Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

artificial Intelligence threat Reporting and Incident response System

CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.

Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .

Livrables

Report on policy recommendations

D8.7 will report on the progress and work of Task 8.4 on standardisation and policy recommendations. It will provide all the inputs collected throughout the project on standardisation including a potential gap analysis. It will also summarise the main policy recommendations coming from the project, based on elicitation with key stakeholders and the expert group setup for this purpose. It's linked to T8.4.

Report on connection with stakeholders

D8.8 will report on the progress and work of Task 8.5 on liaison with relevant stakeholders. It will summarise all the activities undertaken during the lifetime of the project as regards networking, liaising and community building. This will include exchange of information with stakeholders, workshops attended and organised, as well as a report on the launch event and the final exploitation workshop. It's linked to T8.5.

Interim report on dissemination, communication, standardisation and exploitation

D8.4 will include all dissemination, communication and standardisation activities that have been undertaken, during the first two (2) years of the project, and those still planned. It's linked to T8.1, T8.2, T8.3 and T8.4.

User and technical requirements

A report on the user technical requirements that the IRIS platform will have to satisfy as identified in T22 Its linked to T22

IRIS evaluation and impact assessment

This document will describe social acceptance strategy of the IRIS technology and provide results from the social acceptance assessment of the proposed solution. It's linked to T2.6.

IRIS cyber range platform

This deliverable will present the IRIS cyber range environment platform architecture and deployment. It's linked to T5.3.

Final report on dissemination, communication, standardisation and exploitation

D8.5 will document all dissemination, communication and standardisation activities that have been undertaken, during the second half of the project duration. It will also summarise the most important dissemination, communication and standardisation achievements of IRIS during the project lifetime. It's linked to T8.1.

IRIS lab pods for CERTs/CSIRTs

A report and prototype of the IRIS lab pods for CERTs/CSIRTs. It's linked to T5.3.

Ethics and data protection requirements specification

This deliverable will analyze ethical and legal risks by which partners will derive protection measures and constraints to be implemented within the IRIS platform Its linked to T23

Plans for dissemination, communication, and exploitation

A coordinated dissemination and communication plan will be defined in D82 and will be maintainedupdated throughout the project D82 will describe how IRIS will establish and follow highly effective dissemination and communication activities to promote the project It will also record how the results are being exploited Its linked to T81

APIs and data models for the integration of smart city's infrastructure with the IRIS platform

A report on the results of the development of API and data models for the integration of smart city’s infrastructure with the IRIS platform will be presented. It's linked to T6.1.

Vision scenarios and use cases definition

This deliverable will report on the activities of Task T21 and will elaborate on the IRIS pilot use cases Its linked to T21

Initial report on dissemination, communication, standardisation and exploitation

D83 will include all dissemination and communication activities that have been undertaken during the first twelve 12 months of the project and those still planned The deliverable will also include the analysis of the standardization landscape and policies relevant for IRIS Its linked to T81 T82 T83 and T84

Human factors for co-design methodology

This deliverable will describe the IRIS methodology for human factors identification for codesign of effective crossborder threat intelligence sharing Its linked to T24

IRIS-enhanced MeliCERTes platform

A demonstrator of the IRIS-enhanced MeliCERTes platform providing advanced dashboard, extended knowledge base, diverse communities of users, and customized views and access to shared information. It's linked to T4.6

IRIS scenario and asset catalogue

This deliverable will report on IRIS’s collection of training scenarios and their assets. It's linked to T5.2.

Project website

The IRIS website will be launched at the start of the project Apart from the public website accessible from all internet users a private part will also exist accessible only to consortium members Its linked to T81

Publications

FLVoogd: Robust And Privacy Preserving Federated Learning

Auteurs: Tian Yuhang, Wang Rui, Qiao Yanqi, Panaousis Emmanouil, Liang Kaitai
Publié dans: ACLM 2022, 2022
Éditeur: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.8198995

Threat intelligence using Digital Twin honeypots in Cybersecurity

Auteurs: Maria Nintsiou, Elisavet Grigoriou, Paris Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis Sarigiannidis
Publié dans: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023, Page(s) 530-537
Éditeur: IEEE
DOI: 10.1109/csr57506.2023.10224997

ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms

Auteurs: Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst
Publié dans: 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024, Page(s) 1-6
Éditeur: IEEE
DOI: 10.23919/date58400.2024.10546519

VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

Auteurs: Lambregts, S., Chen, H., Ning, J., Liang, K.
Publié dans: ESORICS 2022, 2022
Éditeur: Springer
DOI: 10.1007/978-3-031-17140-6_32

Fine-Grained Coverage-Based Fuzzing

Auteurs: Bernard Nongpoh, Marwan Nour, Michael Marcozzi, S ébastien Bardin
Publié dans: The Network and Distributed System Security (NDSS) Symposium 2022 (NDSS 2022), 2022
Éditeur: NDSS Symposium 2022
DOI: 10.14722/fuzzing.2022.23007

DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay

Auteurs: Yubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin
Publié dans: ESORICS 2022 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, 2022, Page(s) 86–104
Éditeur: Springer
DOI: 10.1007/978-3-031-17146-8_5

No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent

Auteurs: Chen, H., Fu, S., Liang, K.
Publié dans: ESORICS 2022, 2022
Éditeur: Springer
DOI: 10.1007/978-3-031-17140-6_19

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

Auteurs: Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek
Publié dans: ACSAC 2022, 2022
Éditeur: ACM
DOI: 10.5281/zenodo.8344605

SiHoneypot: A Digital Twin-Based Honeypot for Autonomous Vehicles

Auteurs: Athanasios Liatifis, Charis Eleftheriadis, Zisis Mpatzos, Ioannis Nanos, Thomas Lagkas, Sotirios Goudos, Vasileios Argyriou, Konstantinos E. Psannis, Ioannis D. Moscholios, Panagiotis Sarigiannidis
Publié dans: 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2024, Page(s) 1-4
Éditeur: IEEE
DOI: 10.1109/mocast61810.2024.10615785

A New Design for Self-Encryption

Auteurs: Roland Kromes, João Rodrigues, Duarte Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang
Publié dans: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Numéro 38, 2024, Page(s) 1645-1652
Éditeur: IEEE
DOI: 10.1109/trustcom60117.2023.00224

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving

Auteurs: Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Olaf Maennel, Ehsan Malayjerdi
Publié dans: Proceedings Inaugural International Symposium on Vehicle Security & Privacy, 2023
Éditeur: Internet Society
DOI: 10.14722/vehiclesec.2023.23086

WordMarkov: A New Password Probability Model of Semantics

Auteurs: Jiahong Xie; Rong Zhu; Haibo Cheng; Ping Wang; Kaitai Liang
Publié dans: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Page(s) 3034-3038
Éditeur: IEEE
DOI: 10.1109/ICASSP43922.2022.9746203

IRIS Advanced Threat Intelligence Orchestrator- A way to manage cyber security challenges of IoT ecosystems in Smart Cities

Auteurs: Bilali, VG., Kosyvas, D., Theodoropoulos, T., Ouzounoglou, E., Karagiannidis, L., Amditis, A.
Publié dans: GIoTS 2022, Lecture Notes in Computer Science, 2022
Éditeur: Springer
DOI: 10.1007/978-3-031-20936-9_25

IRIS User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability

Auteurs: João Rodrigues, Gonçalo Cadete, Duarte NAscimento, Roland Kromes, Carmela Occhipinti, Lorena Volpini
Publié dans: RISE 2023, 2024
Éditeur: RISE-SD
DOI: 10.5281/zenodo.13121554

PASSTRANS: AN IMPROVED PASSWORD REUSE MODEL BASED ON TRANSFORMER

Auteurs: Xiaoxi He; Haibo Cheng; Jiahong Xie; Ping Wang; Kaitai Liang
Publié dans: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Page(s) 3044-3048
Éditeur: IEEE
DOI: 10.1109/ICASSP43922.2022.9746731

A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments

Auteurs: Vasiliki Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis
Publié dans: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Page(s) 1-8
Éditeur: ACM
DOI: 10.1145/3664476.3670939

Accelerating Blockchain Applications on IoT Architecture Models—Solutions and Drawbacks

Auteurs: Roland Kromes, François Verdier
Publié dans: Distributed Ledger Technologies: Research and Practice, Numéro 3, 2024, Page(s) 1-24, ISSN 2769-6480
Éditeur: ACM Journal
DOI: 10.1145/3626200

Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain

Auteurs: Roland Kromes, Tianyu Li, Maxime Bouillon, Talha Güler, Victor van der Hulst, Zekeriya Erkin
Publié dans: Sensors, Numéro 24, 2024, Page(s) 986, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s24030986

Toward the Conception of a Multichain to Meet Users' Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry

Auteurs: Marta Ballatore, Luc Gerrits, Roland Kromes, Lise Arena, François Verdier
Publié dans: IEEE Transactions on Engineering Management, Numéro 71, 2024, Page(s) 9994-10008, ISSN 0018-9391
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2023.3317208

Fine-Grained Coverage-Based Fuzzing

Auteurs: WEI-CHENG WU; BERNARD NONGPOH; MARWAN NOUR; MICHAËL MARCOZZI; SÉBASTIEN BARDIN; CHRISTOPHE HAUSER
Publié dans: ACM Transactions on Software Engineering and Methodology, 2023, ISSN 1049-331X
Éditeur: Association for Computing Machinary, Inc.
DOI: 10.1145/3587158

User Behavior Analysis for Malware Detection

Auteurs: Valentina Dumitrasc, René Serral-Gracià
Publié dans: Lecture Notes in Computer Science, Computer Security. ESORICS 2023 International Workshops, 2024, Page(s) 92-110
Éditeur: Springer Nature Switzerland
DOI: 10.1007/978-3-031-54129-2_6

Combining ID’s, Attributes, and Policies in Hyperledger Fabric

Auteurs: Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Publié dans: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2023, Page(s) 32-48
Éditeur: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_3

ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract

Auteurs: Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Publié dans: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2024, Page(s) 3-18
Éditeur: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_1

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

Auteurs: Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang
Publié dans: Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Page(s) 105-125
Éditeur: Springer Nature Switzerland
DOI: 10.1007/978-3-031-17146-8_6

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible