Skip to main content

Collaborative and Confidential Information Sharing and Analysis for Cyber Protection

Deliverables

Final exploitation and dissemination report and plan for the future.

This final deliverable will both report on all the activities performed by the WP and its achievements in the last period and will provide an updated plans for exploitation and dissemination. In particular the Exploitation Board will depict a strategy for sustainability during the last period of the project.

Requirements for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.1.

Requirements for C3ISP Architecture.

It provides the complete requirements list coming from the prosumers as well as from the specific platform aspects (outcomes of task 7.1).

Design and Architecture for the SME Pilot.

This deliverable reports on the outcomes of task 5.2.

Requirements for the CERT Pilot.

This deliverable reports on the outcomes of task 3.1.

Final Reference Architecture.

This deliverable describes the refined and final developed version of the C3ISP platform (final outcome of task 7.2).

Second exploitation and dissemination report.

This deliverable will report the progress on C3ISP’s on all the aspects of this WP.

Design and Architecture for the ISP Pilot.

This deliverable reports on the outcomes of task 2.2.

Components requirements.

This deliverable reports on the requirements for all the components developed in the tasks 8.1-8.6.

First exploitation and dissemination report.

This deliverable will report the initial progress on C3ISP’s on all the aspects of this WP.

First version of C3ISP Architecture.

Define the first version of the overall C3ISP platform architecture as part of task 7.2.

Requirements for the SME Pilot.

This deliverable reports on the outcomes of task 5.1.

Joint operations of the Pilots - 1

This deliverable reports on the monitoring of the initial joint pilots operations described in task 6.2.

First exploitation and dissemination plan.

This deliverable will contain a preliminary analysis of business models; it will also analyse the market and the value proposition of the project results; finally it will describe the initial foreseen options and scenarios for sustainability plans for the main project results. Individual exploitation plans, focusing on innovation aspects, will be provided by industrial partners while the research partners will contribute to report how to support third parties and industrial organization to adopt and exploit the C3ISP results. It will also contains a plan for standardization and communication.

Design and Architecture for the CERT Pilot.

This deliverable reports on the outcomes of task 3.2.

Design and Architecture for the Enterprise Pilot.

This deliverable reports on the outcomes of task 4.2.

Requirements for the ISP Pilot.

This deliverable reports on the outcomes of task 2.1

Requirements for the Pilots.

This deliverable reports on the outcomes of task 6.1.

First version of the C3ISP platform and test bed.

This deliverable describes the first developed version of the platform, as part of task 7.3. It will provide a first version as test bed for running the prosumers analytics.

First implementation, test and validations of the SME Pilot.

This deliverable reports on the first implementation (task 5.2), test and validation activities defined in task 5.3.

First implementation, test and validations of the CERT Pilot.

This deliverable reports on the first implementation (tasks 3.2 and 3.3), test and validation activities defined in task 3.3.

Components first maturation.

This deliverable reports on the first maturation cycle of all the components (developed in the tasks 8.1-8.6) ready to be integrated in the C3ISP platform.

First implementation, test and validations of the Enterprise Pilot.

This deliverable reports on the first implementation (task 4.2), test and validation activities defined in task 4.3.

First implementation, test and validations of the ISP Pilot.

This deliverable reports on the first implementation (tasks 2.2 and 2.3), test and validation activities defined in task 2.3.

Publications

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV

Author(s): Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Published in: Security and Trust Management, Issue pp.118-133, 2018, Page(s) 118-133
DOI: 10.1007/978-3-319-68063-7_8

Introducing Usage Control in MQTT for IoT

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: 2017

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification

Author(s): Mina Sheikhalishahi, Fabio Martinelli
Published in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Page(s) 244-249
DOI: 10.1109/WETICE.2017.15

Implementing Usage Control in Internet of Things: A Smart Home Use Case

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
Published in: 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, Page(s) 1056-1063
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.352

Identifying Mobile Repackaged Applications through Formal Methods

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 673-682
DOI: 10.5220/0006287906730682

Game Bot Detection in Online Role Player Game through Behavioural Features

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 12th International Conference on Software Technologies, 2017, Page(s) 50-60
DOI: 10.5220/0006417000500060

Privacy-Utility Feature Selection as a tool in Private Data Classification

Author(s): Mina Sheikhalishahi, Fabio Martinelli
Published in: Advances in Intelligent Systems and Computing book series, Issue AISC, volume 620, 2017

Privacy preserving clustering over horizontal and vertical partitioned data

Author(s): Mina Sheikhalishahi, Fabio Martinelli
Published in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Page(s) 1237-1244
DOI: 10.1109/ISCC.2017.8024694

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Issue 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 487-492
DOI: 10.5220/0006217304870492

Car hacking identification through fuzzy logic algorithms

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Page(s) 1-7
DOI: 10.1109/FUZZ-IEEE.2017.8015464

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Page(s) 263-268
DOI: 10.1109/WETICE.2017.23

A time series classification approach to game bot detection

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Page(s) 1-11
DOI: 10.1145/3102254.3102263

A fuzzy-based process mining approach for dynamic malware detection

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Page(s) 1-8
DOI: 10.1109/FUZZ-IEEE.2017.8015490

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware

Author(s): Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 899-901
DOI: 10.1145/3052973.3055156

Analysis of Data Sharing Agreements

Author(s): Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 167-178
DOI: 10.5220/0006207501670178

Concurrent History-based Usage Control Policies

Author(s): Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Published in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Page(s) 657-666
DOI: 10.5220/0006232506570666

A Collaborative Tool for Modelling Multi-stage Attacks

Author(s): Ian Herwono, Fadi Ali El-Moussa
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 312-317
DOI: 10.5220/0006137103120317

Automated Detection of the Early Stages of Cyber Kill Chain

Author(s): Ian Herwono, Fadi Ali El-Moussa
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 182-189
DOI: 10.5220/0006543301820189

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

Author(s): Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton
Published in: 2018 IEEE Conference on Communications and Network Security (CNS), 2018, Page(s) 1-7
DOI: 10.1109/cns.2018.8433212

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud

Author(s): Wenjun Fan, Joanna Ziembicka, Rogerio de Lemos, David Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 74-80
DOI: 10.1109/cscloud/edgecom.2019.00-15