Risultati finali Documents, reports (21) SMEs&MEs Data Chain and Open APIs Targeting at the Services b Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received Legal, Ethical and Compliance Requirements a This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints Documentation on the details of the policy modelling to be used for expressing and managing the different types of policies per securitymanagedservice and the definition of the policy constraints based upon asset security and data privacy preferences while complying to the GDPR requirements Evaluation Framework and Demonstrators Planning Documentation of the evaluation framework the validation methodology and the set of scenarios that will run during each demonstrator Legal, Ethical and Compliance Requirements b This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives PUZZLE Demonstrators Requirements, Methodology & MVP This deliverable will define the two use cases that PUZZLE will address It will provide a detailed view of PUZZLEs reference scenarios and describe a number of use cases within the reference scenarios Performance Evaluation and Adoption Guidelines This deliverable will document the evaluation results gathered from the execution of the demonstrators and the outcomes from the Validation contracts the projectmarketplace impact assessment and critical appraisal and the methodology and adoption guidelines Security and Privacy Requirements Analysis This deliverable will document the identified security and privacy requirements as developed in the frame of Task 11 regarding the implementation of the project as well as the requirements associated with legal ethical and privacy considerations or constraints Final Demonstrators Implementation Report Documentation of the implementation of the final release of the demonstrators services Tasks 63 64 The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrator Exploitation, Standardisation, Dissemination and Communication Activities Report b This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs Exploitation, Standardisation, Dissemination and Communication Activities Report a This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs SMEs&MEs Data Chain and Open APIs Targeting at the Services a Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received First Demonstrators Implementation Report Documentation of the implementation of the first release of the demonstrators services Tasks 63 64 This deliverable will also provide a rigorous evaluation of the results gathered from the execution of the first demonstrators phase The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrators Publishable Midterm/Final Report This deliverable includes the midtermfinal project report Project's Impact Assessment a Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines PUZZLE Framework Reference Architecture a This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4 PUZZLE Framework Reference Architecture B This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4 Publishable Midterm/Final Report a This deliverable includes the midtermfinal project report Project Handbook A handbook describing the project management procedures adopted in the project Risk Assessment Methodology and Threat Modelling Documentation on the normative specification of the threat metamodel that captures all possible vulnerabilities and attacks in an SME Association environment and the nonnormative specification of a multistep RA methodology that has to be applied prior to the risk quantification Project's Impact Assessment b Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines Websites, patent fillings, videos etc. (1) Internal and External IT communication infrastructure and project website The external IT communication infrastructure constitutes a guideline for communication of the PUZZLE project to external target groups Other (2) Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules a D25 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection sharing and management and D26 will include the implementation of the smart contract mechanisms PUZZLE Collective Attestation & Runtime Verification a Documentation on the details of the PUZZLE attestation architecture the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers Pubblicazioni Conference proceedings (10) Deep Reinforcement Learning in Cloud Elasticity through Offline Learning and Return Based Scaling Autori: Miltiadis Chrysopoulos, Ioannis Konstantinou, Nectarios Koziris Pubblicato in: 2023 Editore: IEEE DOI: 10.1109/cloud60044.2023.00012 On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web Autori: George Pantelis; Petros Petrou; Sophia Karagiorgou; Dimitrios Alexandrou Pubblicato in: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Issue 1-7, 2021 Editore: ACM DOI: 10.1145/3465481.3469201 A Holistic Framework for Safeguarding of SMEs: A Case Study Autori: Nefeli Bountouni; Sotiris Koussouris; Alexandros Vasileiou; Stylianos A. Kazazis Pubblicato in: Issue 1, 2023 Editore: IEEE DOI: 10.1109/DRCN57075.2023.10108247 ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning Autori: Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis Pubblicato in: Proceedings 2023 Network and Distributed System Security Symposium, 2023, ISBN 1891562835 Editore: NDSS Symposium DOI: 10.14722/ndss.2023.24169 Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving Autori: George Hatzivasilis; Sotiris Ioannidis; Grigoris Kalogiannis; Manolis Chatzimpyrros; George Spanoudakis; Guillermo Jiménez Prieto; Araceli Rojas Morgan; Miguel Juaniz Lopez; Cataldo Basile; Jose Francisco Ruiz Pubblicato in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023 Editore: IEEE DOI: 10.1109/csr57506.2023.10224971 BinWrap: Hybrid Protection against Native Node.js Add-ons Autori: Christou, G., Ntousakis, G., Lahtinen, E., Ioannidis, S., Kemerlis, V. P., & Vasilakis, N. Pubblicato in: ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 Editore: Association for Computing Machinery DOI: 10.1145/3579856.3590330 Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection Autori: Anis Bouaziz; Manh-Dung Nguyen; Valeria Valdés ; Ana Cavalli and Wissam Mallouli Pubblicato in: 2023 Editore: Scitepress DOI: 10.5220/0012125100003538 Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study Autori: Alexander Shevtsov;Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis Pubblicato in: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022 Editore: AAAI Press DOI: 10.48550/arxiv.2112.04913 A deep learning anomaly detection framework with explainability and robustness Autori: MD Nguyen, A Bouaziz, V Valdes, A Rosa Cavalli, W Mallouli, E Montes De Oca Pubblicato in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023 Editore: Association for Computing Machinery DOI: 10.1145/3600160.3605052 Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries Autori: Thanassis Giannetsos; Dimitris Papamartzivanos; Sofia Anna Menesidou; Sophia Karagiorgou Pubblicato in: Proceedings of 30th European Conference on Networks and Communications, Issue 1, 2021 Editore: IEEE DOI: 10.5281/zenodo.5337037 Peer reviewed articles (2) Discovery and classification of Twitter bots Autori: Alexander Shevtsov; Maria Oikonomidou; Despoina Antonakaki; Polyvios Pratikakis; Alexandros Kanterakis; Paraskevi Fragopoulou; Sotiris Ioannidis Pubblicato in: SN Computer Science, Issue 1, 2022, ISSN 2661-8907 Editore: Springer Nature DOI: 10.48550/arxiv.2010.15393 Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections Autori: Alexander Shevtsov; Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis Pubblicato in: Software Impacts, Issue 13,100333, 2022, ISSN 2665-9638 Editore: Elsevier B.V DOI: 10.1016/j.simpa.2022.100333 Other (1) Twitter Dataset on the Russo-Ukrainian War Autori: Shevtsov, Alexander; Tzagkarakis, Christos; Antonakaki, Despoina; Pratikakis, Polyvios; Ioannidis, Sotiris Pubblicato in: Issue 1, 2022 Editore: Cornell University DOI: 10.48550/arxiv.2204.08530 È in corso la ricerca di dati su OpenAIRE... Si è verificato un errore durante la ricerca dei dati su OpenAIRE Nessun risultato disponibile