Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

SECURITY BY DESIGN IOT DEVELOPMENT AND CERTIFICATE FRAMEWORK WITH FRONT-END ACCESS CONTROL

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

D1.4 Data Management Plan (öffnet in neuem Fenster)

This document addresses the relevant aspects of making data FAIR findable accessible interoperable and reusable how it will be made accessible for verification and reuse and how it will be curated and preservedIt also contains information about the recruitment of humans for the use cases and the handling of personal data

D2.1 Conclusions of architecture analysis (öffnet in neuem Fenster)

The report will summarize the research results in respect of the identified weaknesses and will provide the input for the requirement specification and research activities

D7.4 Summative Evaluation and Lessons Learnt (öffnet in neuem Fenster)

This report will summarize the findings of the demonstration operations

D7.1 Demonstration use-case specifications and KPIs (öffnet in neuem Fenster)

This document will specify all details of the demonstrations from the set of KPIs to measured against to the configuration and operational details including the involvement of endusers in case of the smart home case

D8.1 Summary of the standardisation related activities (öffnet in neuem Fenster)

The document will contain all information about the projects involvement in the work of the various standards bodies its position in regards of new standards and its contributionsrecommendations

D2.4 Security baseline of the IoTAC architecture (öffnet in neuem Fenster)

This document contains the overall description of the security framework of the IoTAC architecture

D8.4 Annual report of the IoTAC Association (öffnet in neuem Fenster)

The report will provide an overview about the status and activities of the Association. - Y2 of operation

D9.1a -9.1c Dissemination and Communication Strategy and Annual Plan (öffnet in neuem Fenster)

This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget

D3.6 Software Security Assessment Indicators and Models - Final (öffnet in neuem Fenster)

This deliverable will report the most suitable indicators for measuring the security of software applications running on IoT platforms and describe the software security assessment models that will be developed Final version

D9.5 Dissemination and Communication Strategy and Annual Plan - Y2 (öffnet in neuem Fenster)

This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget Y2

D9.6 Dissemination and Communication Strategy and Annual Plan - Y3 (öffnet in neuem Fenster)

This document will contain the annual dissemination and communication programme the project plans to implement including the assessment of the prior results the changes in strategy the expected results of the programmes and an associated financial budget Y3

D6.2 Definition of the development/integration environment and KPIs (öffnet in neuem Fenster)

The report will contain the guidelines for the development and integration strategy

D2.5 Security baseline of the IoTAC architecture - Final (öffnet in neuem Fenster)

This document contains the overall description of the security framework of the IoTAC architecture Final version

D8.3 Annual report of the IoTAC Association (öffnet in neuem Fenster)

The report will provide an overview about the status and activities of the Association

D3.7 Vulnerability Prediction Models - Final (öffnet in neuem Fenster)

This document will survey existing approaches for predicting the existence of vulnerabilities in software applications and introduce novel vulnerability prediction models Final version

D6.1 Design and development guidelines and methodology (öffnet in neuem Fenster)

This report will contain foundational development guidelines and description of the methodology

D3.2 Software Security Assessment Indicators and Models (öffnet in neuem Fenster)

This deliverable will report the most suitable indicators for measuring the security of software applications running on IoT platforms and describe the software security assessment models that will be developed

D3.4 Software Security Certification (öffnet in neuem Fenster)

This document will introduce the security certification process for software applications that will be adopted by the IoTAC project

D3.3 Vulnerability Prediction Models (öffnet in neuem Fenster)

This document will survey existing approaches for predicting the existence of vulnerabilities in software applications and introduce novel vulnerability prediction models

D2.3 Architecture design document (öffnet in neuem Fenster)

This report will provide a conceptual model of the system and software architecture of IoTAC on which the technical implementation will be based

D5.2 Working prototype of the SSD and SAM platforms (öffnet in neuem Fenster)

All components of the SSD and SAM platforms and implemented and tested.

D9.4 Website (öffnet in neuem Fenster)

The website will be prepared

D5.1 Working prototype of the IoTAC architecture and demonstration use-cases (öffnet in neuem Fenster)

All the components necessary for the demonstrations is ready, tested and certified/assessed.

Veröffentlichungen

Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices (öffnet in neuem Fenster)

Autoren: Kuaban, Godlove; Gelenbe, Erol; Czachórski, Tadeusz; Czekalski, Piotr; Tangka, Julius
Veröffentlicht in: Sensors, Ausgabe 2023, 23(13), 2023, ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s23136183

IoT Network Cybersecurity Assessment with the Associated Random Neural Network (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol; Nakip, Mert
Veröffentlicht in: IEEE Access, Ausgabe Volume: 11, 2023, Seite(n) 85501 - 85512, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.5281/zenodo.8169494

Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices (öffnet in neuem Fenster)

Autoren: Mert Nakıp; Erol Gelenbe
Veröffentlicht in: IEEE Access, Ausgabe 2022, 2022, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2022.3226700

Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction (öffnet in neuem Fenster)

Autoren: Kalouptsoglou, Ilias; Siavvas, Miltiadis; Kehagias, Dionysios; Chatzigeorgiou, Alexandros; Ampatzoglou, Apostolos
Veröffentlicht in: Entropy, Ausgabe 2022, Volume 24, Ausgabe 5, 651, 2022, ISSN 1099-4300
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/e24050651

Smart SDN Management of Fog Services to Optimize QoS and Energy. (öffnet in neuem Fenster)

Autoren: Piotr Fröhlich; Erol Gelenbe; J. Fiołka; Jacek Checinski; Mateusz Nowak; Zdzislaw Filus
Veröffentlicht in: Sensors, Ausgabe semimonthly, 2021, Seite(n) 21 pp. 1-18 (3105), ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21093105

Electricity Consumption by ICT: Facts, trends, and measurements (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol
Veröffentlicht in: Ubiquity, Ausgabe Volume 2023 (Ausgabe August), 2023, Seite(n) 1-15, ISSN 1530-2180
Herausgeber: Association for Computing Machinery
DOI: 10.1145/3613207

Software vulnerability prediction: A systematic mapping study (öffnet in neuem Fenster)

Autoren: Kalouptsoglou, Ilias; Siavvas, Miltiadis; Ampatzoglou, Apostolos; Kehagias, Dionysios; Chatzigeorgiou, Alexander
Veröffentlicht in: Information and Software Technology, Ausgabe Vol. 164, 2023, 2023, ISSN 0950-5849
Herausgeber: Elsevier BV
DOI: 10.1016/j.infsof.2023.107303

Improving Massive Access to IoT Gateways (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol; Nakip, Mert; Czachorski, Tadeusz
Veröffentlicht in: Performance Evaluation, Ausgabe Volumes 157–158, 2022, ISSN 0166-5316
Herausgeber: Elsevier BV
DOI: 10.5281/zenodo.6969949

Trajectory Planning of Automated Vehicles Using Real-Time Map Updates (öffnet in neuem Fenster)

Autoren: Szántó, Mátyás; Hidalgo, Carlos; González, Leonardo; Pérez, Joshué; Asua, Estibaliz; Vajta, László
Veröffentlicht in: IEEE Access, Ausgabe Volume 11, 2023, Seite(n) 67468 - 67481, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2023.3291350

Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models (öffnet in neuem Fenster)

Autoren: Ilias Kalouptsoglou; Dimitrios Tsoukalas; Miltiadis Siavvas; Dionysios Kehagias; Alexander Chatzigeorgiou; Apostolos Ampatzoglou
Veröffentlicht in: Electronics; Volume 11; Ausgabe 18; Pages: 2820, Ausgabe semimonthly, 2022, Seite(n) 2820, ISSN 2079-9292
Herausgeber: MDPI
DOI: 10.3390/electronics11182820

Routing Algorithms Simulation for Self-Aware SDN (öffnet in neuem Fenster)

Autoren: Piotr Pecka; Mateusz Nowak
Veröffentlicht in: Electronics, Ausgabe semimonthly, 2022, Seite(n) Volume 11; Ausgabe 1; Pages: 104, ISSN 2079-9292
Herausgeber: MDPI
DOI: 10.3390/electronics11010104

Energy, QoS and Security Aware Edge Services (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol; Nowak, Mateusz; Frohlich, Piotr; Fiolka, Jerzy; Checinski, Jacek
Veröffentlicht in: EuroCybersec2021, 2022
Herausgeber: Springer
DOI: 10.5281/zenodo.6467447

Free By Design: On the Feasibility of Free-Riding Attacks Against Zero-rated Services (öffnet in neuem Fenster)

Autoren: Fietkau, Julian; Runge, David Pascal; Seifert, Jean-Pierre
Veröffentlicht in: 20th International Conference On Cryptology And Network Security (CANS 2021), 2021, ISBN 978-3-030-92548-2
Herausgeber: Springer
DOI: 10.5281/zenodo.6471187

An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction (öffnet in neuem Fenster)

Autoren: Kalouptsoglou, Ilias Siavvas, Miltiadis Kehagias, Dionysios Chatzigeorgiou, Alexandros Ampatzoglou, Apostolos
Veröffentlicht in: EuroCybersec2021, 2022
Herausgeber: Springer
DOI: 10.5281/zenodo.6349479

Randomization of Data Generation Times Improves Performance of Predictive IoT Networks (öffnet in neuem Fenster)

Autoren: Nakıip, Mert Gelenbe, Erol
Veröffentlicht in: IEEE 7th World Forum on Internet of Things (WF-IoT 2021), 2021
Herausgeber: IEEE
DOI: 10.5281/zenodo.4721015

Optimizing Energy Usage for an Electric Drone (öffnet in neuem Fenster)

Autoren: Tadeusz Czachorski; Erol Gelenbe; Godlove Suila Kuaban; Dariusz Marek
Veröffentlicht in: EuroCybersec 2021, 2022, ISBN 978-3-031-09356-2
Herausgeber: Springer
DOI: 10.5281/zenodo.6511258

Shifting Towards the Highly Distributed Energy Ecosystem (öffnet in neuem Fenster)

Autoren: Dékány, Donát Vajta, László
Veröffentlicht in: WAIT 2021: Workshop on the Advances of Information Technology, 2021
Herausgeber: Budapest University of Technology and Economics
DOI: 10.5281/zenodo.5503818

Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints (öffnet in neuem Fenster)

Autoren: Fietkau, Julian; Mehak Zahra, Syeda; Hartung, Markus
Veröffentlicht in: EuroCybersec2021, 2022
Herausgeber: Springer
DOI: 10.5281/zenodo.6471188

Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed (öffnet in neuem Fenster)

Autoren: Mohammed Nasereddin; Mert Nakip; Gelenbe, Erol
Veröffentlicht in: Proceedings of the 48th IEEE Conference on Local Computer Networks 2023 (IEEE LCN 2023), 2023
Herausgeber: IEEE eXpress Conference Publishing
DOI: 10.5281/zenodo.8094796

Botnet Attack Detection with Incremental Online Learning (öffnet in neuem Fenster)

Autoren: Nakip, Mert; Gelenbe, Erol
Veröffentlicht in: EuroCybersec2021, 2022
Herausgeber: Springer
DOI: 10.5281/zenodo.6467409

Reinforcement Learning and Energy-Aware Routing (öffnet in neuem Fenster)

Autoren: Fröhlich, Piotr Gelenbe, Erol Nakip, Mert
Veröffentlicht in: ACM 4th FlexNets'21 Workshop at ACM SIGCOMM 2021, 2021, ISBN 978-1-4503-8383-7
Herausgeber: ACM SIGCOMM
DOI: 10.5281/zenodo.5109221

Modelling energy changes in the energy harvesting battery of an IoT device (öffnet in neuem Fenster)

Autoren: Tadeusz Czachórski; Erol Gelenbe; Godlove Suila Kuaban
Veröffentlicht in: Proceedings of the 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Ausgabe 2022, 2022
Herausgeber: IEEE
DOI: 10.5281/zenodo.6979977

An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results (öffnet in neuem Fenster)

Autoren: Tsoukalas, Dimitrios Siavvas, Miltiadis Mathioudaki, Maria Kehagias ,Dionysios
Veröffentlicht in: IEEE International Conference on Software Quality, Reliability and Security 2021 (QRS 2021), 2021
Herausgeber: IEEE
DOI: 10.5281/zenodo.6349534

Real-Time Cyberattack Detection with Offline and Online Learning (öffnet in neuem Fenster)

Autoren: Erol Gelenbe; Mert Nakıp
Veröffentlicht in: 2023 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Ausgabe 2023, 2023
Herausgeber: IEEE
DOI: 10.5281/zenodo.7974859

Modelling the Energy Performance of Off-Grid Sustainable Green Cellular Base Stations (öffnet in neuem Fenster)

Autoren: Kuaban, Godlove Suila Gelenbe, Erol Czachorski, Tadeusz Czekalski, Piotr
Veröffentlicht in: Proceedings of the 31st International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2023), 2023
Herausgeber: IEEE
DOI: 10.5281/zenodo.10033234

A self-adaptive approach for assessing the criticality of security-related static analysis alerts (öffnet in neuem Fenster)

Autoren: Siavvas, Miltiadis Kalouptsoglou, Ilias Tsoukalas, Dimitrios Kehagias, Dionysios
Veröffentlicht in: The 21st International Conference on Computational Science and Its Applications, 2021
Herausgeber: Springer
DOI: 10.1007/978-3-030-87007-2_21

Effects of Electric Vehicle Charging Stations on Electricity Grid: Challenges and Possible Solutions (öffnet in neuem Fenster)

Autoren: Sabzi, Shahab Vajta, Lászlo
Veröffentlicht in: WAIT 2021: Workshop on the Advances of Information Technology, 2021
Herausgeber: Budapest University of Technology and Economics
DOI: 10.5281/zenodo.5503851

Towards a certification scheme for IoT security evaluation (öffnet in neuem Fenster)

Autoren: Barakat, Ramon; Catal, Faruk; Hackel, Sascha; Rennoch, Axel; Schneider, Martin
Veröffentlicht in: 6th GI/ACM I4.0 Standardization Workshop on Industrial Automation and Control Systems (6th IACS WS’21), 2021
Herausgeber: German Informatics Society
DOI: 10.5281/zenodo.6469310

Diffusion Analysis Improves Scalability of IoT Networks to Mitigate the Massive Access Problem (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol Nakip, Mert Marek, Dariusz Czachorski, Tadeusz
Veröffentlicht in: 29th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2021
Herausgeber: IEEE
DOI: 10.1109/mascots53633.2021.9614289

MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network (öffnet in neuem Fenster)

Autoren: Nakip, Mert Gelenbe, Erol
Veröffentlicht in: 2021 IEEE Global Communications Conference (GLOBECOM), 2022
Herausgeber: IEEE
DOI: 10.1109/globecom46510.2021.9685306

IoT Traffic Shaping and the Massive Access Problem (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol Sigman, Karl
Veröffentlicht in: IEEE International Conference on Communications (IEEE ICC 2022), 2022
Herausgeber: IEEE
DOI: 10.5281/zenodo.6349552

The IoTAC Software Security-by-Design Platform: Concept, Challenges, and Preliminary Overview (öffnet in neuem Fenster)

Autoren: Siavvas, Miltiadis; Gelenbe, Erol; Tsoukalas, Dimitrios; Kalouptsoglou, Ilias; Mathioudaki, Maria; Nakip, Mert; Kehagias, Dionysios; Tzovaras, Dimitrios
Veröffentlicht in: Proceedings of the 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN), 2022, ISBN 9781728172453
Herausgeber: IEEE
DOI: 10.1109/drcn53993.2022.9758028

G-Networks that Detect Different Types of Cyberattacks (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol; Nakip, Mert
Veröffentlicht in: Proceedings of the 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Ausgabe 2022, 2022
Herausgeber: IEEE
DOI: 10.5281/zenodo.6969827

Mitigating the Massive Access Problem in the Internet of Things (öffnet in neuem Fenster)

Autoren: Gelenbe, Erol; Nakip, Mert; Marek, Dariusz; Czachorski, Tadeusz
Veröffentlicht in: EuroCybersec2021, 2022
Herausgeber: Springer
DOI: 10.5281/zenodo.6467431

Enhanced motion-based segmentation of vision sensed environment of moving vehicles (öffnet in neuem Fenster)

Autoren: Szántó, Mátyás Vajta, László
Veröffentlicht in: THE 1st ISRAELI SMART TRANSPORTATION RESEARCH CENTER (ISTCR) ANNUAL CONFERENCE, 2021
Herausgeber: ISTCR
DOI: 10.5281/zenodo.5521314

Revised Selected Papers of the Second International Symposium, EuroCybersec 2021 (öffnet in neuem Fenster)

Autoren: Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos (Eds.)
Veröffentlicht in: Security in Computer and Information Sciences, 2022, ISBN 978-3-031-09357-9
Herausgeber: Springer
DOI: 10.1007/978-3-031-09357-9

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0