Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Secure and Seamless Edge-to-Cloud Analytics

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Report on threat landscape and security solutions (se abrirá en una nueva ventana)

Report of the findings from Task 51 along with a mapping and prioritization list for coverage in ELEGANT

Power/Performance analysis of accelerated kernels (Final) (se abrirá en una nueva ventana)

This report will include the final numbers (a revision of D3.1) regarding the performance improvement and any overheads of the compilation of the ELEGANT data operators as well as final numbers after applying hardware acceleration on cloud deployments.

Project Management Plan (se abrirá en una nueva ventana)

Description of the project management methodology financial aspect administrative forms and templates for management of the project by all partners

Quality Assurance and Risk Management Plan (se abrirá en una nueva ventana)

This deliverable will describe the quality plan of the project and the required activities for the efficient implementation of the quality system It will also include a simple but stateoftheart risk management plan

User requirements (se abrirá en una nueva ventana)

This deliverable will report the PESRD requirements of the intended user groups that will drive the definition of ELEGANT architecture This includes an initial definition of the use cases SLAs data operators and security requirements

Applications' definitions (Final) (se abrirá en una nueva ventana)

Following the successful mid project checkpoint (M2.1), a final re-evaluation of the user and application PESRD requirements will be performed. Having an insight of the applications’ behaviour and performance, a thorough study regarding the successful achievement of their SLAs will be performed. Any additions to D2.2 will be performed and documented in this report along with final versions of ELEGANT’s use cases.

Development and evaluation (Final) (se abrirá en una nueva ventana)

Demonstration of the correct operation of the entire ELEGANT system under operational scenarios demonstrated by the use cases. Report on all results, use cases, and achievement of KPIs.

Quality Assurance and Risk Management Plan - final version (se abrirá en una nueva ventana)

This deliverable will describe the quality plan of the project and the required activities for the efficient implementation of the quality system It will also include a simple but stateoftheart risk management plan

ELEGANT Acceleration as a Service Prototype (Final) (se abrirá en una nueva ventana)

The first prototype of the ELEGANT Acceleration Service will be delivered which will include the following: 1) Successful execution on all IoT devices, gateways and cloud configurations of the ELEGANT project, 2) Transparent generation of heterogeneous code for the incoming operators, and 3) Hardware acceleration of data operators implemented up to M18.

Data operators' creation API (Final) (se abrirá en una nueva ventana)

Final version of the APIs for data operators.

Elastic runtime (Final) (se abrirá en una nueva ventana)

Final version of unified elastic runtime for IoT devices and cloud servers.

Cross-cutting development and management tools (Final) (se abrirá en una nueva ventana)

Final version of the cross-cutting development and management tools.

ELEGANT orchestrator (Final) (se abrirá en una nueva ventana)

Includes the final versions of the profiling accumulator, the ML-based scheduler and the physical plan enforcer.

Cybersecurity mechanisms (Final) (se abrirá en una nueva ventana)

This deliverable will include the final report and developed software for all cybersecurity solutions integrated within the ELEGANT stack.

Formal language for specifying security properties and operational model for verification (Final) (se abrirá en una nueva ventana)

Develop and implement simplified models of the most common Java classes needed for verifying security properties in the embedded code in IoT devices using different verification strategies, e.g. incremental bounded model checking and k-induction.

Project Presentation and Web Portal (se abrirá en una nueva ventana)

A project presentation and the initial project website with elementary information and its logo and setup of the projects social network accounts

Data Management Plan (se abrirá en una nueva ventana)

This report will include the data management plan including all the necessary steps that will be taken in order to ensure GDPR compliance Any amendments to the DMP after M6 will be included in the projects final report

Publicaciones

Strengths and weaknesses of deep, convolutional and recurrent neural networks in network intrusion detection deployments (se abrirá en una nueva ventana)

Autores: Marek Pawlicki
Publicado en: 31ST INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS DEVELOPMENT (ISD2023 LISBON, PORTUGAL), Edición 2023, 2023
Editor: AIS eLibrary
DOI: 10.62036/isd.2023.54

Scaling Up Performance of Managed Applications on NUMA Systems (se abrirá en una nueva ventana)

Autores: Orion Papadakis; Andreas Andronikakis; Nikos Foutris; Michail Papadimitriou; Athanasios Stratikopoulos; Foivos Zakkak; Polychronis Xekalakis; Christos Kotselidis
Publicado en: The 2023 ACM SIGPLAN International Symposium on Memory Management (ISMM 2023), Edición 2023, 2023
Editor: ACM
DOI: 10.1145/3591195.3595270

Hardware-assisted and Deep-Learning techniques for Low-Power Detection of Cardiovascular Abnormalities in Smart Wearables (se abrirá en una nueva ventana)

Autores: A. Catalani; Ioannis Chatzigiannakis; Aris Anagnostopoulos; G. Akrivopoulou; Dimitrios Amaxilatis; Athanasios Antoniou
Publicado en: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), 2021
Editor: IEEE
DOI: 10.1109/smartiot52359.2021.00031

Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation (se abrirá en una nueva ventana)

Autores: Juan Fumero, Gyorgy Rethy, Athanasios Stratikopoulos, Nikos Foutris, Christos Kotselidis
Publicado en: VMIL 2023: Proceedings of the 15th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, Edición October 2023, 2023, Página(s) 61-72
Editor: ACM
DOI: 10.1145/3623507.3623555

FuSeBMC v4: Smart Seed Generation for Hybrid Fuzzing: (Competition Contribution) (se abrirá en una nueva ventana)

Autores: Kaled M. Alshmrany, Mohannad Aldughaim, Ahmed Bhayat, and Lucas C. Cordeiro
Publicado en: Fundamental Approaches to Software Engineering: 25th International Conference, FASE 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, 2022
Editor: Springer Link
DOI: 10.1007/978-3-030-99429-7_19

The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-based Network Intrusion Detection Systems for DoS Detection in IoT Networks (se abrirá en una nueva ventana)

Autores: Marek Pawlicki, Rafal Kozik, and Michal Choras
Publicado en: Mobisec2023, Edición 2023, 2024
Editor: Springer
DOI: 10.5281/zenodo.11046767

Cross-Language Interoperability of Heterogeneous Code (se abrirá en una nueva ventana)

Autores: Athanasios Stratikopoulos; Florin Blanaru; Juan Fumero; Maria Xekalaki; Orion Papadakis; Christos Kotselidis
Publicado en: Programming 2023, MoreVMs 2023, 2023
Editor: ACM
DOI: 10.5281/zenodo.7845384

Unified Shared Memory: Friend or Foe? Understanding the Implications of Unified Memory on Managed Heaps (se abrirá en una nueva ventana)

Autores: Juan Fumero, Florin Blanaru, Athanasios Stratikopoulos, Steve Dohrmann, Sandhya Viswanathan, Christos Kotselidis
Publicado en: MPLR 2023: Proceedings of the 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, Edición October 2023, 2023, Página(s) 143-157
Editor: ACM
DOI: 10.1145/3617651.3622984

Discovery privacy threats via devicede-anonymizationin LoRaWAN (se abrirá en una nueva ventana)

Autores: Pietro Spadaccino, Domenico Garlisi, Francesca Cuomo, Giorgio Pillon, Patrizio Pisani
Publicado en: 19th Mediterranean Communication and Computer Networking Conference (MedComNet), 2021
Editor: IEEE
DOI: 10.1109/medcomnet52149.2021.9501247

Automatically exploiting the memory hierarchy of GPUs through just-in-time compilation (se abrirá en una nueva ventana)

Autores: Papadimitriou, M., Fumero, J., Stratikopoulos, A., & Kotselidis, C.
Publicado en: Proceedings of the 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2021
Editor: ACM
DOI: 10.1145/3453933.3454014

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection (se abrirá en una nueva ventana)

Autores: Marek Pawlicki; Rafał Kozik; Michał Choraś
Publicado en: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Edición August 2022, 2022
Editor: Association for Computing Machinery
DOI: 10.1145/3538969.3544428

Using IoT Data-Driven Analysis of Water Consumption to support Design for Sustainable Behaviour during the COVID-19 Pandemic (se abrirá en una nueva ventana)

Autores: Zecchini, Marco; Griesi, Alessandra Anna; Chatzigiannakis, Ioannis; Mavrommati, Irene; Amaxilatis, Dimitrios; Akrivopoulos, Orestis
Publicado en: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Edición 24-26 September 2021, 2021
Editor: IEEE
DOI: 10.1109/SEEDA-CECNSM53056.2021.9566237

Multiple-tasks on multiple-devices (MTMD): exploiting concurrency in heterogeneous managed runtimes (se abrirá en una nueva ventana)

Autores: Papadimitriou, M., Markou, E., Fumero, J., Stratikopoulos, A., Blanaru, F., & Kotselidis, C.
Publicado en: Proceedings of the 17th ACM SIGPLAN/SIGOPS international conference on virtual execution environments, 2021
Editor: ACM
DOI: 10.1145/3453933.3454019

Incremental stream query merging (se abrirá en una nueva ventana)

Autores: Ankit Chaudhary, Jeyhun Karimov, Steffen Zeuch, Volker Markl
Publicado en: Proceedings of the 26th International Conference on Extending Database Technology (EDBT), 2023, ISBN 978-3-89318-092-9
Editor: OpenProceedings.org
DOI: 10.48786/edbt.2023.51

Clouseau: Blockchain-based Data Integrity for HDFS Clusters (se abrirá en una nueva ventana)

Autores: Konsta, A., Mytilinis, I., Doka, K., Niarchos, S., & Koziris, N.
Publicado en: 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Editor: IEEE
DOI: 10.1109/icde51399.2021.00314

Enabling Edge processing on LoRaWAN architecture (se abrirá en una nueva ventana)

Autores: Stefano Milani, Domenico Garlisi, Matteo Di Fraia, Patrizio Pisani, Ioannis Chatzigiannakis
Publicado en: 29th Annual International Conference on Mobile Computing and Networking, Edición 29th, Annual, 2023, ISBN 9781450399906
Editor: Association for Computing Machinery
DOI: 10.1145/3570361.3614074

Planning Workflow Executions over the Edge-to-Cloud Continuum (se abrirá en una nueva ventana)

Autores: Marianna Tzortzi, Charalampos Kleitsikas, Agis Politis, Sotirios Niarchos, Katerina Doka & Nectarios Koziris
Publicado en: International Symposium on Algorithmic Aspects of Cloud Computing, Edición 2023, 2024, ISBN 978-3-031-49360-7
Editor: Springer Link
DOI: 10.1007/978-3-031-49361-4_1

A Multifaceted Memory Analysis of Java Benchmarks (se abrirá en una nueva ventana)

Autores: Orion Papadakis, Andreas Andronikakis, Nikos Foutris, Michail Papadimitriou, Athanasios Stratikopoulos, Foivos S. Zakkak, Polychronis Xekalakis, Christos Kotselidis
Publicado en: MPLR 2023: Proceedings of the 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2023, Página(s) 70-84, ISBN 9798400703805
Editor: ACM
DOI: 10.1145/3617651.3622978

Enabling Pipeline Parallelism in Heterogeneous Managed Runtime Environments via Batch Processing (se abrirá en una nueva ventana)

Autores: Florin Blanaru; Athanasios Stratikopoulos; Juan Fumero; Christos Kotselidis
Publicado en: VEE 2022: Proceedings of the 18th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Edición 3, 2022
Editor: ACM
DOI: 10.1145/3516807.3516821

Real-Time Leakage Zone Detection in Water Distribution Networks: A Machine Learning-Based Stream Processing Algorithm (se abrirá en una nueva ventana)

Autores: Domenico Garlisi, Gabriele Restuccia, Ilenia Tinnirello, Francesca Cuomo, Ioannis Chatzigiannakis
Publicado en: Algorithmic Aspects of Cloud Computing 2023, 2023, ISBN 978-3-031-49360-7
Editor: Springer, Cham
DOI: 10.5281/zenodo.10695519

A Coexistence Study of Low-Power Wide-Area Networks based on LoRaWAN and Sigfox (se abrirá en una nueva ventana)

Autores: Domenico Garlisi, Antonino Pagano, Fabrizio Guiliano, Daniele Croce, Ilenia Tinnirello
Publicado en: 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, United Kingdom, 2023, pp. 1-7, Edición 2023, 2023, Página(s) 1-7, ISBN 978-1-6654-9122-8
Editor: IEEE
DOI: 10.1109/wcnc55385.2023.10118692

How to secure the IoT-based surveillance systems in an ELEGANT way (se abrirá en una nueva ventana)

Autores: Aleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Michal Choras
Publicado en: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Edición 28 August 2023, 2023
Editor: IEEE
DOI: 10.1109/csr57506.2023.10224938

Enabling Transparent Acceleration of Big Data Frameworks Using Heterogeneous Hardware (se abrirá en una nueva ventana)

Autores: Maria Xekalaki; Juan Fumero; Athanasios Stratikopoulos; Katerina Doka; Christos Katsakioris; Constantinos Bitsakos; Nectarios Koziris; Christos Kotselidis
Publicado en: Proceedings of the VLDB Endowment, Edición September 2022, 2022, ISSN 2150-8097
Editor: VLDB Endowment
DOI: 10.14778/3565838.3565842

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT (se abrirá en una nueva ventana)

Autores: Marek Pawlicki; Aleksandra Pawlicka; Rafał Kozik; Michał Choraś
Publicado en: Neurocomputing, Edición Volume 551, 2023, ISSN 0925-2312
Editor: Elsevier BV
DOI: 10.1016/j.neucom.2023.126533

Discovery privacy threats via device de-anonymization in LoRaWAN (se abrirá en una nueva ventana)

Autores: Pietro Spadaccino, Domenico Garlisi, Francesca Cuomo, Giorgio Pillon, Patrizio Pisani
Publicado en: Computer Communications, Edición Volume 189, 2022, Página(s) 1-10, ISSN 0140-3664
Editor: Elsevier BV
DOI: 10.1016/j.comcom.2022.02.017

The Application of Deep Learning Imputation and other advanced methods for handling missing values in network intrusion detection (se abrirá en una nueva ventana)

Autores: Mateusz Szczepański, Marek Pawlicki, Rafał Kozik, Michał Choraś
Publicado en: Vietnam Journal of Computer Science, 2022, ISSN 2196-8896
Editor: World Scientific
DOI: 10.1142/s2196888822500257

Model checking C++ programs (se abrirá en una nueva ventana)

Autores: Felipe R. Monteiro, Mikhail R. Gadelha, Lucas C. Cordeiro
Publicado en: Journal of Software: Testing, Verification and Reliability, Edición 10991689, 2021, ISSN 1099-1689
Editor: John Wiley & Sons Ltd.
DOI: 10.1002/stvr.1793

Design, Analysis, and Experimental Evaluation of a New Secure Rejoin Mechanism for LoRaWAN Using Elliptic-Curve Cryptography (se abrirá en una nueva ventana)

Autores: Milani M, Chatzigiannakis I.
Publicado en: J. Sens. Actuator Netw, Edición 22242708, 2021, ISSN 2224-2708
Editor: MDPI
DOI: 10.3390/jsan10020036

LoRaWAN Behaviour Analysis through Dataset Traffic Investigation (se abrirá en una nueva ventana)

Autores: Pietro Spadaccino, Francesco Guiseppe Crino, Francesca Cuomo
Publicado en: Sensors, Edición 22, 2022, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22072470

EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (se abrirá en una nueva ventana)

Autores: Fatima Aljaafari, Fedor Shmarov, Edoardo Manino, Rafael Menezes, Lucas C. Cordeiro
Publicado en: Tools and Algorithms for the Construction and Analysis of Systems, Edición April 22–27, 2023, 2023, Página(s) 541-546, ISBN 978-3-031-30819-2
Editor: Springer
DOI: 10.1007/978-3-031-30820-8_33

QNNRepair: Quantized Neural Network Repair (se abrirá en una nueva ventana)

Autores: Xidan Song; Youcheng Sun; Mustafa A. Mustafa; Lucas C. Cordeiro
Publicado en: Song , X , Sun , Y , Mustafa , M A & Cordeiro , L C 2023 , QNNRepair : Quantized Neural Network Repair . in 21st International Conference on Software Engineering and Formal Methods ., Edición 13, 2023, ISBN 978-3-031-47114-8
Editor: Springer, Cham
DOI: 10.1007/978-3-031-47115-5_18

Wit4Java: A violation-witness validator for Java Verifiers (se abrirá en una nueva ventana)

Autores: Wu, T., Schrammel, P., Cordeiro, L. C
Publicado en: Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2022. Lecture Notes in Computer Science, 2022
Editor: Springer Link
DOI: 10.1007/978-3-030-99527-0_36

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0