European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Towards a Sophisticated SIEM Marketplace for Blockchain-based Threat Intelligence and Security-as-a-Service

Rezultaty

SMEs&MEs Data Chain and Open APIs Targeting at the Services b

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

Legal, Ethical and Compliance Requirements a

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

Policy Modelling & Cybersecurity, Privacy, Legal and GDPR-Compliant Policy Constraints

Documentation on the details of the policy modelling to be used for expressing and managing the different types of policies per securitymanagedservice and the definition of the policy constraints based upon asset security and data privacy preferences while complying to the GDPR requirements

Evaluation Framework and Demonstrators Planning

Documentation of the evaluation framework the validation methodology and the set of scenarios that will run during each demonstrator

Legal, Ethical and Compliance Requirements b

This deliverable will specify the mechanisms to support all the legal ethical and privacy constraints to achieve the necessary levels of regulatory compliance with existing directives

PUZZLE Demonstrators Requirements, Methodology & MVP

This deliverable will define the two use cases that PUZZLE will address It will provide a detailed view of PUZZLEs reference scenarios and describe a number of use cases within the reference scenarios

Performance Evaluation and Adoption Guidelines

This deliverable will document the evaluation results gathered from the execution of the demonstrators and the outcomes from the Validation contracts the projectmarketplace impact assessment and critical appraisal and the methodology and adoption guidelines

Security and Privacy Requirements Analysis

This deliverable will document the identified security and privacy requirements as developed in the frame of Task 11 regarding the implementation of the project as well as the requirements associated with legal ethical and privacy considerations or constraints

Final Demonstrators Implementation Report

Documentation of the implementation of the final release of the demonstrators services Tasks 63 64 The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrator

Exploitation, Standardisation, Dissemination and Communication Activities Report b

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

Exploitation, Standardisation, Dissemination and Communication Activities Report a

This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a first view on the market its opportunities and on TAs

SMEs&MEs Data Chain and Open APIs Targeting at the Services a

Direct outcome of T13 documenting the PUZZLE framework services and Open APIs The deliverable will be updated regularly following the components releases and the feedback received

First Demonstrators Implementation Report

Documentation of the implementation of the first release of the demonstrators services Tasks 63 64 This deliverable will also provide a rigorous evaluation of the results gathered from the execution of the first demonstrators phase The deliverable will contain a public report on the evaluation and a confidential annex on the setup of the demonstrators

Publishable Midterm/Final Report

This deliverable includes the midtermfinal project report

Project's Impact Assessment a

Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines

PUZZLE Framework Reference Architecture a

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

PUZZLE Framework Reference Architecture B

This deliverable will provide the specification of the PUZZLE framework reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the PUZZLE marketplace services in relation to the two specific use cases including an analysis of relevant classical protocols and the use cases themselves in terms of PUZZLE functionality It will also incorporate any updates integrated into the PUZZLE framework after the first release of the prototypes resulting from the innovation activities in the frame of WP2 WP3 and WP4

Publishable Midterm/Final Report a

This deliverable includes the midtermfinal project report

Project Handbook

A handbook describing the project management procedures adopted in the project

Risk Assessment Methodology and Threat Modelling

Documentation on the normative specification of the threat metamodel that captures all possible vulnerabilities and attacks in an SME Association environment and the nonnormative specification of a multistep RA methodology that has to be applied prior to the risk quantification

Project's Impact Assessment b

Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines

Internal and External IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the PUZZLE project to external target groups

PUZZLE Collective Attestation & Runtime Verification b

Documentation on the details of the PUZZLE attestation architecture, the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers.

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules a

D25 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection sharing and management and D26 will include the implementation of the smart contract mechanisms

Dynamic Trusted Consent and Threat Intelligence Sharing in Cybersecurity Marketplaces, Contracts and Rules b

D2.5 will include detailed documentation of the dynamic trusted consent metamodel for threat intelligence data collection, sharing and management and D2.6 will include the implementation of the smart contract mechanisms.

PUZZLE Collective Attestation & Runtime Verification a

Documentation on the details of the PUZZLE attestation architecture the components design for enforcing the DAA and CFA enablers and the implementation of runtime monitors and verifiers

Publikacje

Deep Reinforcement Learning in Cloud Elasticity through Offline Learning and Return Based Scaling

Autorzy: Miltiadis Chrysopoulos, Ioannis Konstantinou, Nectarios Koziris
Opublikowane w: 2023
Wydawca: IEEE
DOI: 10.1109/cloud60044.2023.00012

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web

Autorzy: George Pantelis; Petros Petrou; Sophia Karagiorgou; Dimitrios Alexandrou
Opublikowane w: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Numer 1-7, 2021
Wydawca: ACM
DOI: 10.1145/3465481.3469201

A Holistic Framework for Safeguarding of SMEs: A Case Study

Autorzy: Nefeli Bountouni; Sotiris Koussouris; Alexandros Vasileiou; Stylianos A. Kazazis
Opublikowane w: Numer 1, 2023
Wydawca: IEEE
DOI: 10.1109/DRCN57075.2023.10108247

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning

Autorzy: Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
Opublikowane w: Proceedings 2023 Network and Distributed System Security Symposium, 2023, ISBN 1891562835
Wydawca: NDSS Symposium
DOI: 10.14722/ndss.2023.24169

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving

Autorzy: George Hatzivasilis; Sotiris Ioannidis; Grigoris Kalogiannis; Manolis Chatzimpyrros; George Spanoudakis; Guillermo Jiménez Prieto; Araceli Rojas Morgan; Miguel Juaniz Lopez; Cataldo Basile; Jose Francisco Ruiz
Opublikowane w: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Wydawca: IEEE
DOI: 10.1109/csr57506.2023.10224971

BinWrap: Hybrid Protection against Native Node.js Add-ons

Autorzy: Christou, G., Ntousakis, G., Lahtinen, E., Ioannidis, S., Kemerlis, V. P., & Vasilakis, N.
Opublikowane w: ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Wydawca: Association for Computing Machinery
DOI: 10.1145/3579856.3590330

Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection

Autorzy: Anis Bouaziz; Manh-Dung Nguyen; Valeria Valdés ; Ana Cavalli and Wissam Mallouli
Opublikowane w: 2023
Wydawca: Scitepress
DOI: 10.5220/0012125100003538

Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study

Autorzy: Alexander Shevtsov;Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Opublikowane w: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Wydawca: AAAI Press
DOI: 10.48550/arxiv.2112.04913

A deep learning anomaly detection framework with explainability and robustness

Autorzy: MD Nguyen, A Bouaziz, V Valdes, A Rosa Cavalli, W Mallouli, E Montes De Oca
Opublikowane w: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Wydawca: Association for Computing Machinery
DOI: 10.1145/3600160.3605052

Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries

Autorzy: Thanassis Giannetsos; Dimitris Papamartzivanos; Sofia Anna Menesidou; Sophia Karagiorgou
Opublikowane w: Proceedings of 30th European Conference on Networks and Communications, Numer 1, 2021
Wydawca: IEEE
DOI: 10.5281/zenodo.5337037

Discovery and classification of Twitter bots

Autorzy: Alexander Shevtsov; Maria Oikonomidou; Despoina Antonakaki; Polyvios Pratikakis; Alexandros Kanterakis; Paraskevi Fragopoulou; Sotiris Ioannidis
Opublikowane w: SN Computer Science, Numer 1, 2022, ISSN 2661-8907
Wydawca: Springer Nature
DOI: 10.48550/arxiv.2010.15393

Explainable machine learning pipeline for Twitter bot detection during the 2020 US Presidential Elections

Autorzy: Alexander Shevtsov; Christos Tzagkarakis;Despoina Antonakaki;Sotiris Ioannidis
Opublikowane w: Software Impacts, Numer 13,100333, 2022, ISSN 2665-9638
Wydawca: Elsevier B.V
DOI: 10.1016/j.simpa.2022.100333

Twitter Dataset on the Russo-Ukrainian War

Autorzy: Shevtsov, Alexander; Tzagkarakis, Christos; Antonakaki, Despoina; Pratikakis, Polyvios; Ioannidis, Sotiris
Opublikowane w: Numer 1, 2022
Wydawca: Cornell University
DOI: 10.48550/arxiv.2204.08530

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników