Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Practical Autonomous Cyberhealth for resilient SMEs & Microenterprises

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Hybrid Threat Intelligence Framework- First release (si apre in una nuova finestra)

D51 The integrated data analytics engine based on ML and DL for threat detection and classification first release accompanied by reports describing the implementation and usage guidelines All WP5 tasks contribute to this deliverable T53 and T52 for threat detection and classification T54 for remediation activities and T51 for traffic accumulation and preprocessing

PALANTIR Secure Services Ecosystem - Second release (si apre in una nuova finestra)

D3.2. A set of software prototypes of the trusted & virtualised security services to be used in PALANTIR (Second release), accompanied by reports describing the implementation and usage guidelines. Linked with all WP3 tasks, mainly with T3.2 (services orchestration), T3.1 (individual security services), T3.4 (service catalogue) and T3.3 (risk calculation mechanisms).

Hybrid Threat Intelligence Framework - Second release (si apre in una nuova finestra)

D5.2. The integrated data analytics engine (based on ML and DL) for threat detection and classification (second release), accompanied by reports describing the implementation and usage guidelines. All WP5 tasks contribute to this deliverable, T5.3 and T5.2 (for threat detection and classification), T5.4 (for remediation activities) and T5.1 (for traffic accumulation and pre-processing).

PALANTIR Secure Services Ecosystem - First release (si apre in una nuova finestra)

A set of software prototypes of the trusted virtualised security services to be used in PALANTIR First release accompanied by reports describing the implementation and usage guidelines Linked with all WP3 tasks mainly with T32 services orchestration T31 individual security services T34 service catalogue and T33 risk calculation mechanisms

Dashboard, Reporting and Threat Sharing Platform - First release (si apre in una nuova finestra)

D41 A set of software prototypes of the Security Dashboard for interacting with the PALANTIR framework reporting and sharing threat intelligence information First release accompanied by reports describing the implementation and usage guidelinesPrimarily linked with T41 for the dashboard functionalities and also with T43 service matching and accounting

Dashboard, Reporting and Threat Sharing Platform - Second release (si apre in una nuova finestra)

D4.3 A set of software prototypes of the Security Dashboard for interacting with the PALANTIR framework, reporting and sharing threat intelligence information, accompanied by reports describing the implementation and usage guidelines (Second release)Primarily linked with T4.1 (for the dashboard functionalities) and also with T4.3 (service matching and accounting).

Integration & Validation Report: Use case results and playbook (first prototype) (si apre in una nuova finestra)

D61 Report describing the integrated Prototype of the PALANTIR framework as well as the evaluationverification results on the use cases first prototypeLinked with T61 integration and testing but also with the 3 UCs T62 T63 T64

Trust, Attestation and Verification Framework -Specifications of first release (si apre in una nuova finestra)

D42 The set of reports describing the implementation and usage guidelines for attesting the integrity of hardware and software modulesSpecifications of first release Linked mainly with T44 different attestation mechanisms and with T42 fault management

Integration & Validation Report: Use case results and playbook (final prototype) (si apre in una nuova finestra)

D62 Report describing the integrated Prototype of the PALANTIR framework as well as the evaluationverification results on the use cases final prototype Linked with T61 integration and testing but also with the 3 UCs T62 T63 T64

Trust, Attestation and Verification Framework -Specifications of second release (si apre in una nuova finestra)

D44 The set of reports describing the implementation and usage guidelines for attesting the integrity of hardware and software modules Linked mainly with T44 different attestation mechanisms and with T42 fault management

Threat analysis & AS-based risk assessment (si apre in una nuova finestra)

D22 Comprehensive definition of the relevant attack classes entryexit points channels data stores etc in SDNNFV and cloudnative deploymentsLinked with T24

Risk Reduction measures (si apre in una nuova finestra)

D24 Highlevel identification of measures to reduce security risks in service oriented infrastructures Linked with T24

Requirements & high-level design - Final (si apre in una nuova finestra)

D23 Systemlevel requirements for the PALANTIR framework and highlevel technical design and specifications Final version Primarily linked with T21 functional requirements also with T22 business and legal requirements T23 UC requirements

Requirements & high-level design - Interim (si apre in una nuova finestra)

D21 System level requirements for PALANTIR framework highlevel designs and specifications interim version Primarily linked with T21 functional requirements also with T22 business and legal requirements T23 UC requirements

Project website & social media accounts (si apre in una nuova finestra)

D72 The project public website and the established projects accounts on the selected social media platforms Linked with T73 Digital presence

Pubblicazioni

syslrn: Learning What to Monitor for Efficient Anomaly Detection (si apre in una nuova finestra)

Autori: Davide Sanvito; Giuseppe Siracusano; Sharan Santhanam; Roberto Gonzalez; Roberto Bifulco
Pubblicato in: ACM EuroMLSys 2022, Numero 28, 2022, ISBN 978-1-4503-9254-9
Editore: ACM EuroMLSys 2022
DOI: 10.1145/3517207.3526979

A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection. (si apre in una nuova finestra)

Autori: Alejandro A. Moreno-Sancho, Antonio Pastor, Ignacio D. Martinez-Casanueva, Daniel González-Sánchez, Luis Bellido Triana
Pubblicato in: International Conference on Intelligence in Next Generation Networks (ICIN), 2023, Pagina/e 105-112, ISBN 979-8-3503-9804-5
Editore: IEEE
DOI: 10.1109/icin56760.2023.10073490

Prediphant: Short Term Heavy User Prediction (si apre in una nuova finestra)

Autori: Davide Sanvito; Giuseppe Siracusano; Roberto Gonzalez; Roberto Bifulco
Pubblicato in: IEEE/IET CSNDSP 2022, Numero 26, 2022, ISBN 978-1-6654-1044-1
Editore: IEEE/IET
DOI: 10.1109/csndsp54353.2022.9907909

Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection (si apre in una nuova finestra)

Autori: Daniel González-Sánchez, Ignacio D. Martinez-Casanueva, Antonio Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cabronero, Diego Lopez
Pubblicato in: IEEE Netsoft (SecSoft workshop), 2022, Pagina/e 450-455, ISBN 978-1-6654-0694-9
Editore: IEEE
DOI: 10.1109/netsoft54395.2022.9844107

Re-architecting Traffic Analysis with Neural Network Interface Cards (si apre in una nuova finestra)

Autori: Giuseppe Siracusano; Salvator Galea; Davide Sanvito; Mohammad Malekzadeh; Gianni Antichi; Paolo Costa; Hamed Haddadi; Roberto Bifulco
Pubblicato in: USENIX NSDI 2022, Numero 32, 2022, ISBN 978-1-939133-27-4
Editore: USENIX
DOI: 10.5281/zenodo.6446562

Provision of Security-as-a-Service (SecaaS) in Lightweight Scenarios (si apre in una nuova finestra)

Autori: Antonio López Martínez; Mattia Zago; Manuel Gil Pérez
Pubblicato in: VII Jornadas Nacionales en Investigación en Ciberseguridad (JNIC), Numero 12, 2022, Pagina/e 327-330, ISBN 978-84-88734-13-6
Editore: Fundación Tecnalia Research and Innovation
DOI: 10.5281/zenodo.6856500

PALANTIR: Zero-Trust Architecture for Managed Security Service Provider (si apre in una nuova finestra)

Autori: Maxime Compastié; Silvia Sisinni; Supreshna Gurung; Carolina Fernández; Ludovic Jacquin; Izidor Mlakar; Valentino Šafran; Antonio Lioy; Ignazio Pedone
Pubblicato in: Proceedings of the 29th Computer & Electronics Security Application Rendezvous (C&ESAR): Ensuring Trust in a Decentralized World, Numero 16, 2023, ISSN 1613-0073
Editore: CEUR Workshop Proceedings
DOI: 10.5281/zenodo.7545474

PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments (si apre in una nuova finestra)

Autori: Carolina Fernández, Davide Sanvito, Orestis Kompougias, Valentino Safran, Maxime Compastié, Ignazio Pedone, Antonio López Martínez, Manuel Gil Pérez, Akis Kourtis, George Xylouris, Izidor Mlakar, Stylianos Tsarsitalidis, Dimitrios Klonidis, Daniele Canavese, Vangelis Logothetis, Diego Lopez, Antonio Pastor, Antonio Lioy, Ludovic Jacquin, Supreshna Gurung, Roberto Bifulco, Athanasios Priovolos
Pubblicato in: IEEE Meditcom, 2022, Pagina/e 82-85, ISBN 978-1-6654-9825-8
Editore: IEEE
DOI: 10.1109/meditcom55741.2022.9928648

Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection (si apre in una nuova finestra)

Autori: Davide Sanvito; Giuseppe Siracusano; Roberto González; Roberto Bifulco
Pubblicato in: ACM CCS 2022, Numero 25, 2022, Pagina/e 3455–3457, ISBN 978-1-4503-9450-5
Editore: ACM
DOI: 10.1145/3548606.3563529

A Model for Automated Cybersecurity Threat Remediation and Sharing (si apre in una nuova finestra)

Autori: Francesco Settanni; Leonardo Regano; Cataldo Basile; Antonio Lioy
Pubblicato in: 2023 IEEE 9th International Conference on Network Softwarization (NetSoft), Numero 20, 2023
Editore: IEEE
DOI: 10.1109/NetSoft57336.2023.10175486

PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation (si apre in una nuova finestra)

Autori: Maxime Compastié, Antonio López Martínez, Carolina Fernández, Manuel Gil Pérez, Stylianos Tsarsitalidis, George Xylouris, Izidor Mlakar, Michail Alexandros Kourtis, and Valentino Šafran
Pubblicato in: "MDPI Sensors, Special Numero ""Security and Privacy in Cloud Computing Environment""", 2023, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s23031658

A novel architecture to virtualise a hardware-bound trusted platform module (si apre in una nuova finestra)

Autori: Marco De Benedictis, Ludovic Jacquin, Ignazio Pedone, Andrea Atzeni, Antonio Lioy
Pubblicato in: Future Generation Computer Systems, 2023, ISSN 0167-739X
Editore: Elsevier BV
DOI: 10.1016/j.future.2023.08.012

Data set and machine learning models for the classification of network traffic originators (si apre in una nuova finestra)

Autori: Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
Pubblicato in: Computers & Electrical Engineering, Numero 25, 2022, ISSN 2352-3409
Editore: Elsevier BV
DOI: 10.1016/j.dib.2022.107968

Adaptive Vulnerability-Based Risk Identification Software with Virtualization Functions for Dynamic Management (si apre in una nuova finestra)

Autori: A. García Pérez, A. López Martínez, M. Gil Pérez
Pubblicato in: Journal of Network and Computer Applications, 2023, ISSN 1084-8045
Editore: Academic Press
DOI: 10.1016/j.jnca.2023.103728

A comprehensive review of the state of the art on security and privacy issues in Healthcare (si apre in una nuova finestra)

Autori: Antonio López Martínez, Manuel Gil Pérez, Antonio Ruiz Martínez
Pubblicato in: ACM Computer Surveys, 2022, ISSN 0360-0300
Editore: Association for Computing Machinary, Inc.
DOI: 10.1145/3571156

Encryption-agnostic classifiers of traffic originators and their application to anomaly detection (si apre in una nuova finestra)

Autori: Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
Pubblicato in: Data in Brief, Numero 30, 2022, ISSN 0045-7906
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2021.107621

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0