Skip to main content

THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training

Deliverables

CTTP Models and Programmes Specification Tool

This deliverable is the CTTP Models and Programmes Specification Tool of Threat-Arrest.

THREAT-ARREST serious games v1

This deliverable is the first version of the THREAT-ARREST serious games.

The Simulation component IO module v1

This deliverable is the first version of the Simulation component IO module of Threat-Arrest.

Real time trainee performance assessment v1

This deliverable is the first version of the Real time trainee performance assessment mechanisms.

Emulation tool interoperability module v1

This deliverable is the first version of the interfaces that will used by the emulation components to communicate.

THREAT-ARREST visualisation tools v1

This deliverable is the first version of the THREAT-ARREST visualisation tools.

Simulated components and network generator v1

This deliverable is the first version of the Simulated components and network generator of Threat-Arrest

Interlinking of emulated components module v1

This deliverable is the first version of the mechanism to be used for Interlinking of emulated components.

Emulated components’ generator module v1

This deliverable is first version of the Emulated components’ generator module.

Simulated components network execution module v1

This deliverable is the first version of the Simulated components network execution module of Threat-Arrest.

Real event logs statistical profiling module and synthetic event log generator v1

This deliverable is the first version of Real event logs statistical profiling module and synthetic event log generator of Threat-Arrest

Training and Visualisation tools IO mechanisms v1

This deliverable is the first version of the Training and Visualisation tools IO mechanisms

Emulated components’ monitoring module

This deliverable is the module that will monitor the status of the Emulated components

CTTP Models and Programmes Specification Language

This report will document the CTTP Models and Programmes Specification Language of Threat-Arrest.

THREAT-ARREST dissemination and exploitation report v.1

This deliverable reports on the dissemination and exploitation activities of Threat-Arrest for the first half of the project duration.

THREAT-ARREST platform’s initial reference architecture

This report will document the initial version of the architecture of the THREAT-ARREST platform.

Reference CTTP Models and Programmes Specifications v1

This report is the first version of the Reference CTTP Models and Programmes Specifications of Treat-Arrest.

The pilots’ requirements analysis report

This report will document the requirements analysis for Threat-Arrest pilots.

The stakeholders’ engagement & online channels report v.1

This deliverable is the the first version of the report on the stakeholders’ engagement & online channels.

The stakeholders’ engagement plan and online channels development

This deliverable will report the stakeholders’ engagement plan and the development of online channels for Threat-Arrest!

The THREAT-ARREST dissemination plan

The THREAT-ARREST dissemination plan

THREAT-ARREST market analysis, business and marketing plan v.1

This deliverable will contain the first version of the THREAT-ARREST market analysis, business and marketing plan.

The platform’s system requirements analysis report.

The report will include an updated review of the state of the art and practice on security, simulation, emulation, visualization and training tools and services.

Searching for OpenAIRE data...

Publications

Software System Exploration Using Library Call Analysis

Author(s): Marinos Tsantekidis, Vassilis Prevelakis
Published in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 125-139
DOI: 10.1007/978-3-030-62433-0_8

Password Management: How Secure Is Your Login Process?

Author(s): George Hatzivasilis
Published in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 157-177
DOI: 10.1007/978-3-030-62433-0_10

Towards the Insurance of Healthcare Systems

Author(s): George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 185-198
DOI: 10.1007/978-3-030-42051-2_13

A Model Driven Approach for Cyber Security Scenarios Deployment

Author(s): Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 107-122
DOI: 10.1007/978-3-030-42051-2_8

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective

Author(s): Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 172-184
DOI: 10.1007/978-3-030-42051-2_12

PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks

Author(s): Ludger Goeke, Alejandro Quintanar, Kristian Beckers, Sebastian Pape
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 156-171
DOI: 10.1007/978-3-030-42051-2_11

The THREAT-ARREST Cyber-Security Training Platform

Author(s): Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, Menelaos Ioannidis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 199-214
DOI: 10.1007/978-3-030-42051-2_14

A Secure and Efficient File System Access Control Mechanism (FlexFS)

Author(s): Jihane Najar, Vassilis Prevelakis
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 15-26
DOI: 10.1007/978-3-030-12085-6_2

Chasing Botnets: A Real Security Incident Investigation

Author(s): George Hatzivasilis, Martin Kunc
Published in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 111-124
DOI: 10.1007/978-3-030-62433-0_7

Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges

Author(s): Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh
Published in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 79-91
DOI: 10.1007/978-3-030-62433-0_5

Conceptualization of a CyberSecurity Awareness Quiz

Author(s): Sebastian Pape, Ludger Goeke, Alejandro Quintanar, Kristian Beckers
Published in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Issue 12512, 2020, Page(s) 61-76
DOI: 10.1007/978-3-030-62433-0_4

Review of Security and Privacy for the Internet of Medical Things (IoMT)

Author(s): George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, Christos Tsatsoulis
Published in: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Issue 29-31 May 2019, 2019, Page(s) 457-464
DOI: 10.1109/dcoss.2019.00091

A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks

Author(s): Francesco Marcantoni, Michalis Diamantaris, Sotiris Ioannidis, Jason Polakis
Published in: The World Wide Web Conference on - WWW '19, Issue May 13 - 17, 2019, 2019, Page(s) 3063-3071
DOI: 10.1145/3308558.3313539

ProSEV: Proxy-Based Secure and Efficient Vehicular Communication

Author(s): Mohammad Hamad, Mustafa R. Agha, Vassilis Prevelakis
Published in: 2018 IEEE Vehicular Networking Conference (VNC), Issue 5-7 Dec. 2018, 2018, Page(s) 1-8
DOI: 10.1109/vnc.2018.8628360

The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT

Author(s): George Hatzivasilis, Nikos Christodoulakis, Christos Tzagkarakis, Sotiris Ioannidis, Giorgos Demetriou, Konstantinos Fysarakis, Marios Panayiotou
Published in: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Issue 29-31 May 2019, 2019, Page(s) 436-442
DOI: 10.1109/dcoss.2019.00088

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations

Author(s): George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Issue 11-13 Sept. 2019, 2019, Page(s) 1-6
DOI: 10.1109/camad.2019.8858165

Secure Semantic Interoperability for IoT Applications with Linked Data

Author(s): George Hatzivasilis, Lukasz Ciechomski, Othonas Soultatos, Darko Anicic, Arne Broring, Konstantinos Fysarakis, George Spanoudakis, Eftychia Lakka, Sotiris Ioannidis, Mirko Falchetto
Published in: 2019 IEEE Global Communications Conference (GLOBECOM), Issue 9-13 Dec. 2019, 2019, Page(s) 1-6
DOI: 10.1109/globecom38437.2019.9013147

Efficient Monitoring of Library Call Invocation

Author(s): Marinos Tsantekidis, Vassilis Prevelakis
Published in: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Issue October 2019, 2019, Page(s) 387-392
DOI: 10.1109/iotsms48152.2019.8939203

Secure Data Exchange for Computationally Constrained Devices

Author(s): V. Prevelakis, M., J. Najar, I. Spais
Published in: International workshop on Information & Operational Technology (IT & OT) security systems (IOSec), ESORICS, Issue September 2019, 2019

REAPER - Real-time App Analysis for Augmenting the Android Permission System

Author(s): Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
Published in: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, Issue March 25-27, 2019, 2019, Page(s) 37-48
DOI: 10.1145/3292006.3300027

WARDOG: Awareness detection watchbog for Botnet infection on the host device

Author(s): George Hatzivasilis, Othonas Soultatos, Panos Chatziadam, Konstantinos Fysarakis, Ioannis Askoxylakis, Sotiris Ioannidis, George Alaxandris, Vasilis Katos, George Spanoudakis
Published in: IEEE Transactions on Sustainable Computing, Issue Early Access, 2019, Page(s) 1-1, ISSN 2377-3782
DOI: 10.1109/tsusc.2019.2914917

The coevolution of contagion and behavior with increasing and decreasing awareness

Author(s): Samira Maghool, Nahid Maleki-Jirsaraei, Marco Cremonini
Published in: PLOS ONE, Issue 14/12, 2019, Page(s) e0225447, ISSN 1932-6203
DOI: 10.1371/journal.pone.0225447

MobileTrust

Author(s): George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, Giorgos Demetriou
Published in: ACM Transactions on Cyber-Physical Systems, Issue 4/3, 2020, Page(s) 1-25, ISSN 2378-962X
DOI: 10.1145/3364181

A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem

Author(s): Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani
Published in: Journal of Information Security and Applications, Issue 51, 2020, Page(s) 102462, ISSN 2214-2126
DOI: 10.1016/j.jisa.2020.102462

An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning

Author(s): Ebrahim Al Alkeem, Song-Kyoo Kim, Chan Yeob Yeun, Mohamed Jamal Zemerly, Kin Fai Poon, Gabriele Gianini, Paul D. Yoo
Published in: IEEE Access, Issue 7, 2019, Page(s) 123069-123075, ISSN 2169-3536
DOI: 10.1109/ACCESS.2019.2937357

AI-driven composition and security validation of an IoT ecosystem

Author(s): George Hatzivasilis,Nikos Papadakis, Ilias Hatzakis, Sotiris Ioannidis, George Vardakis
Published in: Applied Sciences, Issue vol. 10, issue 14, article 4862, August 2020, 2020, Page(s) 1-31, ISSN 2076-3417
DOI: 10.3390/app10144862

Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees

Author(s): George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis, Hristo Koshutanski
Published in: Applied Sciences, Issue 10/16, 2020, Page(s) 5702, ISSN 2076-3417
DOI: 10.3390/app10165702

Temporal-based intrusion detection for IoV

Author(s): Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Published in: it - Information Technology, Issue 62/5-6, 2020, Page(s) 227-239, ISSN 2196-7032
DOI: 10.1515/itit-2020-0009

A Large-scale Study on the Risks of Mobile Sensor-based Attacks

Author(s): MICHALIS DIAMANTARIS; FRANCESCO MARCANTONI; SOTIRIS IOANNIDIS; JASON POLAKIS
Published in: ACM Transactions on Privacy and Security (TOPS), Issue 23(4), 2020, Page(s) 1-19, ISSN 2471-2566
DOI: 10.1145/3403947

Cyber-Ranges as a Mean of Security Culture Establishment

Author(s): George Hatzivasilis, Kostas Fysarakis, Sotiris Ioannidis
Published in: ERCIM News – Special Theme: The Climate Action, Issue Issue 121, Article no. 36, April 2020, 2020, Page(s) 36-37