Livrables
The effectiveness of the technical results achieved in T6.1-5 is demonstrated by their application in a Smart Polygeneration Microgrid and in a Smart Energy Building It is supported by an evaluation document.
Demonstrators evaluationThis deliverable provides the demonstration of the three verticals described in T5.4. It is supported by an evaluation document.
Training evaluation pilotThis deliverable will contain recommendations from trainees toward improvements in the training that will take place at involved universities and professional training facilities in the form of hands-on training. Recommendations will be written down during pilot tests of the trainings, basing on thematic analysis of trainees experiences. Pilot evaluation will be done through in-depth interviews and focus groups.
Final results of the clustering, platforms, and ecosystems activitiesThis deliverable presents the results of all the WP8 tasks in M36.
Cybersecurity threat intelligence common data modelThis will be the design and specification for the data model agreed as common standard to be used for cybersecurity threat intelligence, as well practical implementation of ENISA proposed cyber-incidents data model.
Initial results of the clustering, platforms, and ecosystems activitiesThis deliverable presents the results of all the WP8 tasks in M12.
Intermediate results of the clustering, platforms, and ecosystems activitiesThis deliverable presents the results of all the WP8 tasks in M24.
Pilot of cyber training & exercise framework (Ct&eF)An infrastructure for technical realization of training activities at multiple consortium partners.
Visual analytics system for cybersecurity threat analysisThis will be a suitable visualization techniques and integrated Visual Analytics components based on available data and analysis models, as well as human computer interaction methods based on the Visual Analytics enabled visual interfaces.
First release of demonstrationThe effectiveness of the technical results achieved in T6.1-5 is demonstrated by their application in a Smart Polygeneration Microgrid and in a Smart Energy Building It is supported by an evaluation document.
In this report the SPARTA roadmap committee will document both its lessons learned during the roadmap creation process as well as a future assessment of ways to enhance the roadmap generation and maintenance process
Demonstrators specificationsThis deliverable provides the specifications of the demonstrators coming out of T54 They include contributions on integration mechanisms coming out of the three other tasks
From assessing to supporting the future CCNThis deliverable i reports how SPARTA governance have improved from the beginning and ii details the recommendations made for the future CCN
International and national cybersecurity certification initiatives - UpdatesUpdate of D111
Preparing a CCN pilot to become a sustainable CCNThis deliverable i reports how external recommendations have been implemented and ii explains how SPARTA has been prepared to be become a sustainable CCN
Updated SPARTA SRIA (roadmap v1)Release of an updated version of the SPARTA Roadmap.
Commercial deployment planThis deliverable is a report exploring ways to promote results from SPARTA for commercial deployment all project partners will beneficiate
Updated SPARTA SRIA (roadmap v2)Release of an updated version of the SPARTA Roadmap
Updated SPARTA SRIA (roadmap v3)Release of an updated version of the SPARTA Roadmap
Second internal ELSA audit and supervision reportD24 reports on the work and results from the ELSA audit and supervision done throughout the 2nd yearAs the public status of the ELSA audit deliverable might influence the replies given by partners during audits more detailed results CO will be made available to the EC upon request
Updated dissemination and communication plan and evaluation - v2This report provides is an update to D123
International and national cybersecurity certification initiativesThis deliverable will be a mapping of cybersecurity initiatives.
Sustainable exploitation documentsD105 is a set of promotion and sectoralfocused documentations aimed at supporting project results all project partners will beneficiate
Updated dissemination and communication plan and evaluation – v1This report provides is an update to D12.1.
Workplace integration evaluation reportThis deliverable evaluates the outcome of the cybersecurity skills framework and training evaluation pilot with both alumni and human resources departments of employment institutions It provides feedback on the appropriateness of the framework and training programs
Initial SPARTA SRIA (roadmap v0.1)Release of an initial version of the SPARTA Roadmap.
Pre-existing components identification documentationThis deliverable is a set of templates and assisting documentations ensuring an adequate common tracking of pre-existing resources used within the project; all project partners will beneficiate.
Lessons learned from internally assessing a CCN pilotThis deliverable (i) reports how SPARTA governance have been internally assessed and (ii) details the recommendations made.
Report on liaison with national cybersecurity authoritiesThis deliverable will report on the liaison activities with national cybersecurity authorities throughout SPARTA life
First internal ELSA audit and supervision reportD2.2 reports on the work and results from the ELSA audit and supervision done throughout the 1st year.
Security-by-design framework for the intelligent infrastructureThis deliverable aggregates contributions from T615 and describes the roadmap and specification of the five tasks describing the objectives of each team as well as the roadmap to achieve integration
Ethical, legal, and societal aspectsThis deliverable provides a documented list of relevant ethical, legal and societal aspects relevant in the context of large-scale cybersecurity research and innovation.
Final report on dissemination and communication and evaluation - v3This report provides is an update to D124
Bootstrapping a CCN pilotThis deliverable (i) reports about how governance, R&D&I, community and exploitation activities have been organized to launch SPARTA and (ii) discusses new findings and replicability the structures.
Cybersecurity evaluation facilitiesThis deliverable will report on the cybersecurity evaluation facilities activities from T113 provided by SPARTA partners
Cybersecurity skills frameworkThe framework will contain collection and description of all relevant skills – covering a skill catalogue, roles, skills & knowls (knowledge items) definitions and skill levels; as well implementation in online skill administration portal.
Dissemination and communication plan, updates, and evaluationThis report provides the initial dissemination and communication plan in M03, which will be updated yearly, jointly with an evaluation of the dissemination and communication work carried out.
Cybersecurity threat prediction legal frameworkThis will be a report on the outcomes of all legal debates challenges legal aspects analysis and assessment as well recommendation for further cybersecurity policy and regulation development
Lessons learned from externally assessing a CCN pilotThis deliverable i reports how SPARTA governance have been externally assessed and ii details the recommendations made
Demonstrator prototypesThis deliverable provides prototypes coming out of T54 They include contributions on integration mechanisms coming out of the three other tasks
Final internal ELSA audit and supervision reportThis deliverable reports on the work and results from the ELSA audit and supervision done throughout the third yearAs the public status of the ELSA audit deliverable might influence the replies given by partners during audits more detailed results CO will be made available to the EC upon request
Project quality planThe project quality plan (the project handbook) constitutes a set of project templates, explanations on the project management process, review process, quality checks, meeting organisation, which is communicated to all partners.
Improving a CCN pilotThis deliverable i reports how internal recommendations have been implemented and ii how SPARTA activities have improved in consequence
Validation and evaluation planThis deliverable will specify the initial plan data and procedures for testing and evaluation
AI systems threat analysis mechanisms and toolsThe threat and risks analysis for AI systems will be reported in this document
Key challenges and promising solution approachesThis deliverable provides a map of key challenges and related promising or good practices focusing on a limited set of ethical legal and societal aspects
Project results description documentationThis will be a set of templates and assisting documentations ensuring an adequate common identification of produced resources. It will include result of legal source code audit (if applicable); all project partners will beneficiate.
Final version of AI systems security mechanisms and toolsThis deliverable will describe the final version of the created defensive and reactive mechanisms explainability enhancing mechanisms and fairness ensuring mechanisms The results of AI Program contests will be provided
Closing the gender and diversity gapFinal report on the activities and impact of the actions carried out related to gender and diversity issues
Cybersecurity compliant development processesThis deliverable will report findings on process oriented certification concepts for complex mainstream commercial software systems.
Assessment specifications and roadmapThis deliverable aggregates contributions from T5.1, T5.2 and T5.3 to describes the roadmap and specification of the three tasks, describing the objectives of each team, as well as the roadmap to completing integration into T5.4.
Preliminary description of AI systems security mechanisms and toolsThis deliverable will present the first version of the defensive and reactive mechanisms, explainability enhancing mechanisms and fairness ensuring mechanisms. The information about the AI Program contests will be provided.
Outermost regions engagementFinal report describing the activities and impact of the Go Cyber with SPARTA campaign
Cybersecurity threat prediction frameworkThis deliverable will provide the definition of approach methods to be used and process organization to provide comprehensive prediction of fullspectrum cybersecurity threat
Concrete ELSA solutions for the SPARTA programsThis deliverable reports on the specifics of implementing selected ELSA solutions in the four SPARTA Programs
Validation and evaluation reportThis document will provide details and results of the conducted evaluation and validation
Curricula descriptionsD9.2, which is the outcome of T9.2 and T9.3, will contain the complete curricula for both university and professional training programs, in particular the set of recommended courses, laboratory activities, workshops and exercises. The curricula will serve as the best-practice resource for training on all levels of study programs intended for wide audience, including students, citizens and professionals to get the skills identified in D9.1.
General guidelines for responsible cybersecurity research and innovationThis deliverable lists general suggestions relevant in the context of responsible and legally compliant cybersecurity research and innovation
Sustainability and exploitation planThis deliverable is a report explaining the modalities of project results’ exploitation and licensing, including a common IPR framework; all project partners will beneficiate.
Results will be showcased as open source implementations and then integrated with mainstream OS, such as RIOT.
The external IT communication infrastructure constitutes a guideline for communication of the SPARTA project to external target groups including conferences, marketing measures and communication channels. Furthermore, this deliverable constitutes the launch of the internal SPARTA communication infrastructure including the establishment of mailing lists, a subversion repository server and the SPARTA website.
Publications
Auteurs:
Luis Filipe Dias, Miguel Correia
Publié dans:
Handbook of Research on Machine and Deep Learning Applications for Cyber Security, 2020, Page(s) 292-316, ISBN 9781522596110
Éditeur:
IGI Global
DOI:
10.4018/978-1-5225-9611-0.ch014
Auteurs:
Abasi-Amefon O. Affia, Raimundas Matulevičius, Alexander Nolte
Publié dans:
On the Move to Meaningful Internet Systems: OTM 2019 Conferences - Confederated International Conferences: CoopIS, ODBASE, C&TC 2019, Rhodes, Greece, October 21–25, 2019, Proceedings, Numéro 11877, 2019, Page(s) 282-300, ISBN 978-3-030-33245-7
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-33246-4_18
Auteurs:
Qiang Tang
Publié dans:
Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers, Numéro 12020, 2020, Page(s) 199-207, ISBN 978-3-030-42920-1
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-42921-8_11
Auteurs:
Marek Pawlicki, Michał Choraś, Rafał Kozik, Witold Hołubowicz
Publié dans:
Computational Science – ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV, Numéro 12140, 2020, Page(s) 196-210, ISBN 978-3-030-50422-9
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-50423-6_15
Auteurs:
Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
Publié dans:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Numéro 562, 2019, Page(s) 286-298, ISBN 978-3-030-22311-3
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-22312-0_20
Auteurs:
Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Nerijus Morkevičius, Vaidas Jukavičius
Publié dans:
Information and Software Technologies - 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings, Numéro 1078, 2019, Page(s) 256-270, ISBN 978-3-030-30274-0
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-30275-7_20
Auteurs:
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
Publié dans:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings, Numéro 11928, 2019, Page(s) 77-97, ISBN 978-3-030-36937-8
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-36938-5_5
Auteurs:
Michał Choraś, Marek Pawlicki, Damian Puchalski, Rafał Kozik
Publié dans:
Computational Science – ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV, Numéro 12140, 2020, Page(s) 615-628, ISBN 978-3-030-50422-9
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-50423-6_46
Auteurs:
Jean-Max Dutertre, Timothé Riom, Olivier Potin, Jean-Baptiste Rigaud
Publié dans:
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings, Numéro 11875, 2019, Page(s) 221-237, ISBN 978-3-030-35054-3
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-35055-0_14
Auteurs:
Michał Choraś, Marek Pawlicki, Rafał Kozik
Publié dans:
Intelligent Data Engineering and Automated Learning – IDEAL 2019 - 20th International Conference, Manchester, UK, November 14–16, 2019, Proceedings, Part II, Numéro 11872, 2019, Page(s) 353-360, ISBN 978-3-030-33616-5
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-33617-2_36
Auteurs:
Luís Dias, Hélder Reia, Rui Neves, Miguel Correia
Publié dans:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings, Numéro 11928, 2019, Page(s) 199-220, ISBN 978-3-030-36937-8
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-030-36938-5_12
Auteurs:
Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point
Publié dans:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, Page(s) 754-759, ISBN 978-989-758-399-5
Éditeur:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0009190307540759
Auteurs:
Guillaume Celosia, Mathieu Cunche
Publié dans:
Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2019, Page(s) 444-453, ISBN 9781450372831
Éditeur:
ACM
DOI:
10.1145/3360774.3360777
Auteurs:
Antoaneta Kondeva, Vivek Nigam, Harald Ruess, Carmen Carlan
Publié dans:
2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 346-353, ISBN 978-1-7281-5138-0
Éditeur:
IEEE
DOI:
10.1109/issrew.2019.00095
Auteurs:
Nicolo Maunero, Paolo Prinetto, Gianluca Roascio
Publié dans:
2019 IEEE East-West Design & Test Symposium (EWDTS), 2019, Page(s) 1-6, ISBN 978-1-7281-1003-5
Éditeur:
IEEE
DOI:
10.1109/ewdts.2019.8884464
Auteurs:
Katharina Hofer-Schmitz, Branka Stojanovic
Publié dans:
2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019, Page(s) 1-6, ISBN 978-1-7281-2856-6
Éditeur:
IEEE
DOI:
10.1109/cmi48017.2019.8962139
Auteurs:
