Deliverables
This deliverable is the CTTP Models and Programmes Specification Tool of Threat-Arrest.
THREAT-ARREST serious games v1This deliverable is the first version of the THREAT-ARREST serious games.
Real time trainee performance assessment v2This deliverable is the second version of the Real time trainee performance assessment mechanisms
The Simulation component IO module v1This deliverable is the first version of the Simulation component IO module of Threat-Arrest.
Real time trainee performance assessment v1This deliverable is the first version of the Real time trainee performance assessment mechanisms.
Emulation tool interoperability module v1This deliverable is the first version of the interfaces that will used by the emulation components to communicate.
CTTP Programme Adaptor v2This deliverable is the second version of the CTTP Programme Adaptor of ThreatArrest
Simulated components network execution module v2This deliverable is the second version of the Simulated components network execution module of ThreatArrest
THREAT-ARREST visualisation tools v1This deliverable is the first version of the THREAT-ARREST visualisation tools.
THREAT-ARREST visualisation tools v2This deliverable is the second version of the THREATARREST visualisation tools
Simulated components and network generator v1This deliverable is the first version of the Simulated components and network generator of Threat-Arrest
The Simulation component IO module v2This deliverable is the second version of the Simulation component IO module of ThreatArrest
Initial Prototype of Integrated THREAT-ARREST platformThis deliverable will be the Initial Prototype of Integrated THREATARREST platform
Final Prototype of Integrated THREAT–ARREST platformFinal Prototype of Integrated THREATARREST platform
Interlinking of emulated components module v1This deliverable is the first version of the mechanism to be used for Interlinking of emulated components.
Emulated components' generator module v2This deliverable is second version of the Emulated components generator module
Emulated components’ generator module v1This deliverable is first version of the Emulated components’ generator module.
Training and Visualisation tools IO mechanisms v2This deliverable is the second version of the Training and Visualisation tools IO mechanisms
CTTP Models and Programmes Adaptation ToolThis deliverable is the CTTP Models and Programmes Adaptation Tool of ThreatArrest
Simulated components and network generator v2This deliverable is the second version of the Simulated components and network generator of ThreatArrest
Simulated components network execution module v1This deliverable is the first version of the Simulated components network execution module of Threat-Arrest.
CTTP Programme EvaluatorTHREAT-ARREST serious games v2
This deliverable is the second version of the THREATARREST serious games
CTTP Programme Adaptor v1This deliverable is the first version of the CTTP Programme Adaptor of ThreatArrest
Real event logs statistical profiling module and synthetic event log generator v1This deliverable is the first version of Real event logs statistical profiling module and synthetic event log generator of Threat-Arrest
Interlinking of emulated components module v2This deliverable is the second version of the mechanism to be used for Interlinking of emulated components
Real event logs statistical profiling module and synthetic event log generator v2This deliverable is the second version of Real event logs statistical profiling module and synthetic event log generator of TreatAArrest
Emulation tool interoperability module interoperability module v2This deliverable is the second version of the interfaces that will used by the emulation components to communicate
Training and Visualisation tools IO mechanisms v1This deliverable is the first version of the Training and Visualisation tools IO mechanisms
Emulated components’ monitoring moduleThis deliverable is the module that will monitor the status of the Emulated components
This deliverable is the first version of the report on the Energy Sector use case
The Maritime Sector pilot report v2This deliverable is the final version of the report on the Maritime Sector use case
The Health Sector pilot report v1This deliverable is the first version of the report on the Health Sector use case
The Health Sector pilot report v2This deliverable is the final version of the report on the Health Sector use case
CTTP Models and Programmes Specification LanguageThis report will document the CTTP Models and Programmes Specification Language of Threat-Arrest.
Final Installation and usage guidelines for the THREAT–ARREST platformThis deliverable will be the final version of the documentation of Installation and usage guidelines for the THREATARREST platform
THREAT-ARREST dissemination and exploitation report v.1This deliverable reports on the dissemination and exploitation activities of Threat-Arrest for the first half of the project duration.
Final THREAT-ARREST evaluation reportThis deliverable is the overall THREATARREST evaluation report
THREAT-ARREST Evaluation Framework and Pilot Set Up GuidelinesTHREATARREST Evaluation Framework and Pilot Set Up Guidelines
THREAT-ARREST market analysis, business and marketing plan v.2This deliverable will contain the updated version of the THREATARREST market analysis business and marketing plan
THREAT-ARREST platform’s initial reference architectureThis report will document the initial version of the architecture of the THREAT-ARREST platform.
The stakeholders’ engagement & online channels report v.2This deliverable is the the final version of the report on the stakeholders engagement online channels
Reference CTTP Models and Programmes Specifications v2This report is the second version of the Reference CTTP Models and Programmes Specifications of TreatArrest
The Energy Sector pilot report v2This deliverable is the final version of the report on the Energy Sector use case
Reference CTTP Models and Programmes Specifications v1This report is the first version of the Reference CTTP Models and Programmes Specifications of Treat-Arrest.
The pilots’ requirements analysis reportThis report will document the requirements analysis for Threat-Arrest pilots.
The stakeholders’ engagement & online channels report v.1This deliverable is the the first version of the report on the stakeholders’ engagement & online channels.
Platform quality assurance and technical testing report v2The stakeholders’ engagement plan and online channels development
This deliverable will report the stakeholders’ engagement plan and the development of online channels for Threat-Arrest!
The THREAT-ARREST dissemination planInitial Installation and usage guidelines for the THREAT-ARREST platform
This deliverable will be the first version of the documentation of the Installation and usage guidelines for the THREATARREST platform
THREAT-ARREST CTTP programs certification frameworkThis report will document the CTTP programs certification framework of ThreatArrest
THREAT-ARREST dissemination and exploitation report v.2This deliverable reports on the dissemination and exploitation activities of ThreatArrest for the second half of the project duration
THREAT-ARREST market analysis, business and marketing plan v.1This deliverable will contain the first version of the THREAT-ARREST market analysis, business and marketing plan.
THREAT-ARREST contribution to standards reportThis deliverable will report the THREATARREST contribution to standards
CTTP Models and Programmes Adaptation ProceduresThis deliverable will document on the CTTP Models and Programmes Adaptation Procedures of ThreatArrest
The Maritime Sector pilot report v1This deliverable is the first version of the report on the Maritime Sector use case
The platform’s system requirements analysis report.The report will include an updated review of the state of the art and practice on security, simulation, emulation, visualization and training tools and services.
Publications
Author(s):
G. Hatzivasilis, K. Fysarakis, S. Ioannidis, I. Hatzakis, G. Vardakis, N. Papadakis, G. Spanoudakis
Published in:
Electronics, Issue vol. 10, issue 1, article 92, 2021, Page(s) 1-26, ISSN 2079-9292
Publisher:
MDPI
DOI:
10.3390/electronics10010092
Author(s):
George Hatzivasilis, Sotiris Ioannidis, Konstantinos Fysarakis, George Spanoudakis, Nikos Papadakis
Published in:
Electronics, Issue 10/16, 2021, Page(s) 2008, ISSN 2079-9292
Publisher:
MDPI
DOI:
10.3390/electronics10162008
Author(s):
Michail Smyrlis, Iason Somarakis, George Spanoudakis, George Hatzivasilis, Sotiris Ioannidis
Published in:
Applied Sciences, Issue 11/11, 2021, Page(s) 5165, ISSN 2076-3417
Publisher:
MDPI AG
DOI:
10.3390/app11115165
Author(s):
Dennis-Kenji Kipker, Sebastian Pape
Published in:
Datenschutz und Datensicherheit - DuD, Issue 45/5, 2021, Page(s) 310-314, ISSN 1614-0702
Publisher:
Springer
DOI:
10.1007/s11623-021-1440-3
Author(s):
George Hatzivasilis, Othonas Soultatos, Panos Chatziadam, Konstantinos Fysarakis, Ioannis Askoxylakis, Sotiris Ioannidis, George Alaxandris, Vasilis Katos, George Spanoudakis
Published in:
IEEE Transactions on Sustainable Computing, Issue Early Access, 2019, Page(s) 1-1, ISSN 2377-3782
Publisher:
IEEE
DOI:
10.1109/tsusc.2019.2914917
Author(s):
Samira Maghool, Nahid Maleki-Jirsaraei, Marco Cremonini
Published in:
PLOS ONE, Issue 14/12, 2019, Page(s) e0225447, ISSN 1932-6203
Publisher:
Public Library of Science
DOI:
10.1371/journal.pone.0225447
Author(s):
George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, Giorgos Demetriou
Published in:
ACM Transactions on Cyber-Physical Systems, Issue 4/3, 2020, Page(s) 1-25, ISSN 2378-962X
Publisher:
Association for Computing Machinery, New York, NY, United States
DOI:
10.1145/3364181
Author(s):
Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani
Published in:
Journal of Information Security and Applications, Issue 51, 2020, Page(s) 102462, ISSN 2214-2126
Publisher:
Elsevier
DOI:
10.1016/j.jisa.2020.102462
Author(s):
Ebrahim Al Alkeem, Song-Kyoo Kim, Chan Yeob Yeun, Mohamed Jamal Zemerly, Kin Fai Poon, Gabriele Gianini, Paul D. Yoo
Published in:
IEEE Access, Issue 7, 2019, Page(s) 123069-123075, ISSN 2169-3536
Publisher:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/ACCESS.2019.2937357
Author(s):
George Hatzivasilis,Nikos Papadakis, Ilias Hatzakis, Sotiris Ioannidis, George Vardakis
Published in:
Applied Sciences, Issue vol. 10, issue 14, article 4862, August 2020, 2020, Page(s) 1-31, ISSN 2076-3417
Publisher:
MDPI AG
DOI:
10.3390/app10144862
Author(s):
George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis, Hristo Koshutanski
Published in:
Applied Sciences, Issue 10/16, 2020, Page(s) 5702, ISSN 2076-3417
Publisher:
MDPI
DOI:
10.3390/app10165702
Author(s):
Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Published in:
it - Information Technology, Issue 62/5-6, 2020, Page(s) 227-239, ISSN 2196-7032
Publisher:
De Gruyter Oldenbourg
DOI:
10.1515/itit-2020-0009
Author(s):
Gabriele Gianini, Leopold Ghemmogne Fossi, Corrado Mio, Olivier Caelen, Lionel Brunie, Ernesto Damiani
Published in:
Future Generation Computer Systems, Issue 102, 2020, Page(s) 549-561, ISSN 0167-739X
Publisher:
Elsevier BV
DOI:
10.1016/j.future.2019.08.028
Author(s):
MICHALIS DIAMANTARIS; FRANCESCO MARCANTONI; SOTIRIS IOANNIDIS; JASON POLAKIS
Published in:
ACM Transactions on Privacy and Security (TOPS), Issue 23(4), 2020, Page(s) 1-19, ISSN 2471-2566
Publisher:
ACM
DOI:
10.1145/3403947
Author(s):
Marinos Tsantekidis, Vassilis Prevelakis
Published in:
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 125-139, ISBN 978-3-030-62432-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-62433-0_8
Author(s):
George Hatzivasilis
Published in:
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 157-177, ISBN 978-3-030-62432-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-62433-0_10
Author(s):
George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Published in:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 185-198, ISBN 978-3-030-42050-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-42051-2_13
Author(s):
Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene
Published in:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 107-122, ISBN 978-3-030-42050-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-42051-2_8
Author(s):
Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis
Published in:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 172-184, ISBN 978-3-030-42050-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-42051-2_12
Author(s):
Ludger Goeke, Alejandro Quintanar, Kristian Beckers, Sebastian Pape
Published in:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 156-171, ISBN 978-3-030-42050-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-42051-2_11
Author(s):
Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, Menelaos Ioannidis
Published in:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 199-214, ISBN 978-3-030-42050-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-42051-2_14
Author(s):
Jihane Najar, Vassilis Prevelakis
Published in:
Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 15-26, ISBN 978-3-030-12084-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-12085-6_2
Author(s):
George Hatzivasilis, Martin Kunc
Published in:
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 111-124, ISBN 978-3-030-62432-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-62433-0_7
Author(s):
Vera Hazilov, Sebastian Pape
Published in:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers, Issue 12580, 2020, Page(s) 294-311, ISBN 978-3-030-66503-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-66504-3_18
Author(s):
Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh
Published in:
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 79-91, ISBN 978-3-030-62432-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-62433-0_5
