Deliverables
The effectiveness of the technical results achieved in T6.1-5 is demonstrated by their application in a Smart Polygeneration Microgrid and in a Smart Energy Building It is supported by an evaluation document.
Demonstrators evaluationThis deliverable provides the demonstration of the three verticals described in T5.4. It is supported by an evaluation document.
Training evaluation pilotThis deliverable will contain recommendations from trainees toward improvements in the training that will take place at involved universities and professional training facilities in the form of hands-on training. Recommendations will be written down during pilot tests of the trainings, basing on thematic analysis of trainees experiences. Pilot evaluation will be done through in-depth interviews and focus groups.
Final results of the clustering, platforms, and ecosystems activitiesThis deliverable presents the results of all the WP8 tasks in M36.
Cybersecurity threat intelligence common data modelThis will be the design and specification for the data model agreed as common standard to be used for cybersecurity threat intelligence, as well practical implementation of ENISA proposed cyber-incidents data model.
Initial results of the clustering, platforms, and ecosystems activitiesThis deliverable presents the results of all the WP8 tasks in M12.
Intermediate results of the clustering, platforms, and ecosystems activitiesThis deliverable presents the results of all the WP8 tasks in M24.
Pilot of cyber training & exercise framework (Ct&eF)An infrastructure for technical realization of training activities at multiple consortium partners.
Visual analytics system for cybersecurity threat analysisThis will be a suitable visualization techniques and integrated Visual Analytics components based on available data and analysis models, as well as human computer interaction methods based on the Visual Analytics enabled visual interfaces.
First release of demonstrationThe effectiveness of the technical results achieved in T6.1-5 is demonstrated by their application in a Smart Polygeneration Microgrid and in a Smart Energy Building It is supported by an evaluation document.
In this report the SPARTA roadmap committee will document both its lessons learned during the roadmap creation process as well as a future assessment of ways to enhance the roadmap generation and maintenance process
Demonstrators specificationsThis deliverable provides the specifications of the demonstrators coming out of T54 They include contributions on integration mechanisms coming out of the three other tasks
From assessing to supporting the future CCNThis deliverable i reports how SPARTA governance have improved from the beginning and ii details the recommendations made for the future CCN
International and national cybersecurity certification initiatives - UpdatesUpdate of D111
Preparing a CCN pilot to become a sustainable CCNThis deliverable i reports how external recommendations have been implemented and ii explains how SPARTA has been prepared to be become a sustainable CCN
Updated SPARTA SRIA (roadmap v1)Release of an updated version of the SPARTA Roadmap.
Commercial deployment planThis deliverable is a report exploring ways to promote results from SPARTA for commercial deployment all project partners will beneficiate
Updated SPARTA SRIA (roadmap v2)Release of an updated version of the SPARTA Roadmap
Updated SPARTA SRIA (roadmap v3)Release of an updated version of the SPARTA Roadmap
Second internal ELSA audit and supervision reportD24 reports on the work and results from the ELSA audit and supervision done throughout the 2nd yearAs the public status of the ELSA audit deliverable might influence the replies given by partners during audits more detailed results CO will be made available to the EC upon request
Updated dissemination and communication plan and evaluation - v2This report provides is an update to D123
International and national cybersecurity certification initiativesThis deliverable will be a mapping of cybersecurity initiatives.
Sustainable exploitation documentsD105 is a set of promotion and sectoralfocused documentations aimed at supporting project results all project partners will beneficiate
Updated dissemination and communication plan and evaluation – v1This report provides is an update to D12.1.
Workplace integration evaluation reportThis deliverable evaluates the outcome of the cybersecurity skills framework and training evaluation pilot with both alumni and human resources departments of employment institutions It provides feedback on the appropriateness of the framework and training programs
Initial SPARTA SRIA (roadmap v0.1)Release of an initial version of the SPARTA Roadmap.
Pre-existing components identification documentationThis deliverable is a set of templates and assisting documentations ensuring an adequate common tracking of pre-existing resources used within the project; all project partners will beneficiate.
Lessons learned from internally assessing a CCN pilotThis deliverable (i) reports how SPARTA governance have been internally assessed and (ii) details the recommendations made.
Report on liaison with national cybersecurity authoritiesThis deliverable will report on the liaison activities with national cybersecurity authorities throughout SPARTA life
First internal ELSA audit and supervision reportD2.2 reports on the work and results from the ELSA audit and supervision done throughout the 1st year.
Security-by-design framework for the intelligent infrastructureThis deliverable aggregates contributions from T615 and describes the roadmap and specification of the five tasks describing the objectives of each team as well as the roadmap to achieve integration
Ethical, legal, and societal aspectsThis deliverable provides a documented list of relevant ethical, legal and societal aspects relevant in the context of large-scale cybersecurity research and innovation.
Final report on dissemination and communication and evaluation - v3This report provides is an update to D124
Bootstrapping a CCN pilotThis deliverable (i) reports about how governance, R&D&I, community and exploitation activities have been organized to launch SPARTA and (ii) discusses new findings and replicability the structures.
Cybersecurity evaluation facilitiesThis deliverable will report on the cybersecurity evaluation facilities activities from T113 provided by SPARTA partners
Cybersecurity skills frameworkThe framework will contain collection and description of all relevant skills – covering a skill catalogue, roles, skills & knowls (knowledge items) definitions and skill levels; as well implementation in online skill administration portal.
Dissemination and communication plan, updates, and evaluationThis report provides the initial dissemination and communication plan in M03, which will be updated yearly, jointly with an evaluation of the dissemination and communication work carried out.
Cybersecurity threat prediction legal frameworkThis will be a report on the outcomes of all legal debates challenges legal aspects analysis and assessment as well recommendation for further cybersecurity policy and regulation development
Lessons learned from externally assessing a CCN pilotThis deliverable i reports how SPARTA governance have been externally assessed and ii details the recommendations made
Demonstrator prototypesThis deliverable provides prototypes coming out of T54 They include contributions on integration mechanisms coming out of the three other tasks
Final internal ELSA audit and supervision reportThis deliverable reports on the work and results from the ELSA audit and supervision done throughout the third yearAs the public status of the ELSA audit deliverable might influence the replies given by partners during audits more detailed results CO will be made available to the EC upon request
Project quality planThe project quality plan (the project handbook) constitutes a set of project templates, explanations on the project management process, review process, quality checks, meeting organisation, which is communicated to all partners.
Improving a CCN pilotThis deliverable i reports how internal recommendations have been implemented and ii how SPARTA activities have improved in consequence
Validation and evaluation planThis deliverable will specify the initial plan data and procedures for testing and evaluation
AI systems threat analysis mechanisms and toolsThe threat and risks analysis for AI systems will be reported in this document
Key challenges and promising solution approachesThis deliverable provides a map of key challenges and related promising or good practices focusing on a limited set of ethical legal and societal aspects
Project results description documentationThis will be a set of templates and assisting documentations ensuring an adequate common identification of produced resources. It will include result of legal source code audit (if applicable); all project partners will beneficiate.
Final version of AI systems security mechanisms and toolsThis deliverable will describe the final version of the created defensive and reactive mechanisms explainability enhancing mechanisms and fairness ensuring mechanisms The results of AI Program contests will be provided
Closing the gender and diversity gapFinal report on the activities and impact of the actions carried out related to gender and diversity issues
Cybersecurity compliant development processesThis deliverable will report findings on process oriented certification concepts for complex mainstream commercial software systems.
Assessment specifications and roadmapThis deliverable aggregates contributions from T5.1, T5.2 and T5.3 to describes the roadmap and specification of the three tasks, describing the objectives of each team, as well as the roadmap to completing integration into T5.4.
Preliminary description of AI systems security mechanisms and toolsThis deliverable will present the first version of the defensive and reactive mechanisms, explainability enhancing mechanisms and fairness ensuring mechanisms. The information about the AI Program contests will be provided.
Outermost regions engagementFinal report describing the activities and impact of the Go Cyber with SPARTA campaign
Cybersecurity threat prediction frameworkThis deliverable will provide the definition of approach methods to be used and process organization to provide comprehensive prediction of fullspectrum cybersecurity threat
Concrete ELSA solutions for the SPARTA programsThis deliverable reports on the specifics of implementing selected ELSA solutions in the four SPARTA Programs
Validation and evaluation reportThis document will provide details and results of the conducted evaluation and validation
Curricula descriptionsD9.2, which is the outcome of T9.2 and T9.3, will contain the complete curricula for both university and professional training programs, in particular the set of recommended courses, laboratory activities, workshops and exercises. The curricula will serve as the best-practice resource for training on all levels of study programs intended for wide audience, including students, citizens and professionals to get the skills identified in D9.1.
General guidelines for responsible cybersecurity research and innovationThis deliverable lists general suggestions relevant in the context of responsible and legally compliant cybersecurity research and innovation
Sustainability and exploitation planThis deliverable is a report explaining the modalities of project results’ exploitation and licensing, including a common IPR framework; all project partners will beneficiate.
Results will be showcased as open source implementations and then integrated with mainstream OS, such as RIOT.
The external IT communication infrastructure constitutes a guideline for communication of the SPARTA project to external target groups including conferences, marketing measures and communication channels. Furthermore, this deliverable constitutes the launch of the internal SPARTA communication infrastructure including the establishment of mailing lists, a subversion repository server and the SPARTA website.
Publications
Author(s):
Luis Filipe Dias, Miguel Correia
Published in:
Handbook of Research on Machine and Deep Learning Applications for Cyber Security, 2020, Page(s) 292-316, ISBN 9781522596110
Publisher:
IGI Global
DOI:
10.4018/978-1-5225-9611-0.ch014
Author(s):
Abasi-Amefon O. Affia, Raimundas Matulevičius, Alexander Nolte
Published in:
On the Move to Meaningful Internet Systems: OTM 2019 Conferences - Confederated International Conferences: CoopIS, ODBASE, C&TC 2019, Rhodes, Greece, October 21–25, 2019, Proceedings, Issue 11877, 2019, Page(s) 282-300, ISBN 978-3-030-33245-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-33246-4_18
Author(s):
Qiang Tang
Published in:
Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers, Issue 12020, 2020, Page(s) 199-207, ISBN 978-3-030-42920-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-42921-8_11
Author(s):
Marek Pawlicki, Michał Choraś, Rafał Kozik, Witold Hołubowicz
Published in:
Computational Science – ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV, Issue 12140, 2020, Page(s) 196-210, ISBN 978-3-030-50422-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-50423-6_15
Author(s):
Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
Published in:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Issue 562, 2019, Page(s) 286-298, ISBN 978-3-030-22311-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-22312-0_20
Author(s):
Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Nerijus Morkevičius, Vaidas Jukavičius
Published in:
Information and Software Technologies - 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings, Issue 1078, 2019, Page(s) 256-270, ISBN 978-3-030-30274-0
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-30275-7_20
Author(s):
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
Published in:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings, Issue 11928, 2019, Page(s) 77-97, ISBN 978-3-030-36937-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-36938-5_5
Author(s):
Michał Choraś, Marek Pawlicki, Damian Puchalski, Rafał Kozik
Published in:
Computational Science – ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV, Issue 12140, 2020, Page(s) 615-628, ISBN 978-3-030-50422-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-50423-6_46
Author(s):
Jean-Max Dutertre, Timothé Riom, Olivier Potin, Jean-Baptiste Rigaud
Published in:
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings, Issue 11875, 2019, Page(s) 221-237, ISBN 978-3-030-35054-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-35055-0_14
Author(s):
Michał Choraś, Marek Pawlicki, Rafał Kozik
Published in:
Intelligent Data Engineering and Automated Learning – IDEAL 2019 - 20th International Conference, Manchester, UK, November 14–16, 2019, Proceedings, Part II, Issue 11872, 2019, Page(s) 353-360, ISBN 978-3-030-33616-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-33617-2_36
Author(s):
Luís Dias, Hélder Reia, Rui Neves, Miguel Correia
Published in:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings, Issue 11928, 2019, Page(s) 199-220, ISBN 978-3-030-36937-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-36938-5_12
Author(s):
Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point
Published in:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, Page(s) 754-759, ISBN 978-989-758-399-5
Publisher:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0009190307540759
Author(s):
Guillaume Celosia, Mathieu Cunche
Published in:
Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2019, Page(s) 444-453, ISBN 9781450372831
Publisher:
ACM
DOI:
10.1145/3360774.3360777
Author(s):
Antoaneta Kondeva, Vivek Nigam, Harald Ruess, Carmen Carlan
Published in:
2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 346-353, ISBN 978-1-7281-5138-0
Publisher:
IEEE
DOI:
10.1109/issrew.2019.00095
Author(s):
Nicolo Maunero, Paolo Prinetto, Gianluca Roascio
Published in:
2019 IEEE East-West Design & Test Symposium (EWDTS), 2019, Page(s) 1-6, ISBN 978-1-7281-1003-5
Publisher:
IEEE
DOI:
10.1109/ewdts.2019.8884464
Author(s):
Katharina Hofer-Schmitz, Branka Stojanovic
Published in:
2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019, Page(s) 1-6, ISBN 978-1-7281-2856-6
Publisher:
IEEE
DOI:
10.1109/cmi48017.2019.8962139
Author(s):
Aellison Cassimiro T. dos Santos, Ben Schneider, Vivek Nigam
Published in:
2019 Formal Methods in Computer Aided Design (FMCAD), 2019, Page(s) 69-77, ISBN 978-0-9835678-9-9
Publisher:
IEEE
DOI:
10.23919/fmcad.2019.8894249
Author(s):
Schlegel, Udo and Cakmak, Eren and Keim, Daniel A
Published in:
International Workshop on Machine Learning in Visualisation for Big Data: MLVis 2020, 2020
Publisher:
Eurographics Association
DOI:
10.2312/mlvis.20201100
Author(s):
Vivek Nigam, Carolyn Talcott
Published in:
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1043-1050, ISBN 978-1-7281-0303-7
Publisher:
IEEE
DOI:
10.1109/etfa.2019.8869428
Author(s):
Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, Michalis Polychronakis
Published in:
2020 IEEE Symposium on Security and Privacy (SP), 2020, Page(s) 563-577, ISBN 978-1-7281-3497-0
Publisher:
IEEE
DOI:
10.1109/sp40000.2020.00041
Author(s):
Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo
Published in:
2019
Publisher:
13th International Conference on Information Security Theory and Practice
Author(s):
André Maroneze, Valentin Perrelle, Florent Kirchner
Published in:
2019
Publisher:
Electronic Communications of the EASST
DOI:
10.14279/tuj.eceasst.77.1108.1053
Author(s):
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
Published in:
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-10, ISBN 9781450371643
Publisher:
ACM Press
DOI:
10.1145/3339252.3340503
Author(s):
Marco Spaziani Brunella, Giuseppe Bianchi, Sara Turco, Francesco Quaglia, Nicola Blefari-Melazzi
Published in:
2019 IEEE Conference on Network Softwarization (NetSoft), 2019, Page(s) 257-259, ISBN 978-1-5386-9376-6
Publisher:
IEEE
DOI:
10.1109/netsoft.2019.8806712
Author(s):
Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé Bissyandé, Jacques Klein
Published in:
Proceedings of The Web Conference 2020, 2020, Page(s) 1715-1726, ISBN 9781450370233
Publisher:
ACM
DOI:
10.1145/3366423.3380242
Author(s):
Guillaume Celosia, Mathieu Cunche
Published in:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things - IoT S&P'19, 2019, Page(s) 24-31, ISBN 9781450368384
Publisher:
ACM Press
DOI:
10.1145/3338507.3358617
Author(s):
Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Muhlberg, Frank Piessens
Published in:
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 2020, Page(s) 262-276, ISBN 978-1-7281-6572-1
Publisher:
IEEE
DOI:
10.1109/csf49147.2020.00026
Author(s):
Andrea Valenza, Luca Demetrio, Gabriele Costa, Giovanni Lagorio
Published in:
SoftwareX, Issue 11, 2020, Page(s) 100367, ISSN 2352-7110
Publisher:
ELSEVIER
DOI:
10.1016/j.softx.2019.100367
Author(s):
Hannes Tschofenig, Emmanuel Baccelli
Published in:
IEEE Security & Privacy, Issue 17/5, 2019, Page(s) 47-57, ISSN 1540-7993
Publisher:
IEEE Computer Society
DOI:
10.1109/msec.2019.2923973
Author(s):
Robertas Damasevicius, Algimantas Venckauskas, Sarunas Grigaliunas, Jevgenijus Toldinas, Nerijus Morkevicius, Tautvydas Aleliunas, Paulius Smuikys
Published in:
Electronics, Issue 9/5, 2020, Page(s) 800, ISSN 2079-9292
Publisher:
Basel : MDPI AG.
DOI:
10.3390/electronics9050800
Author(s):
Guillaume Celosia, Mathieu Cunche
Published in:
Proceedings on Privacy Enhancing Technologies, Issue 2020/1, 2020, Page(s) 26-46, ISSN 2299-0984
Publisher:
Sciendo
DOI:
10.2478/popets-2020-0003
Author(s):
Marek Pawlicki, Michał Choraś, Rafał Kozik
Published in:
Future Generation Computer Systems, Issue 110, 2020, Page(s) 148-154, ISSN 0167-739X
Publisher:
Elsevier BV
DOI:
10.1016/j.future.2020.04.013
Author(s):
Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David Basin & Chiara Bodei
Published in:
Journal of Automated Reasoning, 2020, ISSN 1573-0670
Publisher:
Springer
Author(s):
Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone
Published in:
Computers & Security, Issue 95, 2020, Page(s) 101745, ISSN 0167-4048
Publisher:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2020.101745
Author(s):
Koen Zandberg, Kaspar Schleiser, Francisco Acosta, Hannes Tschofenig, Emmanuel Baccelli
Published in:
IEEE Access, Issue 7, 2019, Page(s) 71907-71920, ISSN 2169-3536
Publisher:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2019.2919760
Author(s):
Qiang Tang
Published in:
2020
Publisher:
arXiv
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available