Aellison Cassimiro T. dos Santos, Ben Schneider, Vivek Nigam
Publié dans:
2019 Formal Methods in Computer Aided Design (FMCAD), 2019, Page(s) 69-77, ISBN 978-0-9835678-9-9
Éditeur:
IEEE
DOI:
10.23919/fmcad.2019.8894249
Auteurs:
Schlegel, Udo and Cakmak, Eren and Keim, Daniel A
Publié dans:
International Workshop on Machine Learning in Visualisation for Big Data: MLVis 2020, 2020
Éditeur:
Eurographics Association
DOI:
10.2312/mlvis.20201100
Auteurs:
Vivek Nigam, Carolyn Talcott
Publié dans:
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1043-1050, ISBN 978-1-7281-0303-7
Éditeur:
IEEE
DOI:
10.1109/etfa.2019.8869428
Auteurs:
Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, Michalis Polychronakis
Publié dans:
2020 IEEE Symposium on Security and Privacy (SP), 2020, Page(s) 563-577, ISBN 978-1-7281-3497-0
Éditeur:
IEEE
DOI:
10.1109/sp40000.2020.00041
Auteurs:
Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo
Publié dans:
2019
Éditeur:
13th International Conference on Information Security Theory and Practice
Auteurs:
André Maroneze, Valentin Perrelle, Florent Kirchner
Publié dans:
2019
Éditeur:
Electronic Communications of the EASST
DOI:
10.14279/tuj.eceasst.77.1108.1053
Auteurs:
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
Publié dans:
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-10, ISBN 9781450371643
Éditeur:
ACM Press
DOI:
10.1145/3339252.3340503
Auteurs:
Marco Spaziani Brunella, Giuseppe Bianchi, Sara Turco, Francesco Quaglia, Nicola Blefari-Melazzi
Publié dans:
2019 IEEE Conference on Network Softwarization (NetSoft), 2019, Page(s) 257-259, ISBN 978-1-5386-9376-6
Éditeur:
IEEE
DOI:
10.1109/netsoft.2019.8806712
Auteurs:
Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé Bissyandé, Jacques Klein
Publié dans:
Proceedings of The Web Conference 2020, 2020, Page(s) 1715-1726, ISBN 9781450370233
Éditeur:
ACM
DOI:
10.1145/3366423.3380242
Auteurs:
Guillaume Celosia, Mathieu Cunche
Publié dans:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things - IoT S&P'19, 2019, Page(s) 24-31, ISBN 9781450368384
Éditeur:
ACM Press
DOI:
10.1145/3338507.3358617
Auteurs:
Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Muhlberg, Frank Piessens
Publié dans:
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 2020, Page(s) 262-276, ISBN 978-1-7281-6572-1
Éditeur:
IEEE
DOI:
10.1109/csf49147.2020.00026
Auteurs:
Andrea Valenza, Luca Demetrio, Gabriele Costa, Giovanni Lagorio
Publié dans:
SoftwareX, Numéro 11, 2020, Page(s) 100367, ISSN 2352-7110
Éditeur:
ELSEVIER
DOI:
10.1016/j.softx.2019.100367
Auteurs:
Hannes Tschofenig, Emmanuel Baccelli
Publié dans:
IEEE Security & Privacy, Numéro 17/5, 2019, Page(s) 47-57, ISSN 1540-7993
Éditeur:
IEEE Computer Society
DOI:
10.1109/msec.2019.2923973
Auteurs:
Robertas Damasevicius, Algimantas Venckauskas, Sarunas Grigaliunas, Jevgenijus Toldinas, Nerijus Morkevicius, Tautvydas Aleliunas, Paulius Smuikys
Publié dans:
Electronics, Numéro 9/5, 2020, Page(s) 800, ISSN 2079-9292
Éditeur:
Basel : MDPI AG.
DOI:
10.3390/electronics9050800
Auteurs:
Guillaume Celosia, Mathieu Cunche
Publié dans:
Proceedings on Privacy Enhancing Technologies, Numéro 2020/1, 2020, Page(s) 26-46, ISSN 2299-0984
Éditeur:
Sciendo
DOI:
10.2478/popets-2020-0003
Auteurs:
Marek Pawlicki, Michał Choraś, Rafał Kozik
Publié dans:
Future Generation Computer Systems, Numéro 110, 2020, Page(s) 148-154, ISSN 0167-739X
Éditeur:
Elsevier BV
DOI:
10.1016/j.future.2020.04.013
Auteurs:
Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David Basin & Chiara Bodei
Publié dans:
Journal of Automated Reasoning, 2020, ISSN 1573-0670
Éditeur:
Springer
Auteurs:
Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone
Publié dans:
Computers & Security, Numéro 95, 2020, Page(s) 101745, ISSN 0167-4048
Éditeur:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2020.101745
Auteurs:
Koen Zandberg, Kaspar Schleiser, Francisco Acosta, Hannes Tschofenig, Emmanuel Baccelli
Publié dans:
IEEE Access, Numéro 7, 2019, Page(s) 71907-71920, ISSN 2169-3536
Éditeur:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2019.2919760
Auteurs:
Qiang Tang
Publié dans:
2020
Éditeur:
arXiv
Recherche de données OpenAIRE...
Une erreur s’est produite lors de la recherche de données OpenAIRE
Aucun résultat disponible