European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Geiger Cybersecurity Counter

Resultado final

Training Plan
Intermediate Training report

Intermediate Training Report

Validation Report
Intermediate Impact Report

Intermediate Impact Report includes dissemination report for the first 18 months a refined exploitation plan including the preliminary business model to be tested in the WP4 demonstrations and preliminary results and lessonslearned shared with GEIGERrelated standardisation

Impact Plan

Impact Plan: includes the dissemination plan and inputs identified from mapping GEIGER-related standardisation.

Final Report

Final Report including the second Advisory Board report

Architecture
Release
Final Training Report
Demonstration Report
Final Impact Report

Final Impact Report includes the dissemination report for up to month 30 and the final exploitation plan including the business model financial analysis report on creating the organisation for offering and maintaining GEIGER recommendations for rolling out GEIGER across Europe and final results and lessonslearned shared with GEIGERrelated standardisation

Year 1 Report
Data Management Plan
Year 2 Report

Year 2 Report including the first Advisory Board report

Requirements

Publicaciones

The Role of Machine Learning in Cybersecurity

Autores: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
Publicado en: Digital Threats: Research and Practice, 2022, ISSN 2692-1626
Editor: Association for Computing Machinery
DOI: 10.1145/3545574

SYMBALS: A Systematic Review Methodology Blending Active Learning and Snowballing

Autores: Max van Haastrecht, Injy Sarhan, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Publicado en: Frontiers in Research Metrics and Analytics, Edición 6, 2021, Página(s) 1-14, ISSN 2504-0537
Editor: Frontiers
DOI: 10.3389/frma.2021.685591

CySecEscape 2.0—A Virtual Escape Room To Raise Cybersecurity Awareness

Autores: Emanuel Löffler, Bettina Schneider, Petra Maria Asprion,Trupti Zanwar
Publicado en: International Journal of Serious Games, Edición 8/1, 2021, ISSN 2384-8766
Editor: International Journal of Serious Games
DOI: 10.17083/ijsg.v8i1.413

Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics

Autores: Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Publicado en: Applied Sciences, Edición 11(15), 2021, ISSN 2076-3417
Editor: MDPI
DOI: 10.3390/app11156909

Can We Survive without Labelled Data in NLP? Transfer Learning for Open Information Extraction

Autores: Injy Sarhan, Marco Spruit
Publicado en: Applied Sciences, Edición 10/17, 2020, Página(s) 5758, ISSN 2076-3417
Editor: MDPI
DOI: 10.3390/app10175758

The Effect of Countermeasure Readability on Security Intentions

Autores: Tim Smit, Max van Haastrecht, Marco Spruit
Publicado en: Journal of Cybersecurity and Privacy, Edición 1(4), 2021, ISSN 2624-800X
Editor: MDPI
DOI: 10.3390/jcp1040034

Requirements Analysis in Disruptive Engineering Solutions Using the Paradigm of Living Systems

Autores: Emilia Brad, Stelian Brad
Publicado en: Applied Sciences 2021, Edición 11(21), 2021, ISSN 2076-3417
Editor: MDPI
DOI: 10.3390/app11219854

Adaptable GDPR Assessment Tool for Micro and Small Enterprises

Autores: Löffler E., Schneider B., Goerre A. and Asprion P.
Publicado en: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, Edición 1, 2022, Página(s) 301-308, ISSN 2184-4992
Editor: Scitepress
DOI: 10.5220/0011014200003179

SMEs’ Confidentiality Concerns for Security Information Sharing

Autores: Alireza Shojaifar, Samuel A. Fricker
Publicado en: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, Edición 593, 2020, Página(s) 289-299, ISBN 978-3-030-57403-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-57404-8_22

GEIGER: Solution for small businesses to protect themselves against cyber-threats

Autores: José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
Publicado en: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Editor: Association for Computing Machinery
DOI: 10.1145/3465481.3469202

Classifying SMEs for Approaching Cybersecurity Competence and Awareness

Autores: Heini Järvinen, Alireza Shojaifar
Publicado en: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Editor: Association for Computing Machinery
DOI: 10.1145/3465481

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles