CORDIS provides links to public deliverables and publications of HORIZON projects.
Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .
Deliverables
This deliverable must be ready for the pilot, but may be enhanced during and after the pilots. Documentation will primarily be in electronic searchable form, and training material may comprise of different media types depending on the needs of the end-users. (written, video, computer animation and simulation exercises.)
Guidelines and procedures for system and dependency analysis in the context of local public administrations [This deliverable contains the guidelines and procedures for system and dependency analysis in local public administrations that are defined in T2.4. This deliverable will be the basis for dissemination activities to relevant regulatory and standardisation bodies.
System and dependency analysis (third iteration) – Pilot scenario specification and self-healing strategiesThis deliverable contains the final results of the system and dependency analysis based on the third iteration of general requirements analysis of T2.1 and pilot specific analysis of T2.2. This deliverable forms the final environment for tool deployment and also contains the results for defining self-healing strategies within the pilot scenarios.
Design CS-AWARE common cloud-based software architecture and API specificationThis includes visualisations of the overall final CS-AWARE architecture and list of APIs available with the necessary description and examples of usage.
Commercial actions report 3This deliverable will document the latest developments regarding commercial actions taken.
Pilot evaluation reportThis deliverable will contain a detailed report of the results obtained from the pilot case studies carried out within this project, including an evaluation of the practical relevance of and end user experiences with the cybersecurity mechanisms provided by the CS-AWARE solution (cybersecurity situational awareness, cybersecurity information sharing and self-healing).
System and dependency analysis (first iteration) – Cybersecurity requirements for local public administrationsThis deliverable contains the first iteration of analysis results, with the purpose of defining the cybersecurity requirements for local public administrations. This deliverable is based on the first iterations of general requirements analysis of T2.1 and pilot specific analysis of T2.2. This deliverable is a direct input for T2.3.
CS-AWARE solution validation and testing reportDeliverable is based on T 4.4 and contains the validation and testing results of the CS-AWARE system before its final deployment.
Commercial actions report 2This deliverable will document the latest developments regarding commercial actions taken.
Exploitation, dissemination and commercialisation report 3This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.
Pilot deployment reportThis deliverable will contain a detailed report of the deployment of the CS-AWARE solution within the environments provided by the local public administrations that are part of this project.
Exploitation, dissemination and commercialisation report 2This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.
Commercial actions report 1This deliverable will document the latest developments regarding commercial actions taken.
Exploitation, dissemination and commercialisation reportThis report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.
System and dependency analysis (second iteration) – Pilot scenario definitionThis deliverable refines the results of D2.1 based on the second iteration of analysis of T2.1 and T2.2. The analysis results is the basis for the pilot scenario definitions and provide input to the pilot deployment preparations.
CS-AWARE frameworkThis deliverable specifies the CS-AWARE framework defined in T2.3. Based on the initial analysis results presented in D2.1.1, this deliverable specifies the interrelation between the CS-AWARE building blocks as well as the relevant internal and external information sources to collect and share cybersecurity data. The CS-AWARE framework will be a requirement for the technical software architecture tasked in WP3.
User story reportThis deliverable will contain a composition of user stories relating to the cybersecurity experiences of the CS-AWARE project in the context of local public administrations. This could be in the form of a report or a book, edited by the WP-leaders, entitled: Narratives on cybersecurity: implementation and lessons of the CS-AWARE project.
This deliverable includes the implemented and tested adaptation of the GraphingWiki tool to meet the needs of the CS-AWARE solution.
This deliverable essentially consists of the project’s website and any additional related material, such as leaflets, posters, etc. The website should be up by M3 and will be updated throughout the project duration.
Publications
Author(s):
Thomas Schaberreiter
Forschungsgruppe Multimedia Information Systems, Fakultät für Informatik, Universität Wien
Juha Röning
University of Oulu
Gerald Quirchmayr
Forschungsgruppe Multimedia Information Systems, Fakultät für Informatik, Universität Wien
Veronika Kupfersberger
Forschungsgruppe Multimedia Information Systems, Fakultät für Informatik, Universität Wien
Chris Wills
CARIS Resear
Published in:
2019, Page(s) 149-180
Publisher:
River Publishers Series in Security and Digital Forensics
DOI:
10.13052/rp-9788770220873
Author(s):
Quirchmayr, Gerald
Kupfersberger, Veronika
Langner, Gregor
Schaberreiter, Thomas
Published in:
12th Conference on Autonomous Systems, Issue 23-30 Oct 2019, 2019, Page(s) 137-143, ISBN 978-3-18-386410-2
Publisher:
online
Author(s):
Vivian S. Silva, André Freitas, Siegfried Handschuh
Published in:
Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19). Honolulu, USA. 2019, Issue Annual, 2019
Publisher:
AAAI Press
Author(s):
Veronika Kupfersberger, Thomas Schaberreiter, Gerald Quirchmayr
Published in:
Proceedings of the 10th International Conference on Advances in Information Technology - IAIT 2018, 2018, Page(s) 1-8, ISBN 9781-450365680
Publisher:
ACM Press
DOI:
10.1145/3291280.3291797
Author(s):
Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr and Juha Röning
Published in:
SECURWARE 2017 : The Eleventh International Conference on Emerging Security Information, Systems and Technologies, Issue Annual, 2017, Page(s) 99-105, ISBN 978-1-61208-582-1
Publisher:
IARIA XPS Press
Author(s):
Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr
Published in:
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-6, ISBN 9781450371643
Publisher:
ACM Press
DOI:
10.1145/3339252.3339275
Author(s):
Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr
Published in:
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-10, ISBN 9781450371643
Publisher:
ACM Press
DOI:
10.1145/3339252.3342112
Author(s):
Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis
Published in:
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020, Page(s) 645-651, ISBN 978-989-758-446-6
Publisher:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0009893306450651
Author(s):
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos
Published in:
Computers, Issue 9/1, 2020, Page(s) 18, ISSN 2073-431X
Publisher:
Computers
DOI:
10.3390/computers9010018
Author(s):
Veronika Kupfersberger, Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr and Juha Röning
Published in:
International Journal On Advances in Security, Issue vol 11, no 3&4, year 2018, 2018, Page(s) 191 - 200, ISSN 1942-2636
Publisher:
IARIA Xpert Publishing Services
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available