European Commission logo
English English
CORDIS - EU research results
CORDIS

Geiger Cybersecurity Counter

Deliverables

Training Plan
Intermediate Training report

Intermediate Training Report

Validation Report
Intermediate Impact Report

Intermediate Impact Report includes dissemination report for the first 18 months a refined exploitation plan including the preliminary business model to be tested in the WP4 demonstrations and preliminary results and lessonslearned shared with GEIGERrelated standardisation

Impact Plan

Impact Plan: includes the dissemination plan and inputs identified from mapping GEIGER-related standardisation.

Final Report

Final Report including the second Advisory Board report

Architecture
Release
Final Training Report
Demonstration Report
Final Impact Report

Final Impact Report includes the dissemination report for up to month 30 and the final exploitation plan including the business model financial analysis report on creating the organisation for offering and maintaining GEIGER recommendations for rolling out GEIGER across Europe and final results and lessonslearned shared with GEIGERrelated standardisation

Year 1 Report
Data Management Plan
Year 2 Report

Year 2 Report including the first Advisory Board report

Requirements

Publications

The Role of Machine Learning in Cybersecurity

Author(s): Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
Published in: Digital Threats: Research and Practice, 2022, ISSN 2692-1626
Publisher: Association for Computing Machinery
DOI: 10.1145/3545574

SYMBALS: A Systematic Review Methodology Blending Active Learning and Snowballing

Author(s): Max van Haastrecht, Injy Sarhan, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Published in: Frontiers in Research Metrics and Analytics, Issue 6, 2021, Page(s) 1-14, ISSN 2504-0537
Publisher: Frontiers
DOI: 10.3389/frma.2021.685591

CySecEscape 2.0—A Virtual Escape Room To Raise Cybersecurity Awareness

Author(s): Emanuel Löffler, Bettina Schneider, Petra Maria Asprion,Trupti Zanwar
Published in: International Journal of Serious Games, Issue 8/1, 2021, ISSN 2384-8766
Publisher: International Journal of Serious Games
DOI: 10.17083/ijsg.v8i1.413

Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics

Author(s): Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Published in: Applied Sciences, Issue 11(15), 2021, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app11156909

Can We Survive without Labelled Data in NLP? Transfer Learning for Open Information Extraction

Author(s): Injy Sarhan, Marco Spruit
Published in: Applied Sciences, Issue 10/17, 2020, Page(s) 5758, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app10175758

The Effect of Countermeasure Readability on Security Intentions

Author(s): Tim Smit, Max van Haastrecht, Marco Spruit
Published in: Journal of Cybersecurity and Privacy, Issue 1(4), 2021, ISSN 2624-800X
Publisher: MDPI
DOI: 10.3390/jcp1040034

Requirements Analysis in Disruptive Engineering Solutions Using the Paradigm of Living Systems

Author(s): Emilia Brad, Stelian Brad
Published in: Applied Sciences 2021, Issue 11(21), 2021, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app11219854

Adaptable GDPR Assessment Tool for Micro and Small Enterprises

Author(s): Löffler E., Schneider B., Goerre A. and Asprion P.
Published in: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, Issue 1, 2022, Page(s) 301-308, ISSN 2184-4992
Publisher: Scitepress
DOI: 10.5220/0011014200003179

SMEs’ Confidentiality Concerns for Security Information Sharing

Author(s): Alireza Shojaifar, Samuel A. Fricker
Published in: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, Issue 593, 2020, Page(s) 289-299, ISBN 978-3-030-57403-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57404-8_22

GEIGER: Solution for small businesses to protect themselves against cyber-threats

Author(s): José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Publisher: Association for Computing Machinery
DOI: 10.1145/3465481.3469202

Classifying SMEs for Approaching Cybersecurity Competence and Awareness

Author(s): Heini Järvinen, Alireza Shojaifar
Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Publisher: Association for Computing Machinery
DOI: 10.1145/3465481

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available