CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.
Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .
Livrables
D2.2 will report on the technical requirements, which the SECANT platform will have to satisfy as identified in Task 2.2.
SECANT end user application - initial versionA report and prototype deliverable regarding the specification and implementation of the SECANT mobile application.
SECANT security awareness training - initial versionA report/prototype regarding the specification and implementation of the SECANT security awareness training
TAM implementation and compliance assessmentThis deliverable will document the final implementation of the TAM and its assessment and certification.
Report on connection with stakeholdersD8.7 will report on the progress and work of Task 8.4 on liaisons with relevant stakeholders.
SECANT cyber range - initial versionA report and prototype regarding the specification and implementation of the SECANT Cyber Range.
Techniques for threat intelligence collection, sharing, and reporting - initial versionD3.2 will present the techniques for threat intelligence information gathering, sharing and reporting corresponding to T3.2.
SECANT evaluation report on the health data protection pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.4.
Connected ICT cyber risk assessment engine - initial versionThis deliverable represents the main outcome of Task 3.4. It includes the prototype and specifications of the SECANT Connected ICT Cyber Risk Assessment Engine.
Plans for dissemination, communication, and exploitationA coordinated dissemination and communication plan will be defined in D8.2 and will be maintained/updated throughout the project. This document will describe how SECANT will establish and follow highly effective dissemination and communication activities to promote the project. It will also record how the results are being exploited. It will be written primarily as a guide for the project partners and for the key stakeholders of our intended dissemination and promotion activities, and will cover four main aspects:● The SECANT dissemination and communication/promotion goals;● The SECANT strategy: i.e., how the project will disseminate and promote project activities and work;● A plan of the specific promotional activities that will evolve in line with the progress of the project;● A description of how the project can measure the effectiveness of its dissemination and communication.The report will be updated through D8.3, D8.4 and D8.5.
SECANT evaluation report on the secure ambulance pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.2.
SECANT evaluation report on the connected medical devices pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.3.
Taxonomy for healthcare-related attacks and techniques for dynamic taxonomies generation - initial versionD3.4 will describe the generated taxonomies for medical-related attacks as well as the techniques for the dynamic adaptation of the taxonomies based on the collected threat intelligence; it corresponds to task T3.3.
Initial report on dissemination, communication and standardizationD8.3 will include all dissemination, communication and standardization activities that have been undertaken, during the first twelve (12) months of the project, and those still planned.
SECANT evaluation report on the security training pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.5.
Secure technologies for sensitive data access control, storage, sharing and searchingThis deliverable will document the design, security analysis and implementation ofcryptographic solutions that are able to cope with decentralized secure data storage, sharing, searching and access control in complex ICT ecosystems.
End-user/stakeholder requirementsD2.1 will be a report on the feedback received during consultations with the end-users/stakeholders within Task 2.1.
Interim report on diss., comm. and standardizationD8.4 will include all dissemination, communication and standardization activities that have been undertaken, during the first two (2) years of the project, and those still planned.
Technical vulnerability and impact assessment module - initial versionThis deliverable is one of the outputs of Task 3.6 and consists of a tool to perform technical vulnerability and impact assessment of cyber incidents and threats on the complex ICT infrastructures.
Vision scenarios and use cases definitionThis deliverable will report on the activities of Task T2.3 and will elaborate on the SECANT pilot use cases.
Trusted accountability module specificationThis deliverable will document the specification of the TAM and relevant data models and interfaces.
Pilot evaluation framework and measures specificationsThis deliverable will describe the planning of interfaces and collaborations of the applications scenarios envisaged in the demonstrators, the SECANT technologies, and their validation in the testing environment specifications together with evaluation measures and industrial benchmarks (KPIs). These reports will include the outcomes of the evaluation (in terms of consistency, correctness, completeness) for the SECANT technologies and the benefits they provide in different cases, as well as recommendations to the research activities of the project following the evaluation process. The intermediate versions will feed the R&D work packages, while the final version will act as a “Best practices & Lessons Learned” report.
Interoperability layerThis deliverable will present the data models from the legacy systems of medical organizations and the sequence UML diagrams as part of the activities conducted within Task T3.1.
Secure sharing APIs for the ICT ecosystemThis deliverable will document the APIs that will be developed for the integration with the complex ICT ecosystems, while supporting diversity of data sources and the need for secure sharing.
SECANT dashboard - initial versionA prototype version of the SECANT dashboard.
Digital identity management module - initial versionD4.5 will be a report and prototype of SECANT’s DIM module with all the standards, roles and flows defined for a Decentralized Identity in the complex ICT ecosystems.
Final report on diss., comm. and standardizationD8.5 will document all dissemination, communication and standardization activities that have been undertaken, during the second half of the project duration. It will also summarize the most important dissemination, communication and standardization achievements of SECANT during the project lifetime.
Taxonomy for healthcare-related attacks and techniques for dynamic taxonomies generation - final versionD3.5 will describe the generated taxonomies for medical-related attacks as well as the techniques for the dynamic adaptation of the taxonomies based on the collected threat intelligence; it corresponds to task T3.3.
Human vulnerability assessment module - initial versionThis deliverable is one of the outputs of Task 3.5 and consists of a tool to perform SDVAs on the complex ICT infrastructures.
The SECANT website will be launched at the start of the project. The website will provide detailed information about the project objectives and activities. The website will have two sections: public and private. The public part will be open to the general public and will be viewable by anyone with access to the Internet. The private part will be regularlyupdated to provide latest project activities and overall progress and will be accessible only to consortium members.
Publications
Auteurs:
Dimitris Kavallieros, Arnolnt Spyros
Publié dans:
Security Informatics and Law Enforcement, 2024
Éditeur:
Springer Nature Switzerland
DOI:
10.1007/978-3-031-62083-6
Auteurs:
S. Nifakos; M. Caballero; D. Kavallieros; A. Spyros; A. Tavernarakis; A. Tziouvaras; S. Bonacina; K. Chandrarmouli; M. Coroiu; L. Chen; T. Dounia; I. Giannoulakis; N. Gligoric; E. Kafetzakis; T. Kasig; V. Koumaras; T. Krousarlis; K. Lapidaki; A. Markakis; S. Marin; M. Manulis; S. Menesidou; L. Meng; S. Mhiri; M. Nati; K. Ntafloukas; D. Oniga; D. Papamartzivanos; S. Papastergiou; K. Sanchez; C. S
Publié dans:
2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, Page(s) 104-111
Éditeur:
IEEE
DOI:
10.1109/csr54599.2022.9850319
Auteurs:
Long Meng, Liqun Chen
Publié dans:
Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Page(s) 3-24
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-031-17140-6_1
Auteurs:
Saber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio
Publié dans:
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Page(s) 1-11
Éditeur:
ACM
DOI:
10.1145/3664476.3670874
Auteurs:
Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian
Publié dans:
Lecture Notes in Computer Science, Information Security Practice and Experience, 2023, Page(s) 419-439
Éditeur:
Springer Nature Singapore
DOI:
10.1007/978-981-99-7032-2_25
Recherche de données OpenAIRE...
Une erreur s’est produite lors de la recherche de données OpenAIRE
Aucun résultat disponible