CORDIS oferuje możliwość skorzystania z odnośników do publicznie dostępnych publikacji i rezultatów projektów realizowanych w ramach programów ramowych HORYZONT.
Odnośniki do rezultatów i publikacji związanych z poszczególnymi projektami 7PR, a także odnośniki do niektórych konkretnych kategorii wyników, takich jak zbiory danych i oprogramowanie, są dynamicznie pobierane z systemu OpenAIRE .
Rezultaty
D22 will report on the technical requirements which the SECANT platform will have to satisfy as identified in Task 22
SECANT end user application - initial versionA report and prototype deliverable regarding the specification and implementation of the SECANT mobile application
SECANT security awareness training - initial versionA reportprototype regarding the specification and implementation of the SECANT security awareness training
TAM implementation and compliance assessmentThis deliverable will document the final implementation of the TAM and its assessment and certification.
Report on connection with stakeholdersD8.7 will report on the progress and work of Task 8.4 on liaisons with relevant stakeholders.
SECANT cyber range - initial versionA report and prototype regarding the specification and implementation of the SECANT Cyber Range
Techniques for threat intelligence collection, sharing, and reporting - initial versionD32 will present the techniques for threat intelligence information gathering sharing and reporting corresponding to T32
SECANT evaluation report on the health data protection pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.4.
Connected ICT cyber risk assessment engine - initial versionThis deliverable represents the main outcome of Task 34 It includes the prototype and specifications of the SECANT Connected ICT Cyber Risk Assessment Engine
Plans for dissemination, communication, and exploitationA coordinated dissemination and communication plan will be defined in D82 and will be maintainedupdated throughout the project This document will describe how SECANT will establish and follow highly effective dissemination and communication activities to promote the project It will also record how the results are being exploited It will be written primarily as a guide for the project partners and for the key stakeholders of our intended dissemination and promotion activities and will cover four main aspects The SECANT dissemination and communicationpromotion goals The SECANT strategy ie how the project will disseminate and promote project activities and work A plan of the specific promotional activities that will evolve in line with the progress of the project A description of how the project can measure the effectiveness of its dissemination and communicationThe report will be updated through D83 D84 and D85
SECANT evaluation report on the secure ambulance pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.2.
SECANT evaluation report on the connected medical devices pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.3.
Taxonomy for healthcare-related attacks and techniques for dynamic taxonomies generation - initial versionD34 will describe the generated taxonomies for medicalrelated attacks as well as the techniques for the dynamic adaptation of the taxonomies based on the collected threat intelligence it corresponds to task T33
Initial report on dissemination, communication and standardizationD83 will include all dissemination communication and standardization activities that have been undertaken during the first twelve 12 months of the project and those still planned
SECANT evaluation report on the security training pilotThis deliverable will report the evaluation results associated with the demonstration activities conducted in Task 7.5.
Secure technologies for sensitive data access control, storage, sharing and searchingThis deliverable will document the design security analysis and implementation ofcryptographic solutions that are able to cope with decentralized secure data storage sharing searching and access control in complex ICT ecosystems
End-user/stakeholder requirementsD21 will be a report on the feedback received during consultations with the endusersstakeholders within Task 21
Interim report on diss., comm. and standardizationD84 will include all dissemination communication and standardization activities that have been undertaken during the first two 2 years of the project and those still planned
Technical vulnerability and impact assessment module - initial versionThis deliverable is one of the outputs of Task 36 and consists of a tool to perform technical vulnerability and impact assessment of cyber incidents and threats on the complex ICT infrastructures
Vision scenarios and use cases definitionThis deliverable will report on the activities of Task T23 and will elaborate on the SECANT pilot use cases
Trusted accountability module specificationThis deliverable will document the specification of the TAM and relevant data models and interfaces
Pilot evaluation framework and measures specificationsThis deliverable will describe the planning of interfaces and collaborations of the applications scenarios envisaged in the demonstrators, the SECANT technologies, and their validation in the testing environment specifications together with evaluation measures and industrial benchmarks (KPIs). These reports will include the outcomes of the evaluation (in terms of consistency, correctness, completeness) for the SECANT technologies and the benefits they provide in different cases, as well as recommendations to the research activities of the project following the evaluation process. The intermediate versions will feed the R&D work packages, while the final version will act as a “Best practices & Lessons Learned” report.
Interoperability layerThis deliverable will present the data models from the legacy systems of medical organizations and the sequence UML diagrams as part of the activities conducted within Task T3.1.
Secure sharing APIs for the ICT ecosystemThis deliverable will document the APIs that will be developed for the integration with the complex ICT ecosystems, while supporting diversity of data sources and the need for secure sharing.
SECANT dashboard - initial versionA prototype version of the SECANT dashboard
Digital identity management module - initial versionD45 will be a report and prototype of SECANTs DIM module with all the standards roles and flows defined for a Decentralized Identity in the complex ICT ecosystems
Final report on diss., comm. and standardizationD8.5 will document all dissemination, communication and standardization activities that have been undertaken, during the second half of the project duration. It will also summarize the most important dissemination, communication and standardization achievements of SECANT during the project lifetime.
Taxonomy for healthcare-related attacks and techniques for dynamic taxonomies generation - final versionD3.5 will describe the generated taxonomies for medical-related attacks as well as the techniques for the dynamic adaptation of the taxonomies based on the collected threat intelligence; it corresponds to task T3.3.
Human vulnerability assessment module - initial versionThis deliverable is one of the outputs of Task 35 and consists of a tool to perform SDVAs on the complex ICT infrastructures
The SECANT website will be launched at the start of the project The website will provide detailed information about the project objectives and activities The website will have two sections public and private The public part will be open to the general public and will be viewable by anyone with access to the Internet The private part will be regularlyupdated to provide latest project activities and overall progress and will be accessible only to consortium members
Publikacje
Autorzy:
Dimitris Kavallieros, Arnolnt Spyros
Opublikowane w:
Security Informatics and Law Enforcement, 2024
Wydawca:
Springer Nature Switzerland
DOI:
10.1007/978-3-031-62083-6
Autorzy:
S. Nifakos; M. Caballero; D. Kavallieros; A. Spyros; A. Tavernarakis; A. Tziouvaras; S. Bonacina; K. Chandrarmouli; M. Coroiu; L. Chen; T. Dounia; I. Giannoulakis; N. Gligoric; E. Kafetzakis; T. Kasig; V. Koumaras; T. Krousarlis; K. Lapidaki; A. Markakis; S. Marin; M. Manulis; S. Menesidou; L. Meng; S. Mhiri; M. Nati; K. Ntafloukas; D. Oniga; D. Papamartzivanos; S. Papastergiou; K. Sanchez; C. S
Opublikowane w:
2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, Strona(/y) 104-111
Wydawca:
IEEE
DOI:
10.1109/csr54599.2022.9850319
Autorzy:
Long Meng, Liqun Chen
Opublikowane w:
Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Strona(/y) 3-24
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-031-17140-6_1
Autorzy:
Saber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio
Opublikowane w:
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Strona(/y) 1-11
Wydawca:
ACM
DOI:
10.1145/3664476.3670874
Autorzy:
Long Meng
Opublikowane w:
ACM CCS 2024, 2024
Wydawca:
N/A
Autorzy:
Natalia de los Ángeles Sánchez Patiño; Saber Mhiri; Nil Ortiz; Albert Calvo;Santiago Escuder Folch; Josep Escrig
Opublikowane w:
4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics at ACM SIGKDD Conference 2024, 2024
Wydawca:
N/A
Autorzy:
Long Meng; Liqun Chen;Yangguang Tian; Mark Manulis; Suhui Liu
Opublikowane w:
USENIX Security Symposium 2024, 2024
Wydawca:
N/A
Autorzy:
Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian
Opublikowane w:
Lecture Notes in Computer Science, Information Security Practice and Experience, 2023, Strona(/y) 419-439
Wydawca:
Springer Nature Singapore
DOI:
10.1007/978-981-99-7032-2_25
Autorzy:
Athanasios Tziouvaras; Arnolnt Spyros; Dimitrios Kavallieros; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris
Opublikowane w:
Journal of Information Security and Applications (JISA), 2024
Wydawca:
Journal of Information Security and Applications (JISA)
Autorzy:
Arnolnt Spyros. Anna Kougioumtzidou, Aggelos Papoutsis, Eleni Darra, Dimitrios Kavallieros, Athanasios Tziouvaras, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
Opublikowane w:
Knowledge and Information Systems, 2024
Wydawca:
Springer
Autorzy:
Sokratis Nifakos;Krishna Chandramouli;Natalia Stathakarou
Opublikowane w:
Elsevier: Computers and Security, 2024
Wydawca:
Springer
Wyszukiwanie danych OpenAIRE...
Podczas wyszukiwania danych OpenAIRE wystąpił błąd
Brak wyników