Skip to main content

Cyber Security Network of Competence Centres for Europe

Deliverables

Cross sectural cybersecurity building blocks

Cross sectural cybersecurity building blocks

Requirements Analysis of Demonstration case Phase 1

Requirements Analysis of Demonstration case Phase 1

Clustering results and SU-ICT-03 project CONCERTATION conference year 1

proceedings and reporting of collaboration efforts results year 1 (including but not limited to ECSO (and Working Groups), cPPP, ENISA, DG CNECT, EUROPOL, EOS, CEN/CENELECT, ISO, international cooperation)

Usability requirements validation

Usability requirements validation

Usable security & privacy methods and rec-ommendations

Usable security & privacy methods and recommendations

Guidelines for GDPR compliant user experi-ence

Guidelines for GDPR compliant user experi-ence

SME cybersecurity awareness program 1

SME cybersecurity awareness program 1

Common Framework Handbook 1

Common Framework Handbook 1

Research and Development Roadmap 1

Research and Development Roadmap 1

Project Standards Matrix 1

Project Standards Matrix 1

Website and Social media accounts 2

Website and Social media accounts 2

Research challenges and requirements to man-age digital evidence

Research challenges and requirements to man-age digital evidence

Requirements Analysis from Vertical Stake-holders

Requirements Analysis from Vertical Stakeholders

Analysis of key research challenges for adaptive security

Analysis of key research challenges for adaptive security

Governance Structure 1

Governance Structure 1

Research challenges and requirements for secure software development

Research challenges and requirements for secure software development

Report on the outreach and dissemination activities 1

Report on the outreach and dissemination activities 1

Legal Framework

Legal Framework

Case Pilot for WP2 Governance

Case Pilot for WP2 Governance

Dissemination material: Brochures, poster

Dissemination material: Brochures, poster

Education and Training Review

Education and Training Review

Cybersecurity Standardisation Engagement Plan 1

Cybersecurity Standardisation Engagement Plan 1

Dissemination and awareness plan

Dissemination and awareness plan

Searching for OpenAIRE data...

Publications

Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports

Author(s): Gabriel Kuper, Fabio Massacci, Woohyun Shim, Julian Williams
Published in: Risk Analysis, Issue 20 February 2020, 2020, ISSN 0272-4332
DOI: 10.1111/risa.13454

Governance Challenges for European Cybersecurity Policies: Stakeholder Views

Author(s): Pierantonia Sterlini, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, Michel van Eeten
Published in: IEEE Security & Privacy, Issue 18/1, 2020, Page(s) 46-54, ISSN 1540-7993
DOI: 10.1109/msec.2019.2945309

Measuring the accuracy of software vulnerability assessments: experiments with students and professionals

Author(s): Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim
Published in: Empirical Software Engineering, Issue 25/2, 2020, Page(s) 1063-1094, ISSN 1382-3256
DOI: 10.1007/s10664-019-09797-4

Enforcing Behavioral Profiles through Software-Defined Networks in the Industrial Internet of Things

Author(s): Sara Nieves Matheu García, Alejandro Molina Zarca, José Luis Hernández-Ramos, Jorge Bernal Bernabé, Antonio Skarmeta Gómez
Published in: Applied Sciences, Issue 9/21, 2019, Page(s) 4576, ISSN 2076-3417
DOI: 10.3390/app9214576

Fully invisible protean signatures schemes

Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: IET Information Security, Issue 2020, 2020, ISSN 1751-8709
DOI: 10.1049/iet-ifs.2019.0141

"Is ""Deny Access"" a Valid ""Fail-Safe Default"" Principle for Building Security in Cyberphysical Systems?"

Author(s): Fabio Massacci
Published in: IEEE Security & Privacy, Issue 17/5, 2019, Page(s) 90-93, ISSN 1540-7993
DOI: 10.1109/msec.2019.2918820

Integration of a Threat Traceability Solution in the Industrial Internet of Things

Author(s): Juan E. Rubio, Rodrigo Roman, Javier Lopez
Published in: IEEE Transactions on Industrial Informatics, Issue In press, 2020, Page(s) 1-1, ISSN 1551-3203
DOI: 10.1109/tii.2020.2976747

Encrypted and covert DNS queries for botnets: Challenges and countermeasures

Author(s): Constantinos Patsakis, Fran Casino, Vasilios Katos
Published in: Computers & Security, Issue 88, 2020, Page(s) 101614, ISSN 0167-4048
DOI: 10.1016/j.cose.2019.101614

Blockchain Mutability: Challenges and Proposed Solutions

Author(s): Eugenia Politou, Fran Casino, Efthymios Alepis, Constantinos Patsakis
Published in: IEEE Transactions on Emerging Topics in Computing, Issue 1 (VOL .X) (Frequency: 4), 2019, Page(s) 1-1, ISSN 2168-6750
DOI: 10.1109/tetc.2019.2949510

MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks

Author(s): Majid Salehi, Danny Hughes, Bruno Crispo
Published in: 2019 IEEE Conference on Dependable and Secure Computing (DSC), Issue 23/Dec/19, 2019, Page(s) 1-8
DOI: 10.1109/dsc47296.2019.8937667

TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE

Author(s): Davy Preuveneers, Wouter Joosen
Published in: Foundations and Practice of Security. 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers, Issue 8 June 2020, 2020
DOI: 10.1007/978-3-030-45371-8_11

Cached and Confused: Web Cache Deception in the Wild

Author(s): S. Ali Mirheidari, S. Arshad , K. Onarlioglu, B. Crispo, E. Kirda, W. Robertson
Published in: Usenix Security 2020 conference., Issue 12/Aug/20, 2020, Page(s) all

Practical Group-Signatures with Privacy-Friendly Openings

Author(s): Stephan Krenn, Kai Samelin, Christoph Striecks
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, Issue 2019, 2019, Page(s) 1-10
DOI: 10.1145/3339252.3339256

A Systematic Analysis of User Evaluations in Security Research

Author(s): Peter Hamm, David Harborth, Sebastian Pape
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, Issue 14th, 2019, Page(s) 1-7
DOI: 10.1145/3339252.3340339

Variability meets security - qantitative security modeling and analysis of highly customizable attack scenarios

Author(s): Maurice H. ter Beek, Axel Legay, Alberto Lluch Lafuente, Andrea Vandin
Published in: Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems, 2020, Page(s) 1-9
DOI: 10.1145/3377024.3377041

A Decentralized Solution for Combinatorial Testing of Access Control Engine

Author(s): Said Daoudagh, Francesca Lonetti, Eda Marchetti
Published in: Proceedings of the 5th International Conference on Information Systems Security and Privacy, Issue February 23, 2019, Page(s) 126-135
DOI: 10.5220/0007379401260135

Towards a Lawful Authorized Access: A Preliminary GDPR-based Authorized Access

Author(s): Cesare Bartolini, Said Daoudagh, Gabriele Lenzini, Eda Marchetti
Published in: Proceedings of the 14th International Conference on Software Technologies, Issue July 26, 2019, Page(s) 331-338
DOI: 10.5220/0007978703310338

Integrating Access Control and Business Process for GDPR Compliance: A Preliminary Study

Author(s): Antonello Calabrò, Said Daoudagh, Eda Marchetti
Published in: Proceedings of the Third Italian Conference on Cyber Security,, Issue February 13, 2019

Data Privatizer for Biometric Applications and Online Identity Management

Author(s): Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen
Published in: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Issue 576, 2020, Page(s) 209-225
DOI: 10.1007/978-3-030-42504-3_14

Breaking and Fixing Anonymous Credentials for the Cloud

Author(s): Ulrich Haböck, Stephan Krenn
Published in: Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings, Issue 11829, 2019, Page(s) 249-269
DOI: 10.1007/978-3-030-31578-8_14

iUC: Flexible Universal Composability Made Simple

Author(s): Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Issue 11923, 2019, Page(s) 191-221
DOI: 10.1007/978-3-030-34618-8_7

Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking

Author(s): Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos
Published in: Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings, Issue 11723, 2019, Page(s) 277-296
DOI: 10.1007/978-3-030-30215-3_14

Practical Password Hardening Based on TLS

Author(s): Constantinos Diomedous, Elias Athanasopoulos
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Issue 11543, 2019, Page(s) 441-460
DOI: 10.1007/978-3-030-22038-9_21

A Framework for Provenance-Preserving History Distribution and Incremental Reduction

Author(s): Alberto Lluch Lafuente
Published in: Models, Languages, and Tools for Concurrent and Distributed Programming - Essays Dedicated to Rocco De Nicola on the Occasion of His 65th Birthday, Issue 11665, 2019, Page(s) 471-486
DOI: 10.1007/978-3-030-21485-2_26

GDPR-Based User Stories in the Access Control Perspective

Author(s): Cesare Bartolini, Said Daoudagh, Gabriele Lenzini, Eda Marchetti
Published in: Quality of Information and Communications Technology - 12th International Conference, QUATIC 2019, Ciudad Real, Spain, September 11–13, 2019, Proceedings, Issue 1010, 2019, Page(s) 3-17
DOI: 10.1007/978-3-030-29238-6_1

A Framework for the Validation of Access Control Systems

Author(s): Said Daoudagh, Francesca Lonetti, Eda Marchetti
Published in: Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, Issue 11967, 2020, Page(s) 35-51
DOI: 10.1007/978-3-030-39749-4_3

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)

Author(s): Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
Published in: Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Xersonisos, Crete, Greece, May 24-26, 2019, Proceedings, Issue 1000, 2019, Page(s) 476-487
DOI: 10.1007/978-3-030-20257-6_41

Julkisessa tilassa olevan epäluotetun laitteen käyttöä suojaava järjestelmä (A system that protects the use of an untrusted device in a public space)

Author(s): Hekkala Julius
Published in: 2019

Lohkoketjuavaimen varmistettu ja suojattu hallintaympäristö (Secured and protected management environment for blockchain keys)

Author(s): Lehto Niko
Published in: 2019