Skip to main content
European Commission logo print header

SECURITY BY DESIGN IOT DEVELOPMENT AND CERTIFICATE FRAMEWORK WITH FRONT-END ACCESS CONTROL

Deliverables

D1.4 Data Management Plan

This document addresses the relevant aspects of making data FAIR findable accessible interoperable and reusable how it will be made accessible for verification and reuse and how it will be curated and preservedIt also contains information about the recruitment of humans for the use cases and the handling of personal data

D2.1 Conclusions of architecture analysis

The report will summarize the research results in respect of the identified weaknesses and will provide the input for the requirement specification and research activities

D7.1 Demonstration use-case specifications and KPIs

This document will specify all details of the demonstrations from the set of KPIs to measured against to the configuration and operational details including the involvement of endusers in case of the smart home case

D2.4 Security baseline of the IoTAC architecture

This document contains the overall description of the security framework of the IoTAC architecture

D9.1a -9.1c Dissemination and Communication Strategy and Annual Plan

This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget

D9.5 Dissemination and Communication Strategy and Annual Plan - Y2

This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget Y2

D6.2 Definition of the development/integration environment and KPIs

The report will contain the guidelines for the development and integration strategy

D6.1 Design and development guidelines and methodology

This report will contain foundational development guidelines and description of the methodology

D3.2 Software Security Assessment Indicators and Models

This deliverable will report the most suitable indicators for measuring the security of software applications running on IoT platforms and describe the software security assessment models that will be developed

D3.3 Vulnerability Prediction Models

This document will survey existing approaches for predicting the existence of vulnerabilities in software applications and introduce novel vulnerability prediction models

D2.3 Architecture design document

This report will provide a conceptual model of the system and software architecture of IoTAC on which the technical implementation will be based

D9.4 Website

The website will be prepared

Publications

Energy, QoS and Security Aware Edge Services

Author(s): Gelenbe, Erol; Nowak, Mateusz; Frohlich, Piotr; Fiolka, Jerzy; Checinski, Jacek
Published in: EuroCybersec2021, 2022
Publisher: Springer
DOI: 10.5281/zenodo.6467447

Free By Design: On the Feasibility of Free-Riding Attacks Against Zero-rated Services

Author(s): Fietkau, Julian; Runge, David Pascal; Seifert, Jean-Pierre
Published in: 20th International Conference On Cryptology And Network Security (CANS 2021), 2021, ISBN 978-3-030-92548-2
Publisher: Springer
DOI: 10.5281/zenodo.6471187

An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction

Author(s): Kalouptsoglou, Ilias Siavvas, Miltiadis Kehagias, Dionysios Chatzigeorgiou, Alexandros Ampatzoglou, Apostolos
Published in: EuroCybersec2021, 2022
Publisher: Springer
DOI: 10.5281/zenodo.6349479

Randomization of Data Generation Times Improves Performance of Predictive IoT Networks

Author(s): Nakıip, Mert Gelenbe, Erol
Published in: IEEE 7th World Forum on Internet of Things (WF-IoT 2021), 2021
Publisher: IEEE
DOI: 10.5281/zenodo.4721015

Shifting Towards the Highly Distributed Energy Ecosystem

Author(s): Dékány, Donát Vajta, László
Published in: WAIT 2021: Workshop on the Advances of Information Technology, 2021
Publisher: Budapest University of Technology and Economics
DOI: 10.5281/zenodo.5503818

Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints

Author(s): Fietkau, Julian; Mehak Zahra, Syeda; Hartung, Markus
Published in: EuroCybersec2021, 2022
Publisher: Springer
DOI: 10.5281/zenodo.6471188

Botnet Attack Detection with Incremental Online Learning

Author(s): Nakip, Mert; Gelenbe, Erol
Published in: EuroCybersec2021, 2022
Publisher: Springer
DOI: 10.5281/zenodo.6467409

Reinforcement Learning and Energy-Aware Routing

Author(s): Fröhlich, Piotr Gelenbe, Erol Nakip, Mert
Published in: ACM 4th FlexNets'21 Workshop at ACM SIGCOMM 2021, 2021, ISBN 978-1-4503-8383-7
Publisher: ACM SIGCOMM
DOI: 10.5281/zenodo.5109221

An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results

Author(s): Tsoukalas, Dimitrios Siavvas, Miltiadis Mathioudaki, Maria Kehagias ,Dionysios
Published in: IEEE International Conference on Software Quality, Reliability and Security 2021 (QRS 2021), 2021
Publisher: IEEE
DOI: 10.5281/zenodo.6349534

A self-adaptive approach for assessing the criticality of security-related static analysis alerts

Author(s): Siavvas, Miltiadis Kalouptsoglou, Ilias Tsoukalas, Dimitrios Kehagias, Dionysios
Published in: The 21st International Conference on Computational Science and Its Applications, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-87007-2_21

Effects of Electric Vehicle Charging Stations on Electricity Grid: Challenges and Possible Solutions

Author(s): Sabzi, Shahab Vajta, Lászlo
Published in: WAIT 2021: Workshop on the Advances of Information Technology, 2021
Publisher: Budapest University of Technology and Economics
DOI: 10.5281/zenodo.5503851

Towards a certification scheme for IoT security evaluation

Author(s): Barakat, Ramon; Catal, Faruk; Hackel, Sascha; Rennoch, Axel; Schneider, Martin
Published in: 6th GI/ACM I4.0 Standardization Workshop on Industrial Automation and Control Systems (6th IACS WS’21), 2021
Publisher: German Informatics Society
DOI: 10.5281/zenodo.6469310

Diffusion Analysis Improves Scalability of IoT Networks to Mitigate the Massive Access Problem

Author(s): Gelenbe, Erol Nakip, Mert Marek, Dariusz Czachorski, Tadeusz
Published in: 29th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2021
Publisher: IEEE
DOI: 10.1109/mascots53633.2021.9614289

MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network

Author(s): Nakip, Mert Gelenbe, Erol
Published in: 2021 IEEE Global Communications Conference (GLOBECOM), 2022
Publisher: IEEE
DOI: 10.1109/globecom46510.2021.9685306

IoT Traffic Shaping and the Massive Access Problem

Author(s): Gelenbe, Erol Sigman, Karl
Published in: IEEE International Conference on Communications (IEEE ICC 2022), 2022
Publisher: IEEE
DOI: 10.5281/zenodo.6349552

Mitigating the Massive Access Problem in the Internet of Things

Author(s): Gelenbe, Erol; Nakip, Mert; Marek, Dariusz; Czachorski, Tadeusz
Published in: EuroCybersec2021, 2022
Publisher: Springer
DOI: 10.5281/zenodo.6467431

Enhanced motion-based segmentation of vision sensed environment of moving vehicles

Author(s): Szántó, Mátyás Vajta, László
Published in: THE 1st ISRAELI SMART TRANSPORTATION RESEARCH CENTER (ISTCR) ANNUAL CONFERENCE, 2021
Publisher: ISTCR
DOI: 10.5281/zenodo.5521314

Smart SDN Management of Fog Services to Optimize QoS and Energy.

Author(s): Piotr Fröhlich; Erol Gelenbe; J. Fiołka; Jacek Checinski; Mateusz Nowak; Zdzislaw Filus
Published in: Sensors, Issue semimonthly, 2021, Page(s) 21 pp. 1-18 (3105), ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21093105

Routing Algorithms Simulation for Self-Aware SDN

Author(s): Piotr Pecka; Mateusz Nowak
Published in: Electronics, Issue semimonthly, 2022, Page(s) Volume 11; Issue 1; Pages: 104, ISSN 2079-9292
Publisher: MDPI
DOI: 10.3390/electronics11010104

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available