2023), Edición Volume 3, 2023
Editor: SciTePress
DOI: 10.5220/0011786600003417

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.

Autores: Gencer Erdogan, Iver Bakken Sperstad, Michele Garau, Oddbjørn Gjerde, Inger Anne Tøndel, Shukun Tokas, Martin Gilje Jaatun
Publicado en: Software Technologies - 17th International Conference, ICSOFT 2022, Edición Volume 1859, pp. 98-121, 2022
Editor: Springer, Cham
DOI: 10.1007/978-3-031-37231-5_5

Tell me what that means to you: Small-story narratives in technology adoption.

Autores: Pickering, J. B., Phillips, S. & Surridge, M.
Publicado en: Human-Computer Interaction. Theoretical Approaches and Design Methods - Thematic Area, HCI 2022, Held as Part of the 24th HCI International Conference, (HCII), Edición Volume 13302, pp. 274-289, 2022
Editor: ACM
DOI: 10.1007/978-3-031-05311-5_19

Private Data Harvesting on Alexa using Third-Party Skills

Autores: Jack Corbett and Erisa Karafili
Publicado en: Emerging Technologies for Authorization and Authentication - 4th International Workshop (ETAA), Edición Volume 13136, pp. 127-142, 2021
Editor: Springer, Lecture Notes in Computer Science
DOI: 10.1007/978-3-030-93747-8_9

Forensic analysis of Tor in Windows environment: A case study

Autores: Vaia-Maria Angeli; Ahmad Atamli; Erisa Karafili
Publicado en: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Edición Article No.: 156, 2022
Editor: ACM
DOI: 10.1145/3538969.3543808

An end-to-end framework for privacy risk assessment of AI models

Autores: Goldsteen, A., Shachor, S. & Razinkov, N.
Publicado en: SYSTOR '22: The 15th ACM International Systems and Storage Conference, 2022
Editor: ACM
DOI: 10.1145/3534056.3534998

Cybersecurity for SMEs: Introducing the Human Element into Socio-Technical Cybersecurity Risk Assessment

Autores: Konstantinos Boletsis, Ragnhild Halvorsrud, J. Brian Pickering, Stephen Phillips, Mike Surridge
Publicado en: Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), Edición Volume 3, pp. 266-274, 2021
Editor: SciTePress
DOI: 10.5220/0010332902660274

A Need for Privacy-Assistive Technology in Notice and Consent Paradigm in IoT

Autores: Shukun Tokas, Gencer Erdogan
Publicado en: Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe, Edición Volume 1807, pp. 35-49, 2022
Editor: Springer
DOI: 10.1007/978-3-031-36096-1_3

Cybersecurity Awareness and Capacities of SMEs

Autores: Erdogan, Gencer; Halvorsrud, Ragnhild; Boletsis, Costas; Tverdal, Simeon; Pickering, John Brian
Publicado en: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), 2023
Editor: Scitepress
DOI: 10.5220/0011609600003405

Pickering, J. B., Phillips, S. & Erdogan, G.

Autores: I Just Want to Help: SMEs Engaging with Cybersecurity Technology.
Publicado en: HCI for Cybersecurity, Privacy and Trust - 5th International Conference (HCI-CPT), Held as Part of the 25th HCI International Conference (HCII), Edición Volume 14045, pp. 338-352, 2023
Editor: SPRINGER
DOI: 10.1007/978-3-031-35822-7_23

Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)

Autores: Kaiying Luan; Ragnhild Halvorsrud; Costas Boletsis
Publicado en: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), Edición Volume 1, 509-518, 2023
Editor: scitepress
DOI: 10.5220/0011680500003405

Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles.

Autores: Sorin Mihai Grigorescu; Tiberiu T. Cocias; Bogdan Trasnea; Andrea Margheri; Federico Lombardi; Leonardo Aniello
Publicado en: Sensors, Edición Volume 20, 2020, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20195450

A Hybrid Threat Model for Smart Systems

Autores: Fulvio Valenza; Erisa Karafili; Rodrigo Vieira Steiner; Emil C. Lupu
Publicado en: IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, ISSN 1545-5971
Editor: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3213577

It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness.

Autores: J. Brian Pickering; Costas Boletsis; Ragnhild Halvorsrud; Stephen Phillips; Mike Surridge
Publicado en: HCI for Cybersecurity, Privacy and Trust - Third International Conference (HCI-CPT), 2021
Editor: Springer
DOI: 10.1007/978-3-030-77392-2_22

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles