Skip to main content

Cyber security cOmpeteNce fOr Research anD Innovation

Deliverables

1st year report on exploitation, dissemination, certification and standardization

First year report on exploitation, dissemination, certication and standardization

1st year report on designing and developing ESRTE

1st year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

1st year report on cybersecurity threats

First year report on cybersecurity threats

1st year annual report on community building

First year annual report on community building

1st year report on liaison with stakeholders

First year report on liaison with stakeholders

Searching for OpenAIRE data...

Publications

Assessing the state and improving the art of parallel testing for C

Author(s): Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
Published in: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, 2019, Page(s) 123-133
DOI: 10.1145/3293882.3330573

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Author(s): Patrick Metzler, Neeraj Suri and Georg Weissenbacher
Published in: Proc. of SPIN, 2019

Analysing and Improving Customer-Side Cloud Security Certifiability

Author(s): Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri
Published in: Proc. of ISSRE/WoSOCER Workshop, 2019, 2019

Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

Author(s): Habib Saissi, Marco Serafini and Neeraj Suri
Published in: Proc. of SRDS, 2019

Inferring Performance Bug Patterns from Developer Commits

Author(s): Yiqun Chen, Stefan Winter and Neeraj Suri
Published in: IEEE Proc. of ISSRE, 2019, 2019

Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD

Author(s): Thymen Wabeke; Giovane C. M. Moura; Nanneke Franken; Cristian Hesselman
Published in: 2020
DOI: 10.5281/zenodo.3678750

A NIS Directive compliant Cybersecurity Maturity Assessment Framework

Author(s): G. Drivas,  A. Chatzopoulou, L. Maglaras, C. Lambrinoudakis, Allan Cook, H. Janicke
Published in:  Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2020), 2020
DOI: 10.1109/compsac48688.2020.00-20

Cybersecurity in the public sector in Greece

Author(s): George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis
Published in: 2019

A Continuous Certification Methodology for DevOps

Author(s): Marco Anisetti, Claudio A. Ardagna, Filippo Gaudenzi, Ernesto Damiani
Published in: Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019, Page(s) 205-212
DOI: 10.1145/3297662.3365827

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts

Author(s): Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl
Published in: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 46-50
DOI: 10.1109/SCC.2019.00020

Secure Healthcare: 5G-enabled Network Slicing for Elderly Care

Author(s): Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do
Published in: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 864-868
DOI: 10.1109/icccs49078.2020.9118583

Improving Cellular IoT Security with Identity Federation and Anomaly Detection

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do
Published in: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 776-780
DOI: 10.1109/ICCCS49078.2020.9118438

Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud

Author(s): Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 14-19
DOI: 10.1109/cscloud/edgecom.2019.00013

Bringing 5G Into User's Smart Home

Author(s): Bruno Dzogovic, Bernardo Santos, Thanh Van Do, Boning Feng, Thuan Van Do, Niels Jacot
Published in: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019, Page(s) 782-787
DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00145

Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks

Author(s): Bruno Dzogovic, Thanh van Do, Bernardo Santos, Do Van Thuan, Boning Feng, Niels Jacot
Published in: 2019 IEEE 2nd 5G World Forum (5GWF), 2019, Page(s) 415-420
DOI: 10.1109/5gwf.2019.8911710

Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks

Author(s): Bernardo de Matos Patrocinio dos Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 130-135
DOI: 10.1109/cscloud/edgecom.2019.000-7

Demo: Blockchain for the Simplification and Automation of KYC Result Sharing

Author(s): Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 9-10
DOI: 10.1109/BLOC.2019.8751480

BlockZoom: Large-Scale Blockchain Testbed

Author(s): Wazen M. Shbair, Mathis Steichen, Jerome Francois, Radu State
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 5-6
DOI: 10.1109/BLOC.2019.8751230

Talon: An Automated Framework for Cross-Device Tracking Detection

Author(s): Solomos, Konstantinos; Ilia, Panagiotis; Ioannidis, Sotiris; Kourtellis, Nicolas
Published in: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Issue 8, 2019
DOI: 10.5281/zenodo.3598091

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

Author(s): Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
Published in: The World Wide Web Conference on - WWW '19, 2019, Page(s) 1432-1442
DOI: 10.1145/3308558.3313542

No More ChasingWaterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem

Author(s): Michalis Pachilakis; Panagiotis Papadopoulos; Evangelos P. Markatos; Nicolas Kourtellis
Published in: Proceedings of the Internet Measurement Conference, Issue 70, 2019
DOI: 10.5281/zenodo.3598095

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web

Author(s): Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Published in: Companion Proceedings of The 2019 World Wide Web Conference, 2019, Page(s) 218-226
DOI: 10.1145/3308560.3316495

Who Let The Trolls Out? - Towards Understanding State-Sponsored Trolls

Author(s): Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Published in: Proceedings of the 10th ACM Conference on Web Science - WebSci '19, 2019, Page(s) 353-362
DOI: 10.1145/3292522.3326016

Complexity Analysis of Decentralized Application Development Using Integration Tools

Author(s): PATRIK REK, BLAZ PODGORELEC, and MUHAMED TURKANOVIC
Published in: Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, Issue September 22-25, 2019, 2019
DOI: 10.5281/zenodo.3674326

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations

Author(s): George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6
DOI: 10.1109/camad.2019.8858165

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place

Author(s): Rafati Niya, Sina; Allemann, Sebastian; Gabay, Arik; Stiller, Burkhard
Published in: 2019
DOI: 10.5281/zenodo.3677142

Beyond content analysis - detecting targeted ads via distributed counting

Author(s): Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris
Published in: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Page(s) 110-122
DOI: 10.1145/3359989.3365428

Cluster-Based Anonymization of Directed Graphs

Author(s): Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 2019, Page(s) 91-100
DOI: 10.1109/cic48465.2019.00020

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Author(s): Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis
Published in: Proceedings of The Web Conference 2020, 2020, Page(s) 1479-1490
DOI: 10.1145/3366423.3380221

Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem

Author(s): Konstantinos Solomos; Panagiotis Ilia; Sotiris Ioannidis; Nicolas Kourtellis
Published in: ACM Network Traffic Measurement and Analysis Conference, 2020
DOI: 10.5281/zenodo.3925659

A Proposal for Security Assessment of Trustzone-M Based Software

Author(s): Antonio Ken Iannillo, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 126-127
DOI: 10.1109/ISSREW.2019.00110

Auto-Encoding Robot State Against Sensor Spoofing Attacks

Author(s): Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 252-257
DOI: 10.1109/ISSREW.2019.00080

Mobile App to SGX Enclave Secure Channel

Author(s): Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 258-263
DOI: 10.1109/issrew.2019.00081

Helping Users Managing Context-Based Privacy Preferences

Author(s): Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 100-107
DOI: 10.1109/scc.2019.00027

Adapting Users' Privacy Preferences in Smart Environments

Author(s): Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 165-172
DOI: 10.1109/iciot.2019.00036

Confidential Discovery of IoT Devices through Blockchain

Author(s): Christian Rondanini, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 1-8
DOI: 10.1109/iciot.2019.00014

Analysis of Fault Tolerance in Permissioned Blockchain Networks

Author(s): Blaz Podgorelec, Vid Kersic, Muhamed Turkanovic
Published in: 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT), 2019, Page(s) 1-6
DOI: 10.1109/ICAT47117.2019.8938836

A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems

Author(s): Malte Granderath, Jurgen Schonwalder
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6
DOI: 10.1109/noms47738.2020.9110458

An Example of a Cybersecurity Education Model

Author(s): Muhamed Turkanovic, Tatjana Welzer, Marko Holbl
Published in: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4
DOI: 10.1109/eaeeie46886.2019.9000440

Cultural Diversity in Database Teaching

Author(s): Tatjana Welzer, Marjan Druzovec, Marko Kompara, Marko Holbl
Published in: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4
DOI: 10.1109/EAEEIE46886.2019.9000471

Using TLS Fingerprints for OS Identification in Encrypted Traffic

Author(s): Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6
DOI: 10.1109/noms47738.2020.9110319

Assessing Cybersecurity Threats and Risks in the Public Sector in Greece

Author(s): G. Drivas,  L. Maglaras, H Janicke, S Ioannidis
Published in: Journal of Information Warfare, V. 19(1), 2019, ISSN 1445-3312

Cost-effective deployment of certified cloud composite services

Author(s): Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon
Published in: Journal of Parallel and Distributed Computing, Issue 135, 2020, Page(s) 203-218, ISSN 0743-7315
DOI: 10.1016/j.jpdc.2019.09.003

A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks

Author(s): Nemec Zlatolas, Welzer, Hölbl, Heričko, Kamišalić
Published in: Entropy, Issue 21/8, 2019, Page(s) 772, ISSN 1099-4300
DOI: 10.3390/e21080772

A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection

Author(s): Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič
Published in: Sensors, Issue 20/1, 2020, Page(s) 147, ISSN 1424-8220
DOI: 10.3390/s20010147

A deep learning model for Twitter spam detection

Author(s): Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: Online Social Networks and Media, Issue 18, 2020, Page(s) 100079, ISSN 2468-6964
DOI: 10.1016/j.osnem.2020.100079

The Seven Deadly Sins of the HTML5 WebAPI

Author(s): Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis
Published in: ACM Transactions on Privacy and Security, Issue 23/4, 2020, Page(s) 1-31, ISSN 2471-2566
DOI: 10.1145/3403947

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

Author(s): Jan Kohlrausch, Eugene A. Brin
Published in: Digital Threats: Research and Practice, Issue 1/1, 2020, Page(s) 1-21, ISSN 2576-5337
DOI: 10.1145/3376926

State Channel as a Service Based on a Distributed and Decentralized Web

Author(s): Blaz Podgorelec, Marjan Herieko, Muhamed Turkanovic
Published in: IEEE Access, Issue 8, 2020, Page(s) 64678-64691, ISSN 2169-3536
DOI: 10.1109/access.2020.2984378

Certified Machine-Learning Models

Author(s): Ernesto Damiani, Claudio A. Ardagna
Published in: SOFSEM 2020: Theory and Practice of Computer Science - 46th International Conference on Current Trends in Theory and Practice of Informatics, SOFSEM 2020, Limassol, Cyprus, January 20–24, 2020, Proceedings, Issue 12011, 2020, Page(s) 3-15
DOI: 10.1007/978-3-030-38919-2_1

Enhancing Security of Cellular IoT with Identity Federation

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: Advances in Intelligent Networking and Collaborative Systems - The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019), Issue 1035, 2020, Page(s) 257-268
DOI: 10.1007/978-3-030-29035-1_25

You Shall Not Register! Detecting Privacy Leaks Across Registration Forms

Author(s): Manolis Chatzimpyrros, Konstantinos Solomos, Sotiris Ioannidis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 91-104
DOI: 10.1007/978-3-030-42051-2_7

Towards the Insurance of Healthcare Systems

Author(s): George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 185-198
DOI: 10.1007/978-3-030-42051-2_13

Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling

Author(s): Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović
Published in: New Trends in Databases and Information Systems - ADBIS 2019 Short Papers, Workshops BBIGAP, QAUCA, SemBDM, SIMPDA, M2P, MADEISD, and Doctoral Consortium, Bled, Slovenia, September 8–11, 2019, Proceedings, Issue 1064, 2019, Page(s) 45-51
DOI: 10.1007/978-3-030-30278-8_6

On the Influence of Twitter Trolls during the 2016 US Presidential Election

Author(s): Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos
Published in: 2019
DOI: 10.5281/zenodo.3674304

Blockchain-based Anonymous P2P Trading System

Author(s): Sina Rafati Niya; Sebastian Allemann; Arik Gabay; Burkhard Stiller
Published in: 2019
DOI: 10.5281/zenodo.3677160

Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news

Author(s): Tanja Pavleska; Andrej Školkay; Bissera Zankova; Nelson Ribeiro; Anja Bechmann
Published in: Disinformation and Digital Media as a Challenge for Democracy, 2019
DOI: 10.5281/zenodo.3677439

Angry Birds Flock Together: Aggression Propagation on Social Media

Author(s): Chrysoula Terizi; Despoina Chatzakou; Evaggelia Pitoura; Panayiotis Tsaparas; Nicolas Kourtellis
Published in: 2020
DOI: 10.5281/zenodo.3692844

Understanding the Incel Community on YouTube

Author(s): Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
Published in: 2020
DOI: 10.5281/zenodo.3898038

On the Aggression Diffusion Modeling and Minimization in Online Social Networks

Author(s): Marinos Poiitis, Athena Vakali, Nicolas Kourtellis
Published in: 2020
DOI: 10.5281/zenodo.3925683

Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter

Author(s): Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos
Published in: 2020
DOI: 10.5281/zenodo.3902669