European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Geiger Cybersecurity Counter

Rezultaty

Training Plan
Intermediate Training report

Intermediate Training Report

Validation Report
Intermediate Impact Report

Intermediate Impact Report includes dissemination report for the first 18 months a refined exploitation plan including the preliminary business model to be tested in the WP4 demonstrations and preliminary results and lessonslearned shared with GEIGERrelated standardisation

Impact Plan

Impact Plan: includes the dissemination plan and inputs identified from mapping GEIGER-related standardisation.

Final Report

Final Report including the second Advisory Board report

Architecture
Release
Final Training Report
Demonstration Report
Final Impact Report

Final Impact Report includes the dissemination report for up to month 30 and the final exploitation plan including the business model financial analysis report on creating the organisation for offering and maintaining GEIGER recommendations for rolling out GEIGER across Europe and final results and lessonslearned shared with GEIGERrelated standardisation

Year 1 Report
Data Management Plan
Year 2 Report

Year 2 Report including the first Advisory Board report

Requirements

Publikacje

The Role of Machine Learning in Cybersecurity

Autorzy: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
Opublikowane w: Digital Threats: Research and Practice, 2022, ISSN 2692-1626
Wydawca: Association for Computing Machinery
DOI: 10.1145/3545574

SYMBALS: A Systematic Review Methodology Blending Active Learning and Snowballing

Autorzy: Max van Haastrecht, Injy Sarhan, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Opublikowane w: Frontiers in Research Metrics and Analytics, Numer 6, 2021, Strona(/y) 1-14, ISSN 2504-0537
Wydawca: Frontiers
DOI: 10.3389/frma.2021.685591

CySecEscape 2.0—A Virtual Escape Room To Raise Cybersecurity Awareness

Autorzy: Emanuel Löffler, Bettina Schneider, Petra Maria Asprion,Trupti Zanwar
Opublikowane w: International Journal of Serious Games, Numer 8/1, 2021, ISSN 2384-8766
Wydawca: International Journal of Serious Games
DOI: 10.17083/ijsg.v8i1.413

Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics

Autorzy: Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Opublikowane w: Applied Sciences, Numer 11(15), 2021, ISSN 2076-3417
Wydawca: MDPI
DOI: 10.3390/app11156909

Can We Survive without Labelled Data in NLP? Transfer Learning for Open Information Extraction

Autorzy: Injy Sarhan, Marco Spruit
Opublikowane w: Applied Sciences, Numer 10/17, 2020, Strona(/y) 5758, ISSN 2076-3417
Wydawca: MDPI
DOI: 10.3390/app10175758

The Effect of Countermeasure Readability on Security Intentions

Autorzy: Tim Smit, Max van Haastrecht, Marco Spruit
Opublikowane w: Journal of Cybersecurity and Privacy, Numer 1(4), 2021, ISSN 2624-800X
Wydawca: MDPI
DOI: 10.3390/jcp1040034

Requirements Analysis in Disruptive Engineering Solutions Using the Paradigm of Living Systems

Autorzy: Emilia Brad, Stelian Brad
Opublikowane w: Applied Sciences 2021, Numer 11(21), 2021, ISSN 2076-3417
Wydawca: MDPI
DOI: 10.3390/app11219854

Adaptable GDPR Assessment Tool for Micro and Small Enterprises

Autorzy: Löffler E., Schneider B., Goerre A. and Asprion P.
Opublikowane w: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, Numer 1, 2022, Strona(/y) 301-308, ISSN 2184-4992
Wydawca: Scitepress
DOI: 10.5220/0011014200003179

SMEs’ Confidentiality Concerns for Security Information Sharing

Autorzy: Alireza Shojaifar, Samuel A. Fricker
Opublikowane w: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, Numer 593, 2020, Strona(/y) 289-299, ISBN 978-3-030-57403-1
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-57404-8_22

GEIGER: Solution for small businesses to protect themselves against cyber-threats

Autorzy: José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
Opublikowane w: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Wydawca: Association for Computing Machinery
DOI: 10.1145/3465481.3469202

Classifying SMEs for Approaching Cybersecurity Competence and Awareness

Autorzy: Heini Järvinen, Alireza Shojaifar
Opublikowane w: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Wydawca: Association for Computing Machinery
DOI: 10.1145/3465481

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników