Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Use cases settings and demonstration strategy (IT-2) (se abrirá en una nueva ventana)

This deliverable provides an updated description of the scenario context and infrastructure setup for the four use cases as well as the strategy and plan for the validation and demonstration of the FISHY platform IT2This deliverable will have a public part in which sensitive data will be excluded and an Annex including the information on potential sensitive usecases that may imply sensitive data The Annex would be accessible by consortium members only

Trust Manager components design and implementation (IT-2) (se abrirá en una nueva ventana)

It updates D31 with the design and implementation tasks for the Thust Manager module as envisioned for IT2

Security and Certification Manager components design and implementation (IT-2) (se abrirá en una nueva ventana)

The final version of the FISHY Security and Certification architecture including a final design and descripton of the implementation of all the building blocks targeting integration and validation in IT2 This version incorporates all innovations developed as well as the refinements coming from the validation of the IT1

Use cases settings and demonstration strategy (IT-1) (se abrirá en una nueva ventana)

This deliverable provides a description of the scenario context and infrastructure setup for the four use cases as well as the strategy and plan for the validation of the FISHY platform IT1

Report on dissemination, standards and exploitation (Y1) (se abrirá en una nueva ventana)

This deliverable will report on initial actions regarding the project presence graphical image website dissemination activities exploitation progress etc It will include the dissemination and communication activities of each partner in the consortium Also a roadmap of the projects contributions to standardization identifying the targeted standardization bodies and work groups as well as opensource projects to be addressed Finally this document will also describe activities done to maximise the impact of the project early exploitation activities linking with relevant security initiatives and the collaboration with the Advisory Board

Report on dissemination, standards and exploitation (Y2) (se abrirá en una nueva ventana)

This deliverable will update on the WP7 activities for the second year Additionally this report will include a proposal of a business model for the exploitation and commercialization of the FISHY results

Security and Certification Manager components design and implementation (IT-1) (se abrirá en una nueva ventana)

A report of the preliminary results coming from the design of the Security and Certification Manager module components conducted in Task 41 and 42 targeting the integration and validation of IT1

Tracking external efforts, technology evolution and business trends (I) (se abrirá en una nueva ventana)

This deliverable gives a first generic overview in M6 for all relevant scientific technology and business trends of which the awareness is necessary for the project and for the proposed area of research at large

Dissemination, Communication and Impact Creation: Strategy and Plan (se abrirá en una nueva ventana)

This document presents the overall strategy and plan for dissemination communication and impact creation The document will describe the most relevant target audience the most appropiate dissemination means to be used target events and conferences and an initial plan for activities and actions for the consortium to take and achieve the proposed KPIs This plan as well as the strategy will be used as a basis for the entire project duration but will allow for updates to adapt to the actual project advances and external context changes which will be reflected in subsequent deliverables

IT-1 architectural requirements and design (se abrirá en una nueva ventana)

This deliverable presents the first version of the FISHY architecture IT1 as a reference architecture for WP3 WP4 and WP5 activities in IT1

Tracking external efforts, technology evolution and business trends (II) (se abrirá en una nueva ventana)

This deliverable gives a indepth overview of the relevant scientific technology and business trends of which the awareness is necessary for the project as well as for the proposed area of cyber resilience at large

Report on dissemination, standards and exploitation (Y3) (se abrirá en una nueva ventana)

This deliverable is the final WP7 progress report collecting all WP7 activities carried out by the project The document will include a final business plan for the FISHY exploitable results with detailed exploitation and sustainability strategies

Final Architectural design and technology radar (se abrirá en una nueva ventana)

This deliverable is the final FISHY architecture as it gets defined analyzed optimized updated and redefined during the project life time This deliverable also includes an update of the technology radar task T21

IT-1 FISHY release integrated (se abrirá en una nueva ventana)

This deliverable reports on the overall progress of FISHY platform components integration producing a first software release IT1 approximately at the middle of the project This deliverable integrates the outputs produced by WP3 WP4 at M13 D32 and D42 respectively as well as the outputs of Task 51 52 and 53 produced at M12 ie milestone MS20 and generate a first integrated version of the FISHY platform

Security and Certification IT2 integration (se abrirá en una nueva ventana)

Integration of the final version of the FISHY Security and Certification Module, as designed and developed in Tasks 4.1 and 4.2, ready to be delivered to WP5 for its integration with the last version available of the Intent-based Resilience Orchestrator and Dashboard components, and validation in WP6.

