Skip to main content
European Commission logo print header

Towards a Sophisticated SIEM Marketplace for Blockchain-based Threat Intelligence and Security-as-a-Service


SMEs&MEs Data Chain and Open APIs Targeting at the Services b

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

Legal, Ethical and Compliance Requirements a

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints

Documentation on the details of the policy modelling to be used for expressing and managing the different types of policies per securitymanagedservice and the definition of the policy constraints based upon asset security and data privacy preferences while complying to the GDPR requirements

Evaluation Framework and Demonstrators Planning

Documentation of the evaluation framework the validation methodology and the set of scenarios that will run during each demonstrator

Legal, Ethical and Compliance Requirements b

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

PUZZLE Demonstrators Requirements, Methodology & MVP

This deliverable will define the two use cases that PUZZLE will address It will provide a detailed view of PUZZLEs reference scenarios and describe a number of use cases within the reference scenarios

Security and Privacy Requirements Analysis

This deliverable will document the identified security and privacy requirements as developed in the frame of Task 11 regarding the implementation of the project as well as the requirements associated with legal ethical and privacy considerations or constraints

Exploitation, Standardisation, Dissemination and Communication Activities Report a

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

SMEs&MEs Data Chain and Open APIs Targeting at the Services a

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

PUZZLE Framework Reference Architecture a

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

Publishable Midterm/Final Report a

This deliverable includes the midtermfinal project report

Project Handbook

A handbook describing the project management procedures adopted in the project

Risk Assessment Methodology and Threat Modelling

Documentation on the normative specification of the threat metamodel that captures all possible vulnerabilities and attacks in an SME Association environment and the nonnormative specification of a multistep RA methodology that has to be applied prior to the risk quantification

Internal and External IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the PUZZLE project to external target groups

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules a

D25 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection sharing and management and D26 will include the implementation of the smart contract mechanisms

PUZZLE Collective Attestation & Runtime Verification a

Documentation on the details of the PUZZLE attestation architecture the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers


Deep Reinforcement Learning in Cloud Elasticity through Offline Learning and Return Based Scaling

Author(s): Miltiadis Chrysopoulos, Ioannis Konstantinou, Nectarios Koziris
Published in: 2023
Publisher: IEEE
DOI: 10.1109/cloud60044.2023.00012

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web

Author(s): George Pantelis; Petros Petrou; Sophia Karagiorgou; Dimitrios Alexandrou
Published in: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Issue 1-7, 2021
Publisher: ACM
DOI: 10.1145/3465481.3469201

A Holistic Framework for Safeguarding of SMEs: A Case Study

Author(s): Nefeli Bountouni; Sotiris Koussouris; Alexandros Vasileiou; Stylianos A. Kazazis
Published in: Issue 1, 2023
Publisher: IEEE
DOI: 10.1109/DRCN57075.2023.10108247

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning

Author(s): Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
Published in: Proceedings 2023 Network and Distributed System Security Symposium, 2023, ISBN 1891562835
Publisher: NDSS Symposium
DOI: 10.14722/ndss.2023.24169

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving

Author(s): George Hatzivasilis; Sotiris Ioannidis; Grigoris Kalogiannis; Manolis Chatzimpyrros; George Spanoudakis; Guillermo Jiménez Prieto; Araceli Rojas Morgan; Miguel Juaniz Lopez; Cataldo Basile; Jose Francisco Ruiz
Published in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Publisher: IEEE
DOI: 10.1109/csr57506.2023.10224971

BinWrap: Hybrid Protection against Native Node.js Add-ons

Author(s): Christou, G., Ntousakis, G., Lahtinen, E., Ioannidis, S., Kemerlis, V. P., & Vasilakis, N.
Published in: ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Publisher: Association for Computing Machinery
DOI: 10.1145/3579856.3590330

Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection

Author(s): Anis Bouaziz; Manh-Dung Nguyen; Valeria Valdés ; Ana Cavalli and Wissam Mallouli
Published in: 2023
Publisher: Scitepress
DOI: 10.5220/0012125100003538

Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study

Author(s): Alexander Shevtsov;Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Published in: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Publisher: AAAI Press
DOI: 10.48550/arxiv.2112.04913

Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries

Author(s): Thanassis Giannetsos; Dimitris Papamartzivanos; Sofia Anna Menesidou; Sophia Karagiorgou
Published in: Proceedings of 30th European Conference on Networks and Communications, Issue 1, 2021
Publisher: IEEE
DOI: 10.5281/zenodo.5337037

Discovery and classification of Twitter bots

Author(s): Alexander Shevtsov; Maria Oikonomidou; Despoina Antonakaki; Polyvios Pratikakis; Alexandros Kanterakis; Paraskevi Fragopoulou; Sotiris Ioannidis
Published in: SN Computer Science, Issue 1, 2022, ISSN 2661-8907
Publisher: Springer Nature
DOI: 10.48550/arxiv.2010.15393

Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections

Author(s): Alexander Shevtsov; Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Published in: Software Impacts, Issue 13,100333, 2022, ISSN 2665-9638
Publisher: Elsevier B.V
DOI: 10.1016/j.simpa.2022.100333

Twitter Dataset on the Russo-Ukrainian War

Author(s): Shevtsov, Alexander; Tzagkarakis, Christos; Antonakaki, Despoina; Pratikakis, Polyvios; Ioannidis, Sotiris
Published in: Issue 1, 2022
Publisher: Cornell University
DOI: 10.48550/arxiv.2204.08530

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available