Skip to main content

Protecting Small and Medium-sized Enterprises digital technology through an innovative cyber-SECurity framework

Deliverables

SMESEC annual report on exploitation, dissemination and standardization (Year 1)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 1st year.

Preliminary Integration report on e-Voting SME pilot

This document will describe preliminary efforts carried out to integrate the SMESEC security framework in Pilot I.

SMESEC annual report on exploitation, dissemination and standardization (Year 2)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 2nd year.

SMESEC System design

This deliverable will describe the innovation road-map to be used in the structuring of the unified SMESEC security framework taking into account WP2 specs and requirements. The deliverable is needed for the architectural design of T3.2.

System readiness for validation activities

This report will present the specifications of the integrated products and services (the complete security framework) for the four applications operations that will be developed and deployed for the trial.

Preliminary Integration report on Smart City pilot

This document will describe preliminary efforts carried out to integrate the SMESEC security framework into Pilot II.

SMESEC annual report on exploitation, dissemination and standardization (Year 3)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 3rd year.

Preliminary Integration report on Smart Grids SME pilot

This document will describe preliminary the efforts carried out to integrate the SMESEC security framework into Pilot IV.

SME security characteristics description, security and market analysis report

This deliverable includes a survey analysis of security issues commonly found in SME work environment, mainly focusing on the pilot SME framework as well as a thorough analysis of market solutions that can be used for SME security. This deliverable consolidates the work done in Tasks 2.1 and 2.2

Dissemination plan and market analysis

In this report, the SMESEC dissemination and standardization strategy plan, the web-site structure (including the description for each security product and service) as well as a complete study related to possible competitors and market maturity will be described.

SMESEC security awareness plan report

This deliverable will describe the plan to be followed regarding the security training and enhancement of security awareness of the SME end users. The scope and overall roadmap to the SMESEC open call will also be specified in this deliverable

SMESEC products integration on the Unified Architecture

This deliverable will describe the various introduced innovations of the SMESEC solutions and the employed unification methodology towards a complete security framework (automated security assessment model and SME security services).

Preliminary Integration report on Industrial Services SME pilot

This document will describe preliminary the efforts carried out to integrate the SMESEC security framework into Pilot III.

Preliminary SMESEC security awareness and training report

This deliverable will report all preliminary actions taken in T3.3 in order to raise security awareness in the SME end-users following the roadmap conceived in T2.4 and D2.3.

Final Integration report on e-Voting SME pilot

This document will update D4.1 describing the efforts carried out to integrate the SMESEC security framework into Pilot I.

SMESEC security products unification report

This deliverable will provide a description of the various security products that each partner contributes on the SMESEC and present a report on integration principles of those products into a unified security framework, taking into account SMESEC various pilots. The basic principles of the innovations to be introduced in the SMESEC products will be sketched in this deliverable.

SMESEC Unified Architecture – First Internal Release

This deliverable will report the preliminary draft of the system level functionalities for the proposed SMESEC framework architecture

Final Integration report on Smart City pilot

This document will update D4.3 describing the efforts carried out to integrate the SMESEC security framework into Pilot II

Final Integration report Smart Grids SME pilot

This document will update D4.5 describing the efforts carried out to integrate the SMESEC security framework into Pilot IV

SMESEC Open call design, implementation and results report

This deliverable reports the activities that were performed during the SMESEC open call setup, implementation stages, including the open call organization actions, review process, SMEs selection and all execution actions. Also, this deliverable provides a report on the collected results and an analysis extracting relevant SMESEC evaluation conclusions.

Public Report of SMESEC Framework and Unified Architecture

Public Report of SMESEC Framework and Unified Architecture will describe the overall SMESEC framework architecture (including the automated security assessment model toolset and SMESEC security services) as a public report.

Business model definition

The consortium will define an appropriate business model where several details, due to real-life experimentations results will be included. Such model will help to optimize the income streams for all the parties involved in this Innovation Action.

Overall Pilot alignment and integration process report

This deliverable will describe the activities of T4.5 aiming to align all SMESEC security frameworks per pilot aspects and specificities into the unified solution.

Final Integration report Industrial Services SME pilot

This document will update D4.5 describing the efforts carried out to integrate the SMESEC security framework into Pilot III

SMESEC Security Framework Assessment report

This report will provide the complete assessment of the SMESEC Final Security Framework.

SMESEC Framework Public Report Final Version

SMESEC Framework Public Report Final Version will report the functionalities of the final SMESEC security framework as a public report.

Final SMESEC security awareness and training report

This deliverable will report the final actions taken in T3.3 in order to raise security awareness and provide training in the SME end-users following the roadmap conceived in T2.4 and D2.3 and after the collection of validation phase results. In this deliverable the full Training and Awareness phase results will be presented as well as relevant action to be taken after the project lifecycle.

Trial scenario definitions and evaluation methodology specification

This report will describe in detail the scenarios for the experiments and trials, as well as a methodology for the evaluation and validation of the results

Prototype Demonstration: Field trial results

This report will describe in detail the execution of the different trials in the selected pilots and uses cases and their respective sub-systems.

Searching for OpenAIRE data...

Publications

Elicitation of SME Requirements for Cybersecurity Solutions by Studying Adherence to Recommendations

Author(s): Alireza Shojaifar, Samuel Fricker, Martin Gwerder
Published in: REFSQ 2018, Utrecht, Netherlands, 2018

Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data

Author(s): Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis
Published in: Proceedings 2019 Network and Distributed System Security Symposium, 2019
DOI: 10.14722/ndss.2019.23151

SMEs Confidentiality Issues and Adoption of Good Cybersecurity Practices

Author(s): Alireza Shojaifar
Published in: IFIP Summer School on Privacy and Identity Management, 2019

Automating the Communication of Cybersecurity Knowledge: Multi-Case Study

Author(s): Alireza Shojaifar, Samuel A. Fricker, Martin Gwerder
Published in: 13th World Conference on Information Security Education (WISE2020), 2020

Semantic Smart Contracts for Blockchain-based Services in the Internet of Things

Author(s): Hamza Baqa, Nguyen B. Truong, Noel Crespi, Gyu Myoung Lee, Franck le Gall
Published in: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), 2019, Page(s) 1-5
DOI: 10.1109/NCA.2019.8935016

REAPER - Real-time App Analysis for Augmenting the Android Permission System

Author(s): Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
Published in: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019, Page(s) 37-48
DOI: 10.1145/3292006.3300027

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

Author(s): Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis
Published in: NDSS 2020, 2020

Deep Ahead-of-Threat Virtual Patching

Author(s): Fady Copty, Andre Kassis, Sharon Keidar-Barner, Dov Murik
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 99-109
DOI: 10.1007/978-3-030-12085-6_9

Uncloaking the Dragon: A Large-scale Analysis of Content Modification by Open HTTP Proxies

Author(s): Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis
Published in: NDSS 2018, San Diego, CA, USA, 2018

Assessing and Improving Cybersecurity Maturity for SMEs: Standardization Aspects

Author(s): Bilge Yigit Ozkan, Marco Spruit
Published in: 1st SMESEC Workshop, 2018

A Framework for Threats Analysis Using Software-Defined Networking

Author(s): Francisc Moldovan, Ciprian Oprisa
Published in: 2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing (ICCP), 2018, Page(s) 451-457
DOI: 10.1109/iccp.2018.8516636

A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks

Author(s): Francesco Marcantoni, Michalis Diamantaris, Sotiris Ioannidis, Jason Polakis
Published in: The World Wide Web Conference on - WWW '19, 2019, Page(s) 3063-3071
DOI: 10.1145/3308558.3313539

A genetic algorithm for obtaining memory constrained near-perfect hashing

Author(s): Dan Domnita, Ciprian Oprisa
Published in: 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2018, Page(s) 1-6
DOI: 10.1109/aqtr.2018.8402794

Cybersecurity Standardisation for SMEs: The Stakeholders' Perspectives and a Research Agenda

Author(s): Bilge Yigit Ozkan, Marco Spruit
Published in: International Journal of Standardization Research, Issue 17(2), 2019, Page(s) 1-25, ISSN 2470-8550
DOI: 10.4018/ijsr.20190701.oa1

Modelling adaptive information security for SMEs in a cluster

Author(s): Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck, Verónica Burriel Coll
Published in: Journal of Intellectual Capital, Issue 21(2), 2019, Page(s) 235-256, ISSN 1469-1930
DOI: 10.1108/jic-05-2019-0128

End Node Security and Trust vulnerabilities in the Smart City Infrastructure

Author(s): Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Published in: MATEC Web of Conferences, Issue 188, 2018, Page(s) 05005, ISSN 2261-236X
DOI: 10.1051/matecconf/201818805005

A Comprehensive Technical Survey of Contemporary Cybersecurity Products and Solutions

Author(s): Christos Tselios, George Tsolis, Manos Athanatos
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 3-18
DOI: 10.1007/978-3-030-42051-2_1

A Questionnaire Model for Cybersecurity Maturity Assessment of Critical Infrastructures

Author(s): Bilge Yigit Ozkan, Marco Spruit
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 49-60
DOI: 10.1007/978-3-030-12085-6_5

SMESEC: A Cybersecurity Framework to Protect, Enhance and Educate SMEs

Author(s): Jose Francisco Ruiz, Fady Copty, Christos Tselios
Published in: ERCIM NEWS, Issue July 2018, 2018

Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device

Author(s): Fady Copty, Francisco Hernandez, Dov Murik, Olmo Rayón
Published in: arXiv, Issue Oct 11, 2018, 2018