Security and Certification Manager IT1 integration (se abrirá en una nueva ventana)

A first integration of the components designed and developed in Task 41 and 42 ready to be delivered to WP5 for integration with the Intentbased Resilience Orchestrator components

IT-2 FISHY release integrated (se abrirá en una nueva ventana)

This final deliverable represents the refined and complete integrated FISHY platform for IT-2 deployment, validation and assessment in the use cases. This deliverable integrates the outputs produced by WP3, WP4 at M30 (D3.4 and D4.4 respectively), as well as the outputs of Task 5.1, 5.2 and 5.3 produced at M28 (i.e. milestone MS22).

Trust Manager IT2 integration (se abrirá en una nueva ventana)

This deliverable constitutes the final release for the Thust Manager module, all integrated into a single software suite.

IT-1 FISHY release validated (se abrirá en una nueva ventana)

This deliverable contains the first version of the use case demonstrators including the developed vertical applications and the report of the corresponding testsThis deliverable will have a public part in which sensitive data will be excluded and an Annex including the information on potential sensitive usecases that may imply sensitive data The Annex would be accessible by consortium members only

IT-2 FISHY final release (se abrirá en una nueva ventana)

This deliverable contains the first version of the use case demonstrators, including the developed vertical applications and the report of the corresponding unit tests.This deliverable will have a public part, in which sensitive data will be excluded, and an Annex including the information on potential sensitive use-cases that may imply sensitive data. The Annex would be accessible by consortium members only.

Publicaciones

Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture (se abrirá en una nueva ventana)

Autores: Xavi Masip-Bruin, Eva Marín-Tordera, José Ruiz, Admela Jukan, Panagiotis Trakadas, Ales Cernivec, Antonio Lioy, Diego López, Henrique Santos, Antonis Gonos, Ana Silva, José Soriano, Grigorios Kalogiannis
Publicado en: Sensors, Edición 21/18, 2021, Página(s) 6057, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21186057

The Green Blockchains of Circular Economy (se abrirá en una nueva ventana)

Autores: George Hatzivasilis, Sotiris Ioannidis, Konstantinos Fysarakis, George Spanoudakis, Nikos Papadakis
Publicado en: Electronics, Edición 10(16), 2021, ISSN 2079-9292
Editor: MDPI
DOI: 10.3390/electronics10162008

A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M (se abrirá en una nueva ventana)

Autores: Luis F. Gonzalez; Ivan Vidal; Francisco Valera; R.Martin; D. Artalejo
Publicado en: Future Internet, Edición Volume: 15, Edición: 8, 2023, ISSN 1999-5903
Editor: MDPI
DOI: 10.3390/fi15080274

Scaling migrations and replications of Virtual Network Functions based on network traffic forecasting (se abrirá en una nueva ventana)

Autores: Francisco Carpio, Wolfgang Bziuk, , Admela Jukan
Publicado en: Computer Networks, Edición Volume 203, 11 February 2022, 2022, Página(s) 108582, ISSN 1389-1286
Editor: Elsevier BV
DOI: 10.1016/j.comnet.2021.108582

Link Layer Connectivity as a Service for Ad-Hoc Microservice Platforms (se abrirá en una nueva ventana)

Autores: Luis F. Gonzalez; Ivan Vidal; Francisco Valera; Diego R. Lopez
Publicado en: IEEE Network, 2022, ISSN 0890-8044
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mnet.001.2100363

BenchFaaS: Benchmarking Serverless Functions in an Edge Computing Network Testbed (se abrirá en una nueva ventana)

Autores: Francisco Carpio; Marc Michalke; Admela Jukan
Publicado en: IEEE Networks, 2022, Página(s) 1 - 8, ISSN 0890-8044
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mnet.125.2200294

A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services (se abrirá en una nueva ventana)

Autores: Ivan Vidal; Borja Nogales; Diego R. Lopez; Juan Rodriguez; Francisco Valera; Arturo Azcorra
Publicado en: Electronics, Vol 10, Iss 1868, p 1868 (2021), Edición 2, 2021, ISSN 2079-9292
Editor: MDPI
DOI: 10.3390/electronics10151868

A Combinatorial Reliability Analysis of Generic Service Function Chains in Data Center Networks (se abrirá en una nueva ventana)

Autores: Anna Engelmann, Admela Jukan
Publicado en: ACM Transactions on Modeling and Performance Evaluation of Computing Systems, Edición Volume 6,Edición 3, September 2021, 2021, ISSN 2376-3639
Editor: ACM Digital Library
DOI: 10.1145/3477046

Engineering and Experimentally Benchmarking a Serverless Edge Computing System (se abrirá en una nueva ventana)

Autores: Francisco Carpio, Marc Michalke, Admela Jukan
Publicado en: Proceedings of the 2021 IEEE Global Communications Conference, 2022, ISBN 978-1-7281-8104-2
Editor: IEEE
DOI: 10.1109/globecom46510.2021.9685235

Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification (se abrirá en una nueva ventana)

Autores: André da Silva Oliveira; Henrique Santos
Publicado en: Proceedings of the 2022 International Workshop on Design of Reliable Communication Networks (DRCN), 2022, ISBN 978-1-6654-0987-2
Editor: IEEE
DOI: 10.1109/drcn53993.2022.9758022

Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs (se abrirá en una nueva ventana)

Autores: Jan Antić; Joao Pita Costa; Aleš Černivec; Matija Cankar; Tomaž Martinčič; Aljaž Potočnik; Gorka Benguria Elguezabal; Nelly Leligou; Ismael Torres Boigues
Publicado en: 19th International Conference on the Design of Reliable Communication Networks (DRCN), Edición 24, 2023, Página(s) 1-5, ISBN 9781665475983
Editor: IEEE
DOI: 10.1109/drcn57075.2023.10108105

Security in DevSecOps: Applying tools and machine learning to verifications and monitoring steps (se abrirá en una nueva ventana)

Autores: Cancar, Matija; Petrovich, Nenad; Joao Pita Costa; Ales Cernivec; Antic, Jan; Tomaz Martincic; Stepec, Dejan
Publicado en: ICPE '23 Companion: Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, Edición 23, 2023, Página(s) 201-205, ISBN 979-8-4007-0068-2
Editor: ACM
DOI: 10.5281/zenodo.7864125

Information Security Assessment and Certification within Supply Chains (se abrirá en una nueva ventana)

Autores: Henrique Santos, André Oliveira, Lúcia Soares, Alan Satis, Alexandre Santos
Publicado en: The 16th International Conference on Availability, Reliability and Security, 2021, Página(s) 1-6, ISBN 9781450390514
Editor: ACM Digital Library
DOI: 10.1145/3465481.3470078

Incident Handling for Healthcare Organizations and Supply-Chains (se abrirá en una nueva ventana)

Autores: Eftychia Lakka; George Hatzivasilis; Stylianos Karagiannis; Andreas Alexopoulos; Manos Athanatos; Sotiris Ioannidis; Manolis Chatzimpyrros; Grigoris Kalogiannis; George Spanoudakis
Publicado en: Proceedings of 2022 IEEE Symposium on Computers and Communications (ISCC), 2022, ISSN 2642-7389
Editor: IEEE
DOI: 10.1109/iscc55528.2022.9912965

A Machine Learning IDS for Known and Unknown Anomalies (se abrirá en una nueva ventana)

Autores: F. Aguiló–Gost; E. Simó–Mezquita; E. Marín–Tordera; A. Hussain
Publicado en: Proceedings of the 2022 International Workshop on Design of Reliable Communication Networks (DRCN), 2022, ISBN 978-1-6654-0987-2
Editor: IEEE
DOI: 10.1109/drcn53993.2022.9758010

Challenges in the Automotive Software Supply Chain, Connected CAR : Benefits from an Intent Policy framework (se abrirá en una nueva ventana)

