Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Towards a Sophisticated SIEM Marketplace for Blockchain-based Threat Intelligence and Security-as-a-Service

Risultati finali

SMEs&MEs Data Chain and Open APIs Targeting at the Services b

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

Legal, Ethical and Compliance Requirements a

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints

Documentation on the details of the policy modelling to be used for expressing and managing the different types of policies per securitymanagedservice and the definition of the policy constraints based upon asset security and data privacy preferences while complying to the GDPR requirements

Evaluation Framework and Demonstrators Planning

Documentation of the evaluation framework the validation methodology and the set of scenarios that will run during each demonstrator

Legal, Ethical and Compliance Requirements b

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

PUZZLE Demonstrators Requirements, Methodology & MVP

This deliverable will define the two use cases that PUZZLE will address It will provide a detailed view of PUZZLEs reference scenarios and describe a number of use cases within the reference scenarios

Performance Evaluation and Adoption Guidelines

This deliverable will document the evaluation results gathered from the execution of the demonstrators and the outcomes from the Validation contracts the projectmarketplace impact assessment and critical appraisal and the methodology and adoption guidelines

Security and Privacy Requirements Analysis

This deliverable will document the identified security and privacy requirements as developed in the frame of Task 11 regarding the implementation of the project as well as the requirements associated with legal ethical and privacy considerations or constraints

Final Demonstrators Implementation Report

Documentation of the implementation of the final release of the demonstrators services Tasks 63 64 The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrator

Exploitation, Standardisation, Dissemination and Communication Activities Report b

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

Exploitation, Standardisation, Dissemination and Communication Activities Report a

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

SMEs&MEs Data Chain and Open APIs Targeting at the Services a

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

First Demonstrators Implementation Report

Documentation of the implementation of the first release of the demonstrators services Tasks 63 64 This deliverable will also provide a rigorous evaluation of the results gathered from the execution of the first demonstrators phase The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrators

Publishable Midterm/Final Report

This deliverable includes the midtermfinal project report

Project's Impact Assessment a

Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines

PUZZLE Framework Reference Architecture a

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

PUZZLE Framework Reference Architecture B

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

Publishable Midterm/Final Report a

This deliverable includes the midtermfinal project report

Project Handbook

A handbook describing the project management procedures adopted in the project

Risk Assessment Methodology and Threat Modelling

Documentation on the normative specification of the threat metamodel that captures all possible vulnerabilities and attacks in an SME Association environment and the nonnormative specification of a multistep RA methodology that has to be applied prior to the risk quantification

Project's Impact Assessment b

Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines

Internal and External IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the PUZZLE project to external target groups

PUZZLE Collective Attestation & Runtime Verification b

Documentation on the details of the PUZZLE attestation architecture, the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers.

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules a

D25 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection sharing and management and D26 will include the implementation of the smart contract mechanisms

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules b

D2.5 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection, sharing and management and D2.6 will include the implementation of the smart contract mechanisms.

PUZZLE Collective Attestation & Runtime Verification a

Documentation on the details of the PUZZLE attestation architecture the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers

Pubblicazioni

Deep Reinforcement Learning in Cloud Elasticity through Offline Learning and Return Based Scaling

Autori: Miltiadis Chrysopoulos, Ioannis Konstantinou, Nectarios Koziris
Pubblicato in: 2023
Editore: IEEE
DOI: 10.1109/cloud60044.2023.00012

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web

Autori: George Pantelis; Petros Petrou; Sophia Karagiorgou; Dimitrios Alexandrou
Pubblicato in: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Numero 1-7, 2021
Editore: ACM
DOI: 10.1145/3465481.3469201

A Holistic Framework for Safeguarding of SMEs: A Case Study

Autori: Nefeli Bountouni; Sotiris Koussouris; Alexandros Vasileiou; Stylianos A. Kazazis
Pubblicato in: Numero 1, 2023
Editore: IEEE
DOI: 10.1109/DRCN57075.2023.10108247

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning

Autori: Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
Pubblicato in: Proceedings 2023 Network and Distributed System Security Symposium, 2023, ISBN 1891562835
Editore: NDSS Symposium
DOI: 10.14722/ndss.2023.24169

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving

Autori: George Hatzivasilis; Sotiris Ioannidis; Grigoris Kalogiannis; Manolis Chatzimpyrros; George Spanoudakis; Guillermo Jiménez Prieto; Araceli Rojas Morgan; Miguel Juaniz Lopez; Cataldo Basile; Jose Francisco Ruiz
Pubblicato in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Editore: IEEE
DOI: 10.1109/csr57506.2023.10224971

BinWrap: Hybrid Protection against Native Node.js Add-ons

Autori: Christou, G., Ntousakis, G., Lahtinen, E., Ioannidis, S., Kemerlis, V. P., & Vasilakis, N.
Pubblicato in: ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Editore: Association for Computing Machinery
DOI: 10.1145/3579856.3590330

Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection

Autori: Anis Bouaziz; Manh-Dung Nguyen; Valeria Valdés ; Ana Cavalli and Wissam Mallouli
Pubblicato in: 2023
Editore: Scitepress
DOI: 10.5220/0012125100003538

Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study

Autori: Alexander Shevtsov;Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Pubblicato in: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Editore: AAAI Press
DOI: 10.48550/arxiv.2112.04913

A deep learning anomaly detection framework with explainability and robustness

Autori: MD Nguyen, A Bouaziz, V Valdes, A Rosa Cavalli, W Mallouli, E Montes De Oca
Pubblicato in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Editore: Association for Computing Machinery
DOI: 10.1145/3600160.3605052

Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries

Autori: Thanassis Giannetsos; Dimitris Papamartzivanos; Sofia Anna Menesidou; Sophia Karagiorgou
Pubblicato in: Proceedings of 30th European Conference on Networks and Communications, Numero 1, 2021
Editore: IEEE
DOI: 10.5281/zenodo.5337037

Discovery and classification of Twitter bots

Autori: Alexander Shevtsov; Maria Oikonomidou; Despoina Antonakaki; Polyvios Pratikakis; Alexandros Kanterakis; Paraskevi Fragopoulou; Sotiris Ioannidis
Pubblicato in: SN Computer Science, Numero 1, 2022, ISSN 2661-8907
Editore: Springer Nature
DOI: 10.48550/arxiv.2010.15393

Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections

Autori: Alexander Shevtsov; Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Pubblicato in: Software Impacts, Numero 13,100333, 2022, ISSN 2665-9638
Editore: Elsevier B.V
DOI: 10.1016/j.simpa.2022.100333

Twitter Dataset on the Russo-Ukrainian War

Autori: Shevtsov, Alexander; Tzagkarakis, Christos; Antonakaki, Despoina; Pratikakis, Polyvios; Ioannidis, Sotiris
Pubblicato in: Numero 1, 2022
Editore: Cornell University
DOI: 10.48550/arxiv.2204.08530

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile