Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

fAcilitating Public & Private secuRity operAtors to mitigate terrorIsm Scenarios against soft targEts

Deliverables

Publications

Securing the smart city: patterns of public acceptance for integrated technological solutions

Author(s): Petra Saskia Bayerl; Luke Bates; Babak Akhgar
Published in: IEEE International Smart Cities Conference (ISC2), 2023
Publisher: IEEE
DOI: 10.1109/isc257844.2023.10293633

M4D-MKLab/ITI-CERTH Participation in TREC Deep Learning Track 2022

Author(s): Koufakis, Alexandros; Tsikrika, Theodora; Vrochidis, Stefanos; Kompatsiaris, Ioannis
Published in: Proceedings of the Text REtrieval Conference (TREC) 2022 Workshop, Gaithersburg, MD, USA, Nov. 2022., Issue 1, 2023
Publisher: National Institute of Standards and Technology (NIST)
DOI: 10.5281/zenodo.7788261

Diagnosis Model for Detection of e-threats Against Soft-Targets

Author(s): Sónia M. A. Morgado, Margarida Carvalho & Sérgio Felgueiras
Published in: Information Systems and Technologies. WorldCIST 2023., Issue Vol 200, 2024, Page(s) P249-262, ISBN 978-3-031-45645-9
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-45645-9_24

Impact Estimation of Emergency Events Using Social Media Streams

Author(s): Giacomo Blanco; Edoardo Arnaudo; Dario Salza; Claudio Rossi
Published in: 2022 IEEE 7th Forum on Research and Technologies for Society and Industry Innovation (RTSI), Issue 1, 2022
Publisher: IEEE
DOI: 10.5281/zenodo.7016653

Revealing terrorist threats in social media

Author(s): M. San Biagio, M. Cipolla, E. La Mattina, V. Morreale
Published in: ICISNA 2023, 2023
Publisher: ICISNA 2023

A new SOCMINT framework for Threat Intelligence Identification

Author(s): M. San Biagio, R.Acquaviva, V. Mazzonello, E. La Mattina, V. Morreale
Published in: CSCI-ISCW 2021, 2021
Publisher: CSCI-ISCW 2021
DOI: 10.1109/csci54926.2021.00180

Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection

Author(s): Marek Pawlicki; Rafał Kozik; Michał Choraś
Published in: International Joint Conference on Neural Networks (IJCNN), Issue 18-23 June 2023, 2023, ISBN 978-1-6654-8868-6
Publisher: IEEE
DOI: 10.1109/ijcnn54540.2023.10191496

Modern NetFlow network dataset with labeled attacks and detection methods

Author(s): Mikołaj Komisarek, Marek Pawlicki, Tomi Simic, David Kavcnik, Rafał Kozik ,
Published in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, ISBN 979-8-4007-0772-8
Publisher: Association for Computing Machinery
DOI: 10.1145/3600160.3605094

A novel, refined dataset for real-time Network Intrusion Detection

Author(s): Mikołaj Komisarek; Marek Pawlicki; Maria-Elena Mihailescu; Darius Mihai; Mihai Carabas; Rafał Kozik; Michał Choraś
Published in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Issue 1, 2022
Publisher: Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22). Association for Computing Machinery
DOI: 10.1145/3538969.3544486

A ’glocal’ approach for real-time emergency event detection in Twitter

Author(s): Dario Salza Edoardo Arnaudo Giacomo Blanco Claudio Rossi
Published in: ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management, 2022, Page(s) 570-583, ISBN 978-82-8427-099-9
Publisher: Proceedings of the 19th ISCRAM Conference – Tarbes, France 2022

APPRAISE project - Building a security system for public spaces

Author(s): Jarosław Przyjemczak, Nina Czyżewska
Published in: Terrorism – studies, analyses, prevention, Issue 5, 2024, ISSN 2720-4383
Publisher: Terrorism – studies, analyses, prevention
DOI: 10.4467/27204383ter.24.015.19403

Towards Zero-Shot Flow-Based Cyber-Security Anomaly Detection Framework

Author(s): Mikołaj Komisarek; Rafał Kozik; Marek Pawlicki; Michał Choraś
Published in: Applied Sciences; Volume 12; Issue 19; Pages: 9636, Issue 1, 2022, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app12199636

SoK: cross-border criminal investigations and digital evidence

Author(s): Fran Casino; Claudia Pina; Pablo López-Aguilar; Edgar Batista; Agusti Solanas; Constantinos Patsakis
Published in: Journal of Cybersecurity (Oxford), Issue Volume 8, Issue 1,, 2022, ISSN 2057-2085
Publisher: Oxford University Press
DOI: 10.1093/cybsec/tyac014

Zero-Shot Topic Labeling for Hazard Classification

Author(s): Andrea Rondinelli, Lorenzo Bongiovanni, Valerio Basile
Published in: Information, Volume 13, Issue 10 (October 2022) – 65 articles, 2022, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info13100444

What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics

Author(s): Aleksandra Pawlicka; Marek Pawlicki; Rafał Kozik; Michał Choraś
Published in: IEEE Access, Issue Volume 11, 2023, Page(s) 58796 - 58807, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2023.3283791

Automatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking

Author(s): Javier Callea, Itziar Sagastiberri, Mikel Aramburu, Santiago Cerezo, Jorge García
Published in: Advances in Science, Technology and Engineering Systems Journal, Issue Volume 7, Issue 5, 2022, Page(s) 113 -128, ISSN 2415-6698
Publisher: ASTES Journal
DOI: 10.25046/aj070514

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available