Skip to main content
European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis

Rezultaty

CS-AWARE technical documentation and training material

This deliverable must be ready for the pilot, but may be enhanced during and after the pilots. Documentation will primarily be in electronic searchable form, and training material may comprise of different media types depending on the needs of the end-users. (written, video, computer animation and simulation exercises.)

Guidelines and procedures for system and dependency analysis in the context of local public administrations [

This deliverable contains the guidelines and procedures for system and dependency analysis in local public administrations that are defined in T2.4. This deliverable will be the basis for dissemination activities to relevant regulatory and standardisation bodies.

System and dependency analysis (third iteration) – Pilot scenario specification and self-healing strategies

This deliverable contains the final results of the system and dependency analysis based on the third iteration of general requirements analysis of T2.1 and pilot specific analysis of T2.2. This deliverable forms the final environment for tool deployment and also contains the results for defining self-healing strategies within the pilot scenarios.

Design CS-AWARE common cloud-based software architecture and API specification

This includes visualisations of the overall final CS-AWARE architecture and list of APIs available with the necessary description and examples of usage.

Commercial actions report 3

This deliverable will document the latest developments regarding commercial actions taken.

Pilot evaluation report

This deliverable will contain a detailed report of the results obtained from the pilot case studies carried out within this project, including an evaluation of the practical relevance of and end user experiences with the cybersecurity mechanisms provided by the CS-AWARE solution (cybersecurity situational awareness, cybersecurity information sharing and self-healing).

System and dependency analysis (first iteration) – Cybersecurity requirements for local public administrations

This deliverable contains the first iteration of analysis results, with the purpose of defining the cybersecurity requirements for local public administrations. This deliverable is based on the first iterations of general requirements analysis of T2.1 and pilot specific analysis of T2.2. This deliverable is a direct input for T2.3.

CS-AWARE solution validation and testing report

Deliverable is based on T 4.4 and contains the validation and testing results of the CS-AWARE system before its final deployment.

Commercial actions report 2

This deliverable will document the latest developments regarding commercial actions taken.

Exploitation, dissemination and commercialisation report 3

This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.

Pilot deployment report

This deliverable will contain a detailed report of the deployment of the CS-AWARE solution within the environments provided by the local public administrations that are part of this project.

Exploitation, dissemination and commercialisation report 2

This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.

Commercial actions report 1

This deliverable will document the latest developments regarding commercial actions taken.

Exploitation, dissemination and commercialisation report

This report will include all relevant information (both plan and performed activities) regarding the project exploitation, dissemination and commercialisation by the members of the consortium.

System and dependency analysis (second iteration) – Pilot scenario definition

This deliverable refines the results of D2.1 based on the second iteration of analysis of T2.1 and T2.2. The analysis results is the basis for the pilot scenario definitions and provide input to the pilot deployment preparations.

CS-AWARE framework

This deliverable specifies the CS-AWARE framework defined in T2.3. Based on the initial analysis results presented in D2.1.1, this deliverable specifies the interrelation between the CS-AWARE building blocks as well as the relevant internal and external information sources to collect and share cybersecurity data. The CS-AWARE framework will be a requirement for the technical software architecture tasked in WP3.

User story report

This deliverable will contain a composition of user stories relating to the cybersecurity experiences of the CS-AWARE project in the context of local public administrations. This could be in the form of a report or a book, edited by the WP-leaders, entitled: Narratives on cybersecurity: implementation and lessons of the CS-AWARE project.

System and dependency analysis tool support adaptation

This deliverable includes the implemented and tested adaptation of the GraphingWiki tool to meet the needs of the CS-AWARE solution.

Project’s public website, leaflet and poster

This deliverable essentially consists of the project’s website and any additional related material, such as leaflets, posters, etc. The website should be up by M3 and will be updated throughout the project duration.

Publikacje

Challenges in Cybersecurity and Privacy - the European Research Landscape

Autorzy: Thomas Schaberreiter Forschungsgruppe Multimedia Information Systems, Fakultät für Informatik, Universität Wien Juha Röning University of Oulu Gerald Quirchmayr Forschungsgruppe Multimedia Information Systems, Fakultät für Informatik, Universität Wien Veronika Kupfersberger Forschungsgruppe Multimedia Information Systems, Fakultät für Informatik, Universität Wien Chris Wills CARIS Resear
Opublikowane w: 2019, Strona(/y) 149-180
Wydawca: River Publishers Series in Security and Digital Forensics
DOI: 10.13052/rp-9788770220873

An Information Flow Model to Support NIS Mandated Reporting

Autorzy: Quirchmayr, Gerald Kupfersberger, Veronika Langner, Gregor Schaberreiter, Thomas
Opublikowane w: 12th Conference on Autonomous Systems, Numer 23-30 Oct 2019, 2019, Strona(/y) 137-143, ISBN 978-3-18-386410-2
Wydawca: online

Exploring Knowledge Graphs in an Interpretable Composite Approach for Text Entailment

Autorzy: Vivian S. Silva, André Freitas, Siegfried Handschuh
Opublikowane w: Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19). Honolulu, USA. 2019, Numer Annual, 2019
Wydawca: AAAI Press

Security-Driven Information Flow Modelling for Component Integration in Complex Environments

Autorzy: Veronika Kupfersberger, Thomas Schaberreiter, Gerald Quirchmayr
Opublikowane w: Proceedings of the 10th International Conference on Advances in Information Technology - IAIT 2018, 2018, Strona(/y) 1-8, ISBN 9781-450365680
Wydawca: ACM Press
DOI: 10.1145/3291280.3291797

Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach

Autorzy: Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr and Juha Röning
Opublikowane w: SECURWARE 2017 : The Eleventh International Conference on Emerging Security Information, Systems and Technologies, Numer Annual, 2017, Strona(/y) 99-105, ISBN 978-1-61208-582-1
Wydawca: IARIA XPS Press

Enhancing credibility of digital evidence through provenance-based incident response handling

Autorzy: Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr
Opublikowane w: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Strona(/y) 1-6, ISBN 9781450371643
Wydawca: ACM Press
DOI: 10.1145/3339252.3339275

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources

Autorzy: Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr
Opublikowane w: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Strona(/y) 1-10, ISBN 9781450371643
Wydawca: ACM Press
DOI: 10.1145/3339252.3342112

An Innovative Self-Healing Approach with STIX Data Utilisation

Autorzy: Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis
Opublikowane w: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020, Strona(/y) 645-651, ISBN 978-989-758-446-6
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009893306450651

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Autorzy: Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos
Opublikowane w: Computers, Numer 9/1, 2020, Strona(/y) 18, ISSN 2073-431X
Wydawca: Computers
DOI: 10.3390/computers9010018

Applying Soft Systems Methodology to Complex Problem Situations in Critical Infrastructures: The CS-AWARE Case Study

Autorzy: Veronika Kupfersberger, Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr and Juha Röning
Opublikowane w: International Journal On Advances in Security, Numer vol 11, no 3&4, year 2018, 2018, Strona(/y) 191 - 200, ISSN 1942-2636
Wydawca: IARIA Xpert Publishing Services

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników