Deliverables Documents, reports (15) Training Plan Intermediate Training report Intermediate Training Report Validation Report Intermediate Impact Report Intermediate Impact Report includes dissemination report for the first 18 months a refined exploitation plan including the preliminary business model to be tested in the WP4 demonstrations and preliminary results and lessonslearned shared with GEIGERrelated standardisation Impact Plan Impact Plan: includes the dissemination plan and inputs identified from mapping GEIGER-related standardisation. Final Report Final Report including the second Advisory Board report Architecture Release Final Training Report Demonstration Report Final Impact Report Final Impact Report includes the dissemination report for up to month 30 and the final exploitation plan including the business model financial analysis report on creating the organisation for offering and maintaining GEIGER recommendations for rolling out GEIGER across Europe and final results and lessonslearned shared with GEIGERrelated standardisation Year 1 Report Data Management Plan Year 2 Report Year 2 Report including the first Advisory Board report Requirements Publications Peer reviewed articles (8) The Role of Machine Learning in Cybersecurity Author(s): Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco Published in: Digital Threats: Research and Practice, 2022, ISSN 2692-1626 Publisher: Association for Computing Machinery DOI: 10.1145/3545574 SYMBALS: A Systematic Review Methodology Blending Active Learning and Snowballing Author(s): Max van Haastrecht, Injy Sarhan, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit Published in: Frontiers in Research Metrics and Analytics, Issue 6, 2021, Page(s) 1-14, ISSN 2504-0537 Publisher: Frontiers DOI: 10.3389/frma.2021.685591 CySecEscape 2.0—A Virtual Escape Room To Raise Cybersecurity Awareness Author(s): Emanuel Löffler, Bettina Schneider, Petra Maria Asprion,Trupti Zanwar Published in: International Journal of Serious Games, Issue 8/1, 2021, ISSN 2384-8766 Publisher: International Journal of Serious Games DOI: 10.17083/ijsg.v8i1.413 Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics Author(s): Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit Published in: Applied Sciences, Issue 11(15), 2021, ISSN 2076-3417 Publisher: MDPI DOI: 10.3390/app11156909 Can We Survive without Labelled Data in NLP? Transfer Learning for Open Information Extraction Author(s): Injy Sarhan, Marco Spruit Published in: Applied Sciences, Issue 10/17, 2020, Page(s) 5758, ISSN 2076-3417 Publisher: MDPI DOI: 10.3390/app10175758 The Effect of Countermeasure Readability on Security Intentions Author(s): Tim Smit, Max van Haastrecht, Marco Spruit Published in: Journal of Cybersecurity and Privacy, Issue 1(4), 2021, ISSN 2624-800X Publisher: MDPI DOI: 10.3390/jcp1040034 Requirements Analysis in Disruptive Engineering Solutions Using the Paradigm of Living Systems Author(s): Emilia Brad, Stelian Brad Published in: Applied Sciences 2021, Issue 11(21), 2021, ISSN 2076-3417 Publisher: MDPI DOI: 10.3390/app11219854 Adaptable GDPR Assessment Tool for Micro and Small Enterprises Author(s): Löffler E., Schneider B., Goerre A. and Asprion P. Published in: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, Issue 1, 2022, Page(s) 301-308, ISSN 2184-4992 Publisher: Scitepress DOI: 10.5220/0011014200003179 Book chapters (1) SMEs’ Confidentiality Concerns for Security Information Sharing Author(s): Alireza Shojaifar, Samuel A. Fricker Published in: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, Issue 593, 2020, Page(s) 289-299, ISBN 978-3-030-57403-1 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-57404-8_22 Conference proceedings (2) GEIGER: Solution for small businesses to protect themselves against cyber-threats Author(s): José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514 Publisher: Association for Computing Machinery DOI: 10.1145/3465481.3469202 Classifying SMEs for Approaching Cybersecurity Competence and Awareness Author(s): Heini Järvinen, Alireza Shojaifar Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514 Publisher: Association for Computing Machinery DOI: 10.1145/3465481 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available