Skip to main content
European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Towards a Sophisticated SIEM Marketplace for Blockchain-based Threat Intelligence and Security-as-a-Service

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

SMEs&MEs Data Chain and Open APIs Targeting at the Services b

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

Legal, Ethical and Compliance Requirements a

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints

Documentation on the details of the policy modelling to be used for expressing and managing the different types of policies per securitymanagedservice and the definition of the policy constraints based upon asset security and data privacy preferences while complying to the GDPR requirements

Evaluation Framework and Demonstrators Planning

Documentation of the evaluation framework the validation methodology and the set of scenarios that will run during each demonstrator

Legal, Ethical and Compliance Requirements b

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

PUZZLE Demonstrators Requirements, Methodology & MVP

This deliverable will define the two use cases that PUZZLE will address It will provide a detailed view of PUZZLEs reference scenarios and describe a number of use cases within the reference scenarios

Performance Evaluation and Adoption Guidelines

This deliverable will document the evaluation results gathered from the execution of the demonstrators and the outcomes from the Validation contracts the projectmarketplace impact assessment and critical appraisal and the methodology and adoption guidelines

Security and Privacy Requirements Analysis

This deliverable will document the identified security and privacy requirements as developed in the frame of Task 11 regarding the implementation of the project as well as the requirements associated with legal ethical and privacy considerations or constraints

Final Demonstrators Implementation Report

Documentation of the implementation of the final release of the demonstrators services Tasks 63 64 The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrator

Exploitation, Standardisation, Dissemination and Communication Activities Report b

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

Exploitation, Standardisation, Dissemination and Communication Activities Report a

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

SMEs&MEs Data Chain and Open APIs Targeting at the Services a

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

First Demonstrators Implementation Report

Documentation of the implementation of the first release of the demonstrators services Tasks 63 64 This deliverable will also provide a rigorous evaluation of the results gathered from the execution of the first demonstrators phase The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrators

Publishable Midterm/Final Report

This deliverable includes the midtermfinal project report

Project's Impact Assessment a

Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines

PUZZLE Framework Reference Architecture a

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

PUZZLE Framework Reference Architecture B

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

Publishable Midterm/Final Report a

This deliverable includes the midtermfinal project report

Project Handbook

A handbook describing the project management procedures adopted in the project

Risk Assessment Methodology and Threat Modelling

Documentation on the normative specification of the threat metamodel that captures all possible vulnerabilities and attacks in an SME Association environment and the nonnormative specification of a multistep RA methodology that has to be applied prior to the risk quantification

Project's Impact Assessment b

Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines

Internal and External IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the PUZZLE project to external target groups

PUZZLE Collective Attestation & Runtime Verification b

Documentation on the details of the PUZZLE attestation architecture, the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers.

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules a

D25 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection sharing and management and D26 will include the implementation of the smart contract mechanisms

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules b

D2.5 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection, sharing and management and D2.6 will include the implementation of the smart contract mechanisms.

PUZZLE Collective Attestation & Runtime Verification a

Documentation on the details of the PUZZLE attestation architecture the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers

Publicaciones

Deep Reinforcement Learning in Cloud Elasticity through Offline Learning and Return Based Scaling

Autores: Miltiadis Chrysopoulos, Ioannis Konstantinou, Nectarios Koziris
Publicado en: 2023
Editor: IEEE
DOI: 10.1109/cloud60044.2023.00012

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web

Autores: George Pantelis; Petros Petrou; Sophia Karagiorgou; Dimitrios Alexandrou
Publicado en: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Edición 1-7, 2021
Editor: ACM
DOI: 10.1145/3465481.3469201

A Holistic Framework for Safeguarding of SMEs: A Case Study

Autores: Nefeli Bountouni; Sotiris Koussouris; Alexandros Vasileiou; Stylianos A. Kazazis
Publicado en: Edición 1, 2023
Editor: IEEE
DOI: 10.1109/DRCN57075.2023.10108247

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning

Autores: Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
Publicado en: Proceedings 2023 Network and Distributed System Security Symposium, 2023, ISBN 1891562835
Editor: NDSS Symposium
DOI: 10.14722/ndss.2023.24169

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving

Autores: George Hatzivasilis; Sotiris Ioannidis; Grigoris Kalogiannis; Manolis Chatzimpyrros; George Spanoudakis; Guillermo Jiménez Prieto; Araceli Rojas Morgan; Miguel Juaniz Lopez; Cataldo Basile; Jose Francisco Ruiz
Publicado en: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Editor: IEEE
DOI: 10.1109/csr57506.2023.10224971

BinWrap: Hybrid Protection against Native Node.js Add-ons

Autores: Christou, G., Ntousakis, G., Lahtinen, E., Ioannidis, S., Kemerlis, V. P., & Vasilakis, N.
Publicado en: ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Editor: Association for Computing Machinery
DOI: 10.1145/3579856.3590330

Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection

Autores: Anis Bouaziz; Manh-Dung Nguyen; Valeria Valdés ; Ana Cavalli and Wissam Mallouli
Publicado en: 2023
Editor: Scitepress
DOI: 10.5220/0012125100003538

Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study

Autores: Alexander Shevtsov;Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Publicado en: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Editor: AAAI Press
DOI: 10.48550/arxiv.2112.04913

A deep learning anomaly detection framework with explainability and robustness

Autores: MD Nguyen, A Bouaziz, V Valdes, A Rosa Cavalli, W Mallouli, E Montes De Oca
Publicado en: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Editor: Association for Computing Machinery
DOI: 10.1145/3600160.3605052

Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries

Autores: Thanassis Giannetsos; Dimitris Papamartzivanos; Sofia Anna Menesidou; Sophia Karagiorgou
Publicado en: Proceedings of 30th European Conference on Networks and Communications, Edición 1, 2021
Editor: IEEE
DOI: 10.5281/zenodo.5337037

Discovery and classification of Twitter bots

Autores: Alexander Shevtsov; Maria Oikonomidou; Despoina Antonakaki; Polyvios Pratikakis; Alexandros Kanterakis; Paraskevi Fragopoulou; Sotiris Ioannidis
Publicado en: SN Computer Science, Edición 1, 2022, ISSN 2661-8907
Editor: Springer Nature
DOI: 10.48550/arxiv.2010.15393

Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections

Autores: Alexander Shevtsov; Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Publicado en: Software Impacts, Edición 13,100333, 2022, ISSN 2665-9638
Editor: Elsevier B.V
DOI: 10.1016/j.simpa.2022.100333

Twitter Dataset on the Russo-Ukrainian War

Autores: Shevtsov, Alexander; Tzagkarakis, Christos; Antonakaki, Despoina; Pratikakis, Polyvios; Ioannidis, Sotiris
Publicado en: Edición 1, 2022
Editor: Cornell University
DOI: 10.48550/arxiv.2204.08530

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles