Deliverables Open Research Data Pilot (1) D1.4 Data Management Plan This document addresses the relevant aspects of making data FAIR findable accessible interoperable and reusable how it will be made accessible for verification and reuse and how it will be curated and preservedIt also contains information about the recruitment of humans for the use cases and the handling of personal data Documents, reports (10) D2.1 Conclusions of architecture analysis The report will summarize the research results in respect of the identified weaknesses and will provide the input for the requirement specification and research activities D7.1 Demonstration use-case specifications and KPIs This document will specify all details of the demonstrations from the set of KPIs to measured against to the configuration and operational details including the involvement of endusers in case of the smart home case D2.4 Security baseline of the IoTAC architecture This document contains the overall description of the security framework of the IoTAC architecture D9.1a -9.1c Dissemination and Communication Strategy and Annual Plan This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget D9.5 Dissemination and Communication Strategy and Annual Plan - Y2 This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget Y2 D6.2 Definition of the development/integration environment and KPIs The report will contain the guidelines for the development and integration strategy D6.1 Design and development guidelines and methodology This report will contain foundational development guidelines and description of the methodology D3.2 Software Security Assessment Indicators and Models This deliverable will report the most suitable indicators for measuring the security of software applications running on IoT platforms and describe the software security assessment models that will be developed D3.3 Vulnerability Prediction Models This document will survey existing approaches for predicting the existence of vulnerabilities in software applications and introduce novel vulnerability prediction models D2.3 Architecture design document This report will provide a conceptual model of the system and software architecture of IoTAC on which the technical implementation will be based Other (1) D9.4 Website The website will be prepared Publications Conference proceedings (16) Energy, QoS and Security Aware Edge Services Author(s): Gelenbe, Erol; Nowak, Mateusz; Frohlich, Piotr; Fiolka, Jerzy; Checinski, Jacek Published in: EuroCybersec2021, 2022 Publisher: Springer DOI: 10.5281/zenodo.6467447 Free By Design: On the Feasibility of Free-Riding Attacks Against Zero-rated Services Author(s): Fietkau, Julian; Runge, David Pascal; Seifert, Jean-Pierre Published in: 20th International Conference On Cryptology And Network Security (CANS 2021), 2021, ISBN 978-3-030-92548-2 Publisher: Springer DOI: 10.5281/zenodo.6471187 An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Author(s): Kalouptsoglou, Ilias Siavvas, Miltiadis Kehagias, Dionysios Chatzigeorgiou, Alexandros Ampatzoglou, Apostolos Published in: EuroCybersec2021, 2022 Publisher: Springer DOI: 10.5281/zenodo.6349479 Randomization of Data Generation Times Improves Performance of Predictive IoT Networks Author(s): Nakıip, Mert Gelenbe, Erol Published in: IEEE 7th World Forum on Internet of Things (WF-IoT 2021), 2021 Publisher: IEEE DOI: 10.5281/zenodo.4721015 Shifting Towards the Highly Distributed Energy Ecosystem Author(s): Dékány, Donát Vajta, László Published in: WAIT 2021: Workshop on the Advances of Information Technology, 2021 Publisher: Budapest University of Technology and Economics DOI: 10.5281/zenodo.5503818 Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints Author(s): Fietkau, Julian; Mehak Zahra, Syeda; Hartung, Markus Published in: EuroCybersec2021, 2022 Publisher: Springer DOI: 10.5281/zenodo.6471188 Botnet Attack Detection with Incremental Online Learning Author(s): Nakip, Mert; Gelenbe, Erol Published in: EuroCybersec2021, 2022 Publisher: Springer DOI: 10.5281/zenodo.6467409 Reinforcement Learning and Energy-Aware Routing Author(s): Fröhlich, Piotr Gelenbe, Erol Nakip, Mert Published in: ACM 4th FlexNets'21 Workshop at ACM SIGCOMM 2021, 2021, ISBN 978-1-4503-8383-7 Publisher: ACM SIGCOMM DOI: 10.5281/zenodo.5109221 An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results Author(s): Tsoukalas, Dimitrios Siavvas, Miltiadis Mathioudaki, Maria Kehagias ,Dionysios Published in: IEEE International Conference on Software Quality, Reliability and Security 2021 (QRS 2021), 2021 Publisher: IEEE DOI: 10.5281/zenodo.6349534 A self-adaptive approach for assessing the criticality of security-related static analysis alerts Author(s): Siavvas, Miltiadis Kalouptsoglou, Ilias Tsoukalas, Dimitrios Kehagias, Dionysios Published in: The 21st International Conference on Computational Science and Its Applications, 2021 Publisher: Springer DOI: 10.1007/978-3-030-87007-2_21 Effects of Electric Vehicle Charging Stations on Electricity Grid: Challenges and Possible Solutions Author(s): Sabzi, Shahab Vajta, Lászlo Published in: WAIT 2021: Workshop on the Advances of Information Technology, 2021 Publisher: Budapest University of Technology and Economics DOI: 10.5281/zenodo.5503851 Towards a certification scheme for IoT security evaluation Author(s): Barakat, Ramon; Catal, Faruk; Hackel, Sascha; Rennoch, Axel; Schneider, Martin Published in: 6th GI/ACM I4.0 Standardization Workshop on Industrial Automation and Control Systems (6th IACS WS’21), 2021 Publisher: German Informatics Society DOI: 10.5281/zenodo.6469310 Diffusion Analysis Improves Scalability of IoT Networks to Mitigate the Massive Access Problem Author(s): Gelenbe, Erol Nakip, Mert Marek, Dariusz Czachorski, Tadeusz Published in: 29th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2021 Publisher: IEEE DOI: 10.1109/mascots53633.2021.9614289 MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network Author(s): Nakip, Mert Gelenbe, Erol Published in: 2021 IEEE Global Communications Conference (GLOBECOM), 2022 Publisher: IEEE DOI: 10.1109/globecom46510.2021.9685306 IoT Traffic Shaping and the Massive Access Problem Author(s): Gelenbe, Erol Sigman, Karl Published in: IEEE International Conference on Communications (IEEE ICC 2022), 2022 Publisher: IEEE DOI: 10.5281/zenodo.6349552 Mitigating the Massive Access Problem in the Internet of Things Author(s): Gelenbe, Erol; Nakip, Mert; Marek, Dariusz; Czachorski, Tadeusz Published in: EuroCybersec2021, 2022 Publisher: Springer DOI: 10.5281/zenodo.6467431 Other (1) Enhanced motion-based segmentation of vision sensed environment of moving vehicles Author(s): Szántó, Mátyás Vajta, László Published in: THE 1st ISRAELI SMART TRANSPORTATION RESEARCH CENTER (ISTCR) ANNUAL CONFERENCE, 2021 Publisher: ISTCR DOI: 10.5281/zenodo.5521314 Peer reviewed articles (2) Smart SDN Management of Fog Services to Optimize QoS and Energy. Author(s): Piotr Fröhlich; Erol Gelenbe; J. Fiołka; Jacek Checinski; Mateusz Nowak; Zdzislaw Filus Published in: Sensors, Issue semimonthly, 2021, Page(s) 21 pp. 1-18 (3105), ISSN 1424-8220 Publisher: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s21093105 Routing Algorithms Simulation for Self-Aware SDN Author(s): Piotr Pecka; Mateusz Nowak Published in: Electronics, Issue semimonthly, 2022, Page(s) Volume 11; Issue 1; Pages: 104, ISSN 2079-9292 Publisher: MDPI DOI: 10.3390/electronics11010104 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available