European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Geiger Cybersecurity Counter

Livrables

Training Plan
Intermediate Training report

Intermediate Training Report

Validation Report
Intermediate Impact Report

Intermediate Impact Report includes dissemination report for the first 18 months a refined exploitation plan including the preliminary business model to be tested in the WP4 demonstrations and preliminary results and lessonslearned shared with GEIGERrelated standardisation

Impact Plan

Impact Plan: includes the dissemination plan and inputs identified from mapping GEIGER-related standardisation.

Final Report

Final Report including the second Advisory Board report

Architecture
Release
Final Training Report
Demonstration Report
Final Impact Report

Final Impact Report includes the dissemination report for up to month 30 and the final exploitation plan including the business model financial analysis report on creating the organisation for offering and maintaining GEIGER recommendations for rolling out GEIGER across Europe and final results and lessonslearned shared with GEIGERrelated standardisation

Year 1 Report
Data Management Plan
Year 2 Report

Year 2 Report including the first Advisory Board report

Requirements

Publications

The Role of Machine Learning in Cybersecurity

Auteurs: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
Publié dans: Digital Threats: Research and Practice, 2022, ISSN 2692-1626
Éditeur: Association for Computing Machinery
DOI: 10.1145/3545574

SYMBALS: A Systematic Review Methodology Blending Active Learning and Snowballing

Auteurs: Max van Haastrecht, Injy Sarhan, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Publié dans: Frontiers in Research Metrics and Analytics, Numéro 6, 2021, Page(s) 1-14, ISSN 2504-0537
Éditeur: Frontiers
DOI: 10.3389/frma.2021.685591

CySecEscape 2.0—A Virtual Escape Room To Raise Cybersecurity Awareness

Auteurs: Emanuel Löffler, Bettina Schneider, Petra Maria Asprion,Trupti Zanwar
Publié dans: International Journal of Serious Games, Numéro 8/1, 2021, ISSN 2384-8766
Éditeur: International Journal of Serious Games
DOI: 10.17083/ijsg.v8i1.413

Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics

Auteurs: Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Publié dans: Applied Sciences, Numéro 11(15), 2021, ISSN 2076-3417
Éditeur: MDPI
DOI: 10.3390/app11156909

Can We Survive without Labelled Data in NLP? Transfer Learning for Open Information Extraction

Auteurs: Injy Sarhan, Marco Spruit
Publié dans: Applied Sciences, Numéro 10/17, 2020, Page(s) 5758, ISSN 2076-3417
Éditeur: MDPI
DOI: 10.3390/app10175758

The Effect of Countermeasure Readability on Security Intentions

Auteurs: Tim Smit, Max van Haastrecht, Marco Spruit
Publié dans: Journal of Cybersecurity and Privacy, Numéro 1(4), 2021, ISSN 2624-800X
Éditeur: MDPI
DOI: 10.3390/jcp1040034

Requirements Analysis in Disruptive Engineering Solutions Using the Paradigm of Living Systems

Auteurs: Emilia Brad, Stelian Brad
Publié dans: Applied Sciences 2021, Numéro 11(21), 2021, ISSN 2076-3417
Éditeur: MDPI
DOI: 10.3390/app11219854

Adaptable GDPR Assessment Tool for Micro and Small Enterprises

Auteurs: Löffler E., Schneider B., Goerre A. and Asprion P.
Publié dans: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, Numéro 1, 2022, Page(s) 301-308, ISSN 2184-4992
Éditeur: Scitepress
DOI: 10.5220/0011014200003179

SMEs’ Confidentiality Concerns for Security Information Sharing

Auteurs: Alireza Shojaifar, Samuel A. Fricker
Publié dans: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, Numéro 593, 2020, Page(s) 289-299, ISBN 978-3-030-57403-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-57404-8_22

GEIGER: Solution for small businesses to protect themselves against cyber-threats

Auteurs: José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
Publié dans: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Éditeur: Association for Computing Machinery
DOI: 10.1145/3465481.3469202

Classifying SMEs for Approaching Cybersecurity Competence and Awareness

Auteurs: Heini Järvinen, Alireza Shojaifar
Publié dans: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Éditeur: Association for Computing Machinery
DOI: 10.1145/3465481

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible