Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Building Trust in Ecosystems and Ecosystem Components

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Report on the identified security and privacy metrics and security claims to evaluate the security of a system (se abrirá en una nueva ventana)

Identification of the metrics and claims to assess the security of an ICT system in an objective and measurable way

Dissemination Strategy - Initial Version (se abrirá en una nueva ventana)

Plan and Dissemination activities including a plan for frequent updates

Updated Report of the tools for vulnerability detection and forecasting (se abrirá en una nueva ventana)

This deliverable provides the description of the prototypes developed for detecting and forecasting vulnerabilities

BIECO Assessment report (se abrirá en una nueva ventana)

It will comprise the assessment done during the demonstrators cases and at the end it will include the final assessment and recommendations for the solution refinements in the post project period when the final commercialisation will be prepared

Updated Report of the tools for vulnerabilities propagation (se abrirá en una nueva ventana)

This deliverable provides the description of the prototype developed to characterize the propagation of vulnerabilities across the ICT supply chain

BIECO Assessment methodology (se abrirá en una nueva ventana)

Methodology detailing which tests will be performed to validate the projects results how the tests will be carried out and by whom describing how the participants will be selected The first version a will be issued at month 12 after the concept is defined and a full version b will be issued after the requirement specifications and the business cases are defined

Final version of the simulation environment and monitoring tools (se abrirá en una nueva ventana)

This deliverable contains mature solutions ready to be implemented and validated

Blockly4SoS model and simulator (se abrirá en una nueva ventana)

This deliverable includes the Blockly4SoS model including the attack graphs and the Blockly4SoS simulator that is used to test the attack paths

Project Quality Manual (se abrirá en una nueva ventana)

The project quality will be based on a set of rules defined in the guidelines

Risk Assessment and additional requirements (se abrirá en una nueva ventana)

This deliverable contains the description of the dynamic risk analysis of security and safety threads

Security certification methodology development (se abrirá en una nueva ventana)

Implementation of the methodology through the tools defined within the project to provide evidence based security certification

Report on the state of the art of vulnerability management (se abrirá en una nueva ventana)

This deliverable reports on the current state of the art and forms the basis for further development

Project Requirements (se abrirá en una nueva ventana)

This deliverable describes the requirements of the project in terms of delivered artefacts

Overall framework architecture design (1st Draft) (se abrirá en una nueva ventana)

This document includes all the major aspects of the BIECO architecture as defined in T23

First version of the simulation environment and monitoring solutions (se abrirá en una nueva ventana)

This deliverable will contain preliminary solutions ready to be implemented and validated

Report of the tools for vulnerability detection and forecasting (se abrirá en una nueva ventana)

This deliverable provides the description of the prototypes developed for detecting and forecasting vulnerabilities

Dissemination Strategy - Updated Version (se abrirá en una nueva ventana)

Plan and Dissemination activities including a plan for frequent updates

Blockly4SoS user guide. (se abrirá en una nueva ventana)

This deliverable represents the user guide of the Blockly4SoS at the light of the new features added

Dissemination Strategy - Final Report (se abrirá en una nueva ventana)

Plan and Dissemination activities including a plan for frequent updates

Security certification methodology definition (se abrirá en una nueva ventana)

Definition and description of the security certification methodology and its different phases and interconnections

Report of the tools for vulnerabilities propagation (se abrirá en una nueva ventana)

This deliverable provides the description of the prototype developed to characterize the propagation of vulnerabilities across the ICT supply chain

Update of Data Management Plan (se abrirá en una nueva ventana)

The Data Management Plan DMP will be set up according to the special needs of the project and will act as a monitoring system to keep track of IP issues and open research data for the H2020 pilot

BIECO verification and testing strategy (se abrirá en una nueva ventana)

Definition of a testing and integration strategy for the individual components as well as the unified BIECO platform

Overall system architecture Update (Final) (se abrirá en una nueva ventana)

This deliverable presents the final version of the envisioned framework architecture

Mitigations identification and their design (se abrirá en una nueva ventana)

This deliverable details and architect the approach to define mitigations

Data Management Plan (se abrirá en una nueva ventana)

The Data Management Plan DMP will be set up according to the special needs of the project and will act as a monitoring system to keep track of IP issues and open research data for the H2020 pilot

Publicaciones

BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)

Autores: Eda Marchetti
Publicado en: Italian newspaper “il sole 24 ore” special insert “SCENARI”, Edición daily (published 28th of February 2022), 2022, Página(s) 9
Editor: Gruppo 24 ORE

Basic Aspects in Redundancy-Based Intrusion Tolerance (se abrirá en una nueva ventana)

Autores: Felicita Di Giandomenico, Giulio Masetti
Publicado en: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400., Edición 23 September 2021, 2021, ISBN 978-3-030-87872-6
Editor: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_19

A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities (se abrirá en una nueva ventana)

Autores: O. Cosma, M. Macelaru, P. C. Pop, C. Sabo, I. Zelina
Publicado en: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), Edición 1400, 2022, Página(s) 224-233, ISBN 978-3-030-87871-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-87872-6_22

A Survey on the State of the Art of Vulnerability Assessment Techniques (se abrirá en una nueva ventana)

Autores: Eva Sotos Martínez, Nora M. Villanueva and Lilian Adkinson Orellana
Publicado en: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400., Edición 22 September 2021, 2021, Página(s) 203-2013, ISSN 978-3-030-87871-9978-3-030-87872-6
Editor: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_20

Out-of-sync Schedule Robustness for Time-sensitive Networks (se abrirá en una nueva ventana)

Autores: Silviu S. Craciunas, Ramon Serna Oliver
Publicado en: 17th IEEE International Conference on Factory Communication Systems (WFCS), Edición 1905, 2021, Página(s) 8, ISBN 978-1-6654-2478-3
Editor: IEEE
DOI: 10.1109/wfcs46889.2021.9483602

Goals within Trust-based Digital Ecosystems (se abrirá en una nueva ventana)

Autores: Emilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider
Publicado en: 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES), Edición 3rd of June 2021, 2021, Página(s) 1-7, ISBN 978-1-6654-4561-0
Editor: IEEE
DOI: 10.1109/sesos-wdes52566.2021.00006

Predictive Simulation for Building Trust Within Service-Based Ecosystems

Autores: Emilia Cioroaica, Said Daoudagh, Eda Marchetti
Publicado en: 2022, Página(s) 34-37
Editor: IEEE

GRADUATION: A GDPR-based Mutation Methodology (se abrirá en una nueva ventana)

Autores: Said Daoudagh, Eda Marchetti
Publicado en: Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439, Edición 08 September 2021, 2021, Página(s) 311-324, ISBN 978-3-030-85347-1
Editor: Springer, Cham
DOI: 10.1007/978-3-030-85347-1_23

BIECO Runtime Auditing Framework (se abrirá en una nueva ventana)

Autores: Antonello Calabrò, Emilia Cioroaica, Said Daoudagh, Eda Marchetti
Publicado en: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400, Edición 22 September 2021, 2021, Página(s) 181-191, ISSN 978-3-030-87871-9978-3-030-87872-6
Editor: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_18

Comparison of Safety and Security Analysis Techniques (se abrirá en una nueva ventana)

Autores: Emilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos
Publicado en: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400, Edición 22 September 2021, 2021, Página(s) 234-242, ISBN 978-3-030-87872-6
Editor: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_23

StaDRE and StaDRo: Reliability and Robustness Estimation of ML-based Forecasting using Statistical Distance Measures

Autores: Mohammed Naveed Akram, Akshatha Ambekar, Ioannis Sorokos, Koorosh Aslansefat, and Daniel Schneider
Publicado en: 2022
Editor: Springer

MENTORS - Monitoring Environment for System of Systems (se abrirá en una nueva ventana)

Autores: Antonello Calabrò, Said Daoudagh, Eda Marchetti
Publicado en: Proceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), Edición 26 October 2021, 2021, Página(s) 291-298, ISBN 978-989-758-536-4
Editor: SciTePress
DOI: 10.5220/0010658900003058

The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities (se abrirá en una nueva ventana)

Autores: Said Daoudagh, Eda Marchetti
Publicado en: Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, Edición 09 February 2022, 2022, Página(s) 571-578, ISBN 978-989-758-553-1
Editor: SciTePress
DOI: 10.5220/0010912300003120

Bridging Trust in Runtime Open Evaluation Scenarios (se abrirá en una nueva ventana)

Autores: Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas Kuhn
Publicado en: Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481, Edición LNCS, volume 12732, 2021, Página(s) 112-120, ISBN 978-3-030-87657-9
Editor: Springer, Cham
DOI: 10.1007/978-3-030-87657-9_9

A MDE Tool for Security RiskAssessment of Enterprises (se abrirá en una nueva ventana)

Autores: Enrico Schiavone, Nicola Nostro, Francesco Brancati
Publicado en: INDUSTRY TRACK - LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10. , 2021, Florianópolis., Edición 22 November 2021, 2021
Editor: SBC
DOI: 10.5753/ladc.2021.18530

Forecasting the Number of Bugs and Vulnerabilities in Software Components using Neural Network Models

Autores: Ovidiu Cosma, Petrică Pop, Cosmin Sabo, Laura Cosma
Publicado en: 2022
Editor: Springer

The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems

Autores: Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata.
Publicado en: The 33rd IFIP International Conference on Testing Software and Systems (IFIP-ICTSS), Edición 10-11 November 2021, 2021
Editor: Springer, Cham

GROOT: A GDPR-Based Combinatorial Testing Approach

Autores: Said Daoudagh and Eda Marchetti
Publicado en: 2021, Página(s) 210-217
Editor: Springher

LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices (se abrirá en una nueva ventana)

Autores: Ramon Sanchez-Iborra
Publicado en: Sensors, Edición Vol 21 Edición 15, 2021, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21155218

On Autonomous Dynamic Software Ecosystems (se abrirá en una nueva ventana)

Autores: Rafael Capilla,Emilia Cioroaica, Barbora Buhnova, and Jan Bosch
Publicado en: IEEE Transactions on Engineering Management, Edición 27 October 2021, 2021, Página(s) 1-15, ISSN 1558-0040
Editor: IEEE
DOI: 10.1109/tem.2021.3116873

The Challenges of Software Cybersecurity Certification (se abrirá en una nueva ventana)

Autores: José Luis Hernández-Ramos, Sara Nieves Matheu-García, Antonio Skarmeta
Publicado en: IEEE Security & Privacy, Edición Vol. 19, Edición 1, 2021, Página(s) 99-102, ISSN 1558-4046
Editor: IEEE
DOI: 10.1109/msec.2020.3037845

Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions (se abrirá en una nueva ventana)

Autores: José Luis Hernández-Ramos, Sara Nieves Matheu-García, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal-Bernabe, Poonam Yadav, Antonio Skarmet Paolo Bellavista
Publicado en: IEEE Access, Edición Vol 9, 2021, Página(s) 126265 - 126285, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3111477

Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture (se abrirá en una nueva ventana)

Autores: Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica
Publicado en: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), Edición 1400, 2022, Página(s) 214-223, ISBN 978-3-030-87871-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-87872-6_21

The GDPR Compliance Through Access Control Systems

Autores: Said Daoudagh
Publicado en: ETD Archivio digitale delle tesi discusse presso l'Università di Pisa, Edición 20 July 2021, 2021
Editor: University of Pisa

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0