Author(s):
Joël T. Hounsou, Pamela Bélise Ciza Niyomukiza, Thierry Nsabimana, Ghislain Vlavonou, Fulvio Frati, Ernesto Damiani
Published in:
Intelligent Human Systems Integration 2021 - Proceedings of the 4th International Conference on Intelligent Human Systems Integration (IHSI 2021): Integrating People and Intelligent Systems, February 22-24, 2021, Palermo, Italy, Issue 1322, 2021, Page(s) 561-572, ISBN 978-3-030-68016-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-68017-6_83
Author(s):
Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, George Hatzivasilis
Published in:
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 22-37, ISBN 978-3-030-62432-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-62433-0_2
Author(s):
Sebastian Pape, Ludger Goeke, Alejandro Quintanar, Kristian Beckers
Published in:
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 61-76, ISBN 978-3-030-62432-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-62433-0_4
Author(s):
S. Pape, A. Klauer, M. Rebler
Published in:
17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021, Page(s) 1
Publisher:
USENIX
Author(s):
George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, Christos Tsatsoulis
Published in:
2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Issue 29-31 May 2019, 2019, Page(s) 457-464, ISBN 978-1-7281-0570-3
Publisher:
IEEE
DOI:
10.1109/dcoss.2019.00091
Author(s):
Francesco Marcantoni, Michalis Diamantaris, Sotiris Ioannidis, Jason Polakis
Published in:
The World Wide Web Conference on - WWW '19, Issue May 13 - 17, 2019, 2019, Page(s) 3063-3071, ISBN 9781-450366748
Publisher:
ACM Press
DOI:
10.1145/3308558.3313539
Author(s):
Mohammad Hamad, Mustafa R. Agha, Vassilis Prevelakis
Published in:
2018 IEEE Vehicular Networking Conference (VNC), Issue 5-7 Dec. 2018, 2018, Page(s) 1-8, ISBN 978-1-5386-9428-2
Publisher:
IEEE
DOI:
10.1109/vnc.2018.8628360
Author(s):
George Hatzivasilis, Nikos Christodoulakis, Christos Tzagkarakis, Sotiris Ioannidis, Giorgos Demetriou, Konstantinos Fysarakis, Marios Panayiotou
Published in:
2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Issue 29-31 May 2019, 2019, Page(s) 436-442, ISBN 978-1-7281-0570-3
Publisher:
IEEE
DOI:
10.1109/dcoss.2019.00088
Author(s):
George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Published in:
2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Issue 11-13 Sept. 2019, 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Publisher:
IEEE
DOI:
10.1109/camad.2019.8858165
Author(s):
George Hatzivasilis, Lukasz Ciechomski, Othonas Soultatos, Darko Anicic, Arne Broring, Konstantinos Fysarakis, George Spanoudakis, Eftychia Lakka, Sotiris Ioannidis, Mirko Falchetto
Published in:
2019 IEEE Global Communications Conference (GLOBECOM), Issue 9-13 Dec. 2019, 2019, Page(s) 1-6, ISBN 978-1-7281-0962-6
Publisher:
IEEE
DOI:
10.1109/globecom38437.2019.9013147
Author(s):
Marinos Tsantekidis, Vassilis Prevelakis
Published in:
2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Issue October 2019, 2019, Page(s) 387-392, ISBN 978-1-7281-2949-5
Publisher:
IEEE
DOI:
10.1109/iotsms48152.2019.8939203
Author(s):
V. Prevelakis, M., J. Najar, I. Spais
Published in:
International workshop on Information & Operational Technology (IT & OT) security systems (IOSec), ESORICS, Issue September 2019, 2019
Publisher:
Springer
Author(s):
Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
Published in:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, Issue March 25-27, 2019, 2019, Page(s) 37-48, ISBN 9781-450360999
Publisher:
ACM
DOI:
10.1145/3292006.3300027
Author(s):
G. Hatzivasilis, et al.
Published in:
IEEE CSR Workshop on Cyber Ranges and Security Training (CRST), 2021, Page(s) 1-6
Publisher:
IEEE
Author(s):
Michalis Smyrlis, George Spanoudakis, Konstantinos Fysarakis
Published in:
IEEE Internet of Things (IoT) Magazine, Issue March, 2021
Publisher:
IEEE
Author(s):
George Hatzivasilis, Kostas Fysarakis, Sotiris Ioannidis
Published in:
ERCIM News – Special Theme: The Climate Action, Issue Issue 121, Article no. 36, April 2020, 2020, Page(s) 36-37
Publisher:
ERCIM News
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available