Autores: Jose Soriano, Guillermo Jimenez, Ernesto Correa, Noel Ruiz
Publicado en: 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), 2021, Página(s) 1-5, ISBN 978-1-6654-4005-9
Editor: IEEE
DOI: 10.1109/hpsr52026.2021.9481853

A Model for Automated Cybersecurity Threat Remediation and Sharing (se abrirá en una nueva ventana)

Autores: Francesco Settanni, Leonardo Regano, Cataldo Basile and Antonio Lioy
Publicado en: Proceedings of the SecSoft - 5th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures(co-located NetSoft2023), 2023, Página(s) 492-497
Editor: IEEE
DOI: 10.1109/netsoft57336.2023.10175486

An NIDS for Known and Zero-Day Anomalies (se abrirá en una nueva ventana)

Autores: Ayaz Hussain; Francesc Aguiló-Gost; Ester Simó-Mezquita; Eva Marín-Tordera; Xavier Massip
Publicado en: Proceedings of the Conference DRCN 2023, 2023, ISBN 978-1-6654-7598-3
Editor: IEEE
DOI: 10.1109/drcn57075.2023.10108319

Farm to fork: securing a supply chain with direct impact on food security (se abrirá en una nueva ventana)

Autores: Panagiotis Trakadas, Helen C. Leligou, Panagiotis Karkazis, Antonis Gonos, Theodore Zahariadis
Publicado en: 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), 2021, Página(s) 1-6, ISBN 978-1-6654-4005-9
Editor: IEEE
DOI: 10.1109/hpsr52026.2021.9481866

A model of capabilities of Network Security Functions (se abrirá en una nueva ventana)

Autores: A model of capabilities of Network Security Functions
Publicado en: Proceedings of 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), 2022, ISSN 2693-9789
Editor: IEEE
DOI: 10.1109/netsoft54395.2022.9844057

Benchmarking Various ML Solutions in Complex Intent-Based Network Management Systems (se abrirá en una nueva ventana)

Autores: Mounir Bensalem; Jasenka Dizdarević; Admela Jukan
Publicado en: Proceedings of 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO), 2022, ISBN 978-953-233-103-5
Editor: IEEE
DOI: 10.23919/mipro55190.2022.9803584

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving (se abrirá en una nueva ventana)

Autores: Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving
Publicado en: Proceedings of the EEE International Conference on Cyber Security and Resilience (CSR), 2023, ISBN 979-8-3503-1170-9
Editor: IEEE
DOI: 10.1109/csr57506.2023.10224971

The Role of Intent-Based Networking in ICT Supply Chains (se abrirá en una nueva ventana)

Autores: Mounir Bensalem, Jasenka Dizdarevic, Francisco Carpio, Admela Jukan
Publicado en: 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), 2021, Página(s) 1-6, ISBN 978-1-6654-4005-9
Editor: IEEE
DOI: 10.1109/hpsr52026.2021.9481801

Scalability analysis of a blockchain-based security strategy for complex IoT systems (se abrirá en una nueva ventana)

Autores: Marti Miquel Martinez, Eva Marin-Tordera, Xavi Masip-Bruin
Publicado en: 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), 2021, Página(s) 1-6, ISBN 978-1-6654-4005-9
Editor: IEEE
DOI: 10.1109/hpsr52026.2021.9481865

A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection (se abrirá en una nueva ventana)

Autores: Alejandro Moreno (ATOS) Antonio Pastor (TID), Ignacio D. Martínez-Casanueva (TID), Daniel González-Sánchez (UPM) y Luis Bellido Triana (UPM)
Publicado en: Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023, 2023, ISSN 2472-8144
Editor: IEEE
DOI: 10.1109/icin56760.2023.10073490

MONCHi MONitoring for Cloud-native Hyperconnected Islands

Autores: Dulce N. de M. Artalejo, Ivan Vidal, Francisco Valera, and Borja Nogales
Publicado en: LNCS book from Springer, proceedings of ECMS International Conference on Modelling and Simulation, 2023
Editor: Springer

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0