Skip to main content
European Commission logo
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

SECurity And privacy protectioN in Internet of Things devices

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Technical requirements

D22 will report on the technical requirements which the SECANT platform will have to satisfy as identified in Task 22

SECANT end user application - initial version

A report and prototype deliverable regarding the specification and implementation of the SECANT mobile application

SECANT security awareness training - initial version

A reportprototype regarding the specification and implementation of the SECANT security awareness training

TAM implementation and compliance assessment

This deliverable will document the final implementation of the TAM and its assessment and certification.

Report on connection with stakeholders

D8.7 will report on the progress and work of Task 8.4 on liaisons with relevant stakeholders.

SECANT cyber range - initial version

A report and prototype regarding the specification and implementation of the SECANT Cyber Range

Techniques for threat intelligence collection, sharing, and reporting - initial version

D32 will present the techniques for threat intelligence information gathering sharing and reporting corresponding to T32

SECANT evaluation report on the health data protection pilot

This deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.4.

Connected ICT cyber risk assessment engine - initial version

This deliverable represents the main outcome of Task 34 It includes the prototype and specifications of the SECANT Connected ICT Cyber Risk Assessment Engine

Plans for dissemination, communication, and exploitation

A coordinated dissemination and communication plan will be defined in D82 and will be maintainedupdated throughout the project This document will describe how SECANT will establish and follow highly effective dissemination and communication activities to promote the project It will also record how the results are being exploited It will be written primarily as a guide for the project partners and for the key stakeholders of our intended dissemination and promotion activities and will cover four main aspects The SECANT dissemination and communicationpromotion goals The SECANT strategy ie how the project will disseminate and promote project activities and work A plan of the specific promotional activities that will evolve in line with the progress of the project A description of how the project can measure the effectiveness of its dissemination and communicationThe report will be updated through D83 D84 and D85

SECANT evaluation report on the secure ambulance pilot

This deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.2.

SECANT evaluation report on the connected medical devices pilot

This deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.3.

Taxonomy for healthcare-related attacks and techniques for dynamic taxonomies generation - initial version

D34 will describe the generated taxonomies for medicalrelated attacks as well as the techniques for the dynamic adaptation of the taxonomies based on the collected threat intelligence it corresponds to task T33

Initial report on dissemination, communication and standardization

D83 will include all dissemination communication and standardization activities that have been undertaken during the first twelve 12 months of the project and those still planned

SECANT evaluation report on the security training pilot

This deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.5.

Secure technologies for sensitive data access control, storage, sharing and searching

This deliverable will document the design security analysis and implementation ofcryptographic solutions that are able to cope with decentralized secure data storage sharing searching and access control in complex ICT ecosystems

End-user/stakeholder requirements

D21 will be a report on the feedback received during consultations with the endusersstakeholders within Task 21

Interim report on diss., comm. and standardization

D84 will include all dissemination communication and standardization activities that have been undertaken during the first two 2 years of the project and those still planned

Technical vulnerability and impact assessment module - initial version

This deliverable is one of the outputs of Task 36 and consists of a tool to perform technical vulnerability and impact assessment of cyber incidents and threats on the complex ICT infrastructures

Vision scenarios and use cases definition

This deliverable will report on the activities of Task T23 and will elaborate on the SECANT pilot use cases

Trusted accountability module specification

This deliverable will document the specification of the TAM and relevant data models and interfaces

Pilot evaluation framework and measures specifications

This deliverable will describe the planning of interfaces and collaborations of the applications scenarios envisaged in the demonstrators, the SECANT technologies, and their validation in the testing environment specifications together with evaluation measures and industrial benchmarks (KPIs). These reports will include the outcomes of the evaluation (in terms of consistency, correctness, completeness) for the SECANT technologies and the benefits they provide in different cases, as well as recommendations to the research activities of the project following the evaluation process. The intermediate versions will feed the R&D work packages, while the final version will act as a “Best practices & Lessons Learned” report.

Interoperability layer

This deliverable will present the data models from the legacy systems of medical organizations and the sequence UML diagrams as part of the activities conducted within Task T3.1.

Secure sharing APIs for the ICT ecosystem

This deliverable will document the APIs that will be developed for the integration with the complex ICT ecosystems, while supporting diversity of data sources and the need for secure sharing.

SECANT dashboard - initial version

A prototype version of the SECANT dashboard

Digital identity management module - initial version

D45 will be a report and prototype of SECANTs DIM module with all the standards roles and flows defined for a Decentralized Identity in the complex ICT ecosystems

Final report on diss., comm. and standardization

D8.5 will document all dissemination, communication and standardization activities that have been undertaken, during the second half of the project duration. It will also summarize the most important dissemination, communication and standardization achievements of SECANT during the project lifetime.

Taxonomy for healthcare-related attacks and techniques for dynamic taxonomies generation - final version

D3.5 will describe the generated taxonomies for medical-related attacks as well as the techniques for the dynamic adaptation of the taxonomies based on the collected threat intelligence; it corresponds to task T3.3.

Human vulnerability assessment module - initial version

This deliverable is one of the outputs of Task 35 and consists of a tool to perform SDVAs on the complex ICT infrastructures

Project website

The SECANT website will be launched at the start of the project The website will provide detailed information about the project objectives and activities The website will have two sections public and private The public part will be open to the general public and will be viewable by anyone with access to the Internet The private part will be regularlyupdated to provide latest project activities and overall progress and will be accessible only to consortium members

Veröffentlichungen

Paradigms on Technology Development for Security Practitioners

Autoren: Dimitris Kavallieros, Arnolnt Spyros
Veröffentlicht in: Security Informatics and Law Enforcement, 2024
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-62083-6

ICT in Healthcare: the role of IoT and the SECANT solution

Autoren: S. Nifakos; M. Caballero; D. Kavallieros; A. Spyros; A. Tavernarakis; A. Tziouvaras; S. Bonacina; K. Chandrarmouli; M. Coroiu; L. Chen; T. Dounia; I. Giannoulakis; N. Gligoric; E. Kafetzakis; T. Kasig; V. Koumaras; T. Krousarlis; K. Lapidaki; A. Markakis; S. Marin; M. Manulis; S. Menesidou; L. Meng; S. Mhiri; M. Nati; K. Ntafloukas; D. Oniga; D. Papamartzivanos; S. Papastergiou; K. Sanchez; C. S
Veröffentlicht in: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, Seite(n) 104-111
Herausgeber: IEEE
DOI: 10.1109/csr54599.2022.9850319

A Blockchain-Based Long-Term Time-Stamping Scheme

Autoren: Long Meng, Liqun Chen
Veröffentlicht in: Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Seite(n) 3-24
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-031-17140-6_1

Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation

Autoren: Saber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio
Veröffentlicht in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Seite(n) 1-11
Herausgeber: ACM
DOI: 10.1145/3664476.3670874

FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption

Autoren: Long Meng
Veröffentlicht in: ACM CCS 2024, 2024
Herausgeber: N/A

Towards Enhanced IoT Security: Advanced Anomaly Detection using Transformer Models

Autoren: Natalia de los Ángeles Sánchez Patiño; Saber Mhiri; Nil Ortiz; Albert Calvo;Santiago Escuder Folch; Josep Escrig
Veröffentlicht in: 4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics at ACM SIGKDD Conference 2024, 2024
Herausgeber: N/A

FEASE: Fast and Expressive Asymmetric Searchable Encryption

Autoren: Long Meng; Liqun Chen;Yangguang Tian; Mark Manulis; Suhui Liu
Veröffentlicht in: USENIX Security Symposium 2024, 2024
Herausgeber: N/A

BAHS: A Blockchain-Aided Hash-Based Signature Scheme

Autoren: Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian
Veröffentlicht in: Lecture Notes in Computer Science, Information Security Practice and Experience, 2023, Seite(n) 419-439
Herausgeber: Springer Nature Singapore
DOI: 10.1007/978-981-99-7032-2_25

A survey on machine learning techniques for cyberthreat detection and classification tasks

Autoren: Athanasios Tziouvaras; Arnolnt Spyros; Dimitrios Kavallieros; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris
Veröffentlicht in: Journal of Information Security and Applications (JISA), 2024
Herausgeber: Journal of Information Security and Applications (JISA)

A Comprehensive Survey of Manual and Dynamic Approaches for Cybersecurity Taxonomy Generation

Autoren: Arnolnt Spyros. Anna Kougioumtzidou, Aggelos Papoutsis, Eleni Darra, Dimitrios Kavallieros, Athanasios Tziouvaras, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
Veröffentlicht in: Knowledge and Information Systems, 2024
Herausgeber: Springer

Social Engineering: The Human Behavior Impact in Cyber Security Within Critical Information Infrastructures

Autoren: Sokratis Nifakos;Krishna Chandramouli;Natalia Stathakarou
Veröffentlicht in: Elsevier: Computers and Security, 2024
Herausgeber: Springer

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor