Deliverables
Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions.
Cyber-physical threat/ risk scenarios and pre-assessment - finalEvent ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database
KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - firstTabular Report and database
Risk and resilience management process for cyber-physical threats of telecom CI - firstReport and digital specification
Countermeasures Draft DefinitionMain envisioned countermeasures definition and progress report about Decision Making Component
Description and definition of the Correlator intelligenceDissemination and Communication Activities - third
Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)
Ethical, Societal and Gender Equality Protocol - firstEthical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members
Methods for cyber-physical security management for telecom CI - firstInventory including compliance with standards, rigor, effectiveness and efficiency; Tabular Report and database
Interim Software Defined Security System and Decision Making ModuleInterim Report of T5.2 and T5.3 activities
Analysis on Scenario 2 - tests results (1st run)Report on the first step test with corrective actions and final analysis of the second test T85
Ethical, Societal and Gender Equality Protocol - secondEthical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members
Validation Assessment and Best Practices - firstValidation Assessment and Best Practices
Analysis on Scenario 3 - test results - finalReport on the first step test with corrective actions and final analysis of the second test T95
KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - finalTabular Report and database
Scenario 2 Test plan definitionPlan of the pilot, its requirements and design (T8.1, T8.2
Analysis on Scenario 3 - tests results (1st run)Report on the first step test with corrective actions and final analysis of the second test T95
Exploitation Activities - firstMarket strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)
Scenario 3 Test plan definitPlan of the pilot, its requirements and design (T9.1, T9.2)
HMI definition and Platform integrationHMI Def. & integration activities (T6.4, T6.5)
Scenario 3 - 2nd run integration and setupReport on the integration of the 3 scenario 3 main use cases and 1 impacted use case and end users test plans T93 T94
Active and Passive Sensor Deployment PlanRESISTO detection systems release
Ethical, Societal and Gender Equality Protocol - finalEthical Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues including AB members
Advisory Board Activities PlanReport on AB events
Real Time Response and Mitigation ResultsMain envisioned countermeasures definition and progress report about Decision Making Component (T5.1)
Complete propagation analysisDissemination and Communication Activities - second
Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)
Communication material - firstbrochure, leaflets and posters to spread main RESISTO information and its results (T10.2)
Table-top read teaming results of RESISTO architecture, scenarios and use casesTable-top read teaming results of RESISTO architecture, scenarios and use cases Tabular report
Adaptors, DSS and Risk predictorIntegr. Components Development (T6.2, T6.3, T6.4)
End user requirements for integrated cyber-physical risk and resilience management, platform and toolsReport and digital user requirements specifications
Scenario 2 - 2nd run integration and setupReport on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84
Scenario 3 - 1st run integration and setupReport on the integration of the 3 scenario 3 main use cases and impacted use case and end users test plans T93 T94
RESISTO platform and tools reference architecture - finalReport and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions
Cyber-physical threat/ risk scenarios and pre-assessment - firstEvent ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database
Techniques and Procedures for cyber/physical threats DetectionDissemination and Communication Activities - final
Dissemination Standardisation and communication activities initial Plans and annual plan updates and reports T102 T106
Damage/ Vulnerability models for physical and cyber threats of telecom CI - finalReport; software module specifications and algorithms
Exploitation Activities - secondMarket strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)
Dissemination and Communication Activities - firstDissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)
Scenario 2 - 1st run integration and setupReport on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84
Communication material - finalbrochure leaflets and posters to spread main RESISTO information and its results T102
Exploitation Activities - finalMarket strategy exploitation and sustainability IPRs initial plan annual plan updates and reports innovation management report and business plan refinements T103 T104 T105
Validation Assessment and Best Practices - finalReport on Final validation results T101
Risk and resilience management process for cyber-physical threats of telecom CI - finalReport and digital specification
Analysis on Scenario 2 - test results - finalReport on the first step test with corrective actions and final analysis of the second test T85
Exploitation Activities - thirdMarket strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)
Scenario 1 Test plan definitionPlan of the pilot, its requirements and design (T7.1, T7.2)
Analytical security assessment application to use cases and their refinementReport, on assessment of RESISTO solutions and refinement recommendations
Damage/ Vulnerability models for physical and cyber threats of telecom CI - firstReport; software module specifications and algorithms
Telecommunication system model and interfaces - firstReport and scalable, flexible and tailorable digital model as basis for simulations and parameterizations
Scenario 1 - 2nd run integration and setupReport on the integration of 1 scenario 7 main use cases at end users test plans T73 T74
Active and Passive Sensor Definitionanalysis RESISTO detection systems
Telecommunication system model and interfaces - finalReport and scalable, flexible and tailorable digital model as basis for simulations and parameterizations
Analysis on Scenario 1 - test results - finalReport on the first step test with corrective actions and final analysis of the second test T75
Interim Workflow Definition and Emergency Warning Communication FunctionInterim Report of T5.4 and T5.5
Methods for cyber-physical security management for telecom CI- finalInventory including compliance with standards, rigor, effectiveness and efficiency - Tabular Report and database
Scenario 1 - 1st run integration and setupReport on the integration of 1 scenario 7 main use cases at end users test plans T73 T74
Analysis on Scenario 1 - tests results (1st run)Report on the first step test with corrective actions and final analysis of the second test T75
Official web site, logo, including in its structure news, public documents download and member area (T10.2)
Publications
Author(s):
Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci
Published in:
2021 29th Mediterranean Conference on Control and Automation (MED), 2021, Page(s) 428-434, ISBN 978-1-6654-2258-1
Publisher:
IEEE
DOI:
10.1109/med51440.2021.9480182
Author(s):
Riccardo Colelli, Chiara Foglietta, Roberto Fusacchia, Stefano Panzieri and Federica Pascucci
Published in:
IEEE 19th International Conference on Industrial Informatics, 2021
Publisher:
IEEE
Author(s):
Maria Belesioti, Ioannis Chochliouros, Federico Frosali and Rodoula Makri
Published in:
European Conference on Networks and Communications 2018 - 5G and beyond (EuCNC 2018), 2018
Publisher:
IEEE
Author(s):
Maria Belesioti, Rodoula Makri, Mirjam Fehling-Kaschek, Marco Carli, Alexandros Kostopoulos, Ioannis P. Chochliouros, Alberto Neri, Federico Frosali
Published in:
2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019, Page(s) 212-218, ISBN 978-1-7281-0570-3
Publisher:
IEEE
DOI:
10.1109/dcoss.2019.00056
Author(s):
Mirjam Fehling-Kaschek, Katja Faist,, Natalie Miller, Jörg Finger, Ivo Häring, Marco Carli, Federica Battisti
Published in:
Proceedings of the 29th European Safety and Reliability Conference (ESREL), 2019, Page(s) 1312-1319, ISBN 978-981-11-2724-3
Publisher:
Research Publishing Services
DOI:
10.3850/978-981-11-2724-3_0242-cd
Author(s):
Mirjam Fehling-Kaschek, Natalie Miller, Gael Haab, Katja Faist, Alexander Stolz, Ivo Häring, Alberto Neri, Giuseppe Celozzi, Jose Sanchez, Javier Valera, Rodoula Makri
Published in:
30th European Safety and Reliability Conference and 15th Probabilistic Safety Assessment and Management Conference, 2020
Publisher:
SREL2020-PSAM15 Organizers
Author(s):
Sara Baldoni, Giuseppe Celozzi, Alessandro Neri, Marco Carli, Federica Battisti
Published in:
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers, Issue 12618, 2021, Page(s) 67-76, ISBN 978-3-030-69780-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-69781-5_5
Author(s):
Chiara Foglietta, Stefano Panzieri
Published in:
Issues on Risk Analysis for Critical Infrastructure Protection, 2021, ISBN 978-1-83962-620-3
Publisher:
IntechOpen
DOI:
10.5772/intechopen.94506
Author(s):
Alberto Neri, Alessandro Neri
Published in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher:
Now Publisher
DOI:
10.1561/9781680836875
Author(s):
Federica Battisti, Marco Carli, Federica Pascucci, Mirjam Fehling-Kaschek, Rodoula Makri, Maria Belesioti, Ioannis Chochliouros, Ioan Constatin, Xiao-Si Wang
Published in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher:
Now Publisher
Author(s):
Luca Baldini, Marco Carli, Giuseppe Celozzi, Federico Colangelo, Alessandro Neri, Cosimo Zotti
Published in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher:
Now Publisher
Author(s):
N. Miller, M. Fehling-Kaschek, G. Haab, K. Faist, A. Stolz, I. Håring
Published in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher:
Now Publisher
Author(s):
Chiara Foglietta, Stefano Panzieri
Published in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher:
Now Publisher
Author(s):
Rodoula Makri, Panos Karaivazoglou, Alexandros Kyritsis, Michael Skitsas, Nikolaos Koutras, Javier Valera, Jose Manuel Sanchez
Published in:
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher:
Now Publisher
Author(s):
Ivo Häring, Mirjam Fehling-Kaschek, Natalie Miller, Katja Faist, Sebastian Ganter, Kushal Srivastava, Aishvarya Kumar Jain, Georg Fischer, Kai Fischer, Jörg Finger, Alexander Stolz, Tobias Leismann, Stefan Hiermaier, Marco Carli, Federica Battisti, Rodoula Makri, Giuseppe Celozzi, Maria Belesioti, Evangelos Sfakianakis, Evita Agrafioti, Anastasia Chalkidou, George Papadakis, Clemente Fuggini, Fa
Published in:
Environment Systems and Decisions, Issue 41/2, 2021, Page(s) 286-329, ISSN 2194-5403
Publisher:
Springer Science + Business Media
DOI:
10.1007/s10669-021-09811-5
Author(s):
Sara Baldoni, Federica Battisti, Marco Carli, Federica Pascucci
Published in:
IEEE Access, Issue 9, 2021, Page(s) 41787-41798, ISSN 2169-3536
Publisher:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2021.3065228
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available