Skip to main content
European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

artificial Intelligence threat Reporting and Incident response System

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Report on policy recommendations

D8.7 will report on the progress and work of Task 8.4 on standardisation and policy recommendations. It will provide all the inputs collected throughout the project on standardisation including a potential gap analysis. It will also summarise the main policy recommendations coming from the project, based on elicitation with key stakeholders and the expert group setup for this purpose. It's linked to T8.4.

Report on connection with stakeholders

D8.8 will report on the progress and work of Task 8.5 on liaison with relevant stakeholders. It will summarise all the activities undertaken during the lifetime of the project as regards networking, liaising and community building. This will include exchange of information with stakeholders, workshops attended and organised, as well as a report on the launch event and the final exploitation workshop. It's linked to T8.5.

Interim report on dissemination, communication, standardisation and exploitation

D8.4 will include all dissemination, communication and standardisation activities that have been undertaken, during the first two (2) years of the project, and those still planned. It's linked to T8.1, T8.2, T8.3 and T8.4.

User and technical requirements

A report on the user technical requirements that the IRIS platform will have to satisfy as identified in T22 Its linked to T22

IRIS evaluation and impact assessment

This document will describe social acceptance strategy of the IRIS technology and provide results from the social acceptance assessment of the proposed solution. It's linked to T2.6.

IRIS cyber range platform

This deliverable will present the IRIS cyber range environment platform architecture and deployment. It's linked to T5.3.

Final report on dissemination, communication, standardisation and exploitation

D8.5 will document all dissemination, communication and standardisation activities that have been undertaken, during the second half of the project duration. It will also summarise the most important dissemination, communication and standardisation achievements of IRIS during the project lifetime. It's linked to T8.1.

IRIS lab pods for CERTs/CSIRTs

A report and prototype of the IRIS lab pods for CERTs/CSIRTs. It's linked to T5.3.

Ethics and data protection requirements specification

This deliverable will analyze ethical and legal risks by which partners will derive protection measures and constraints to be implemented within the IRIS platform Its linked to T23

Plans for dissemination, communication, and exploitation

A coordinated dissemination and communication plan will be defined in D82 and will be maintainedupdated throughout the project D82 will describe how IRIS will establish and follow highly effective dissemination and communication activities to promote the project It will also record how the results are being exploited Its linked to T81

APIs and data models for the integration of smart city's infrastructure with the IRIS platform

A report on the results of the development of API and data models for the integration of smart city’s infrastructure with the IRIS platform will be presented. It's linked to T6.1.

Vision scenarios and use cases definition

This deliverable will report on the activities of Task T21 and will elaborate on the IRIS pilot use cases Its linked to T21

Initial report on dissemination, communication, standardisation and exploitation

D83 will include all dissemination and communication activities that have been undertaken during the first twelve 12 months of the project and those still planned The deliverable will also include the analysis of the standardization landscape and policies relevant for IRIS Its linked to T81 T82 T83 and T84

Human factors for co-design methodology

This deliverable will describe the IRIS methodology for human factors identification for codesign of effective crossborder threat intelligence sharing Its linked to T24

IRIS-enhanced MeliCERTes platform

A demonstrator of the IRIS-enhanced MeliCERTes platform providing advanced dashboard, extended knowledge base, diverse communities of users, and customized views and access to shared information. It's linked to T4.6

IRIS scenario and asset catalogue

This deliverable will report on IRIS’s collection of training scenarios and their assets. It's linked to T5.2.

Project website

The IRIS website will be launched at the start of the project Apart from the public website accessible from all internet users a private part will also exist accessible only to consortium members Its linked to T81

Publicaciones

FLVoogd: Robust And Privacy Preserving Federated Learning

Autores: Tian Yuhang, Wang Rui, Qiao Yanqi, Panaousis Emmanouil, Liang Kaitai
Publicado en: ACLM 2022, 2022
Editor: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.8198995

Threat intelligence using Digital Twin honeypots in Cybersecurity

Autores: Maria Nintsiou, Elisavet Grigoriou, Paris Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis Sarigiannidis
Publicado en: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023, Página(s) 530-537
Editor: IEEE
DOI: 10.1109/csr57506.2023.10224997

ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms

Autores: Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst
Publicado en: 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024, Página(s) 1-6
Editor: IEEE
DOI: 10.23919/date58400.2024.10546519

VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

Autores: Lambregts, S., Chen, H., Ning, J., Liang, K.
Publicado en: ESORICS 2022, 2022
Editor: Springer
DOI: 10.1007/978-3-031-17140-6_32

Fine-Grained Coverage-Based Fuzzing

Autores: Bernard Nongpoh, Marwan Nour, Michael Marcozzi, S ébastien Bardin
Publicado en: The Network and Distributed System Security (NDSS) Symposium 2022 (NDSS 2022), 2022
Editor: NDSS Symposium 2022
DOI: 10.14722/fuzzing.2022.23007

DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay

Autores: Yubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin
Publicado en: ESORICS 2022 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, 2022, Página(s) 86–104
Editor: Springer
DOI: 10.1007/978-3-031-17146-8_5

No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent

Autores: Chen, H., Fu, S., Liang, K.
Publicado en: ESORICS 2022, 2022
Editor: Springer
DOI: 10.1007/978-3-031-17140-6_19

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

Autores: Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek
Publicado en: ACSAC 2022, 2022
Editor: ACM
DOI: 10.5281/zenodo.8344605

SiHoneypot: A Digital Twin-Based Honeypot for Autonomous Vehicles

Autores: Athanasios Liatifis, Charis Eleftheriadis, Zisis Mpatzos, Ioannis Nanos, Thomas Lagkas, Sotirios Goudos, Vasileios Argyriou, Konstantinos E. Psannis, Ioannis D. Moscholios, Panagiotis Sarigiannidis
Publicado en: 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2024, Página(s) 1-4
Editor: IEEE
DOI: 10.1109/mocast61810.2024.10615785

A New Design for Self-Encryption

Autores: Roland Kromes, João Rodrigues, Duarte Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang
Publicado en: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Edición 38, 2024, Página(s) 1645-1652
Editor: IEEE
DOI: 10.1109/trustcom60117.2023.00224

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving

Autores: Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Olaf Maennel, Ehsan Malayjerdi
Publicado en: Proceedings Inaugural International Symposium on Vehicle Security & Privacy, 2023
Editor: Internet Society
DOI: 10.14722/vehiclesec.2023.23086

WordMarkov: A New Password Probability Model of Semantics

Autores: Jiahong Xie; Rong Zhu; Haibo Cheng; Ping Wang; Kaitai Liang
Publicado en: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Página(s) 3034-3038
Editor: IEEE
DOI: 10.1109/ICASSP43922.2022.9746203

IRIS Advanced Threat Intelligence Orchestrator- A way to manage cyber security challenges of IoT ecosystems in Smart Cities

Autores: Bilali, VG., Kosyvas, D., Theodoropoulos, T., Ouzounoglou, E., Karagiannidis, L., Amditis, A.
Publicado en: GIoTS 2022, Lecture Notes in Computer Science, 2022
Editor: Springer
DOI: 10.1007/978-3-031-20936-9_25

IRIS User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability

Autores: João Rodrigues, Gonçalo Cadete, Duarte NAscimento, Roland Kromes, Carmela Occhipinti, Lorena Volpini
Publicado en: RISE 2023, 2024
Editor: RISE-SD
DOI: 10.5281/zenodo.13121554

PASSTRANS: AN IMPROVED PASSWORD REUSE MODEL BASED ON TRANSFORMER

Autores: Xiaoxi He; Haibo Cheng; Jiahong Xie; Ping Wang; Kaitai Liang
Publicado en: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Página(s) 3044-3048
Editor: IEEE
DOI: 10.1109/ICASSP43922.2022.9746731

A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments

Autores: Vasiliki Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis
Publicado en: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Página(s) 1-8
Editor: ACM
DOI: 10.1145/3664476.3670939

Accelerating Blockchain Applications on IoT Architecture Models—Solutions and Drawbacks

Autores: Roland Kromes, François Verdier
Publicado en: Distributed Ledger Technologies: Research and Practice, Edición 3, 2024, Página(s) 1-24, ISSN 2769-6480
Editor: ACM Journal
DOI: 10.1145/3626200

Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain

Autores: Roland Kromes, Tianyu Li, Maxime Bouillon, Talha Güler, Victor van der Hulst, Zekeriya Erkin
Publicado en: Sensors, Edición 24, 2024, Página(s) 986, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s24030986

Toward the Conception of a Multichain to Meet Users' Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry

Autores: Marta Ballatore, Luc Gerrits, Roland Kromes, Lise Arena, François Verdier
Publicado en: IEEE Transactions on Engineering Management, Edición 71, 2024, Página(s) 9994-10008, ISSN 0018-9391
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2023.3317208

Fine-Grained Coverage-Based Fuzzing

Autores: WEI-CHENG WU; BERNARD NONGPOH; MARWAN NOUR; MICHAËL MARCOZZI; SÉBASTIEN BARDIN; CHRISTOPHE HAUSER
Publicado en: ACM Transactions on Software Engineering and Methodology, 2023, ISSN 1049-331X
Editor: Association for Computing Machinary, Inc.
DOI: 10.1145/3587158

User Behavior Analysis for Malware Detection

Autores: Valentina Dumitrasc, René Serral-Gracià
Publicado en: Lecture Notes in Computer Science, Computer Security. ESORICS 2023 International Workshops, 2024, Página(s) 92-110
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-54129-2_6

Combining ID’s, Attributes, and Policies in Hyperledger Fabric

Autores: Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Publicado en: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2023, Página(s) 32-48
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_3

ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract

Autores: Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Publicado en: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2024, Página(s) 3-18
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_1

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

Autores: Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang
Publicado en: Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Página(s) 105-125
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-17146-8_6

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles