Rezultaty
Update to deliverable D3.4.
Case StudiesThis deliverable presents the analysis of the selected case studies from EU and international cooperation as examples of impact, promoting the outcomes of the strategic alliances (in collaboration with other WPs) and industry sponsorship of skills development.
Governance needs and objectivesA report on indentified governance needs and objectives will be based on analysis of the initial experience of the Consortium in implementation of the governance and management for the included in the project centers. Study of typical needs and objectives for the network governance and management of publicly available cases will contribute to improving and verification of the initial proposal.
Governance alternativesThis report will present the results of the study of existing models and their comparison with the experience within the consortium. In parallel, we will develop goal and specific criteria for the assessment of these alternatives for the purposes of the project.
Governance model implementation planDeliverable will be developed within the framework of T3.4. based on identified Current Operating Model and Target Operating Model for the Network governance and management, implementing ADKAR (Awareness, Desire, Knowledge, Ability, Reinforcement) change management model, using the experience of Consortium governance and management and the engagement with new partners. Based on implementation of the plan in T3.4. will develop at M36 and M48 update of the above 3 deliverables, using the experience gained / results of T3.4 and T3.5.
Update 2 - Governance needs and objectivesUpdate to deliverable D3.1.
ECHO Multi-sector Assessment FrameworkThe deliverable will report on the analysis of challenges and opportunities derived from sector-specific use cases, and will contribute to the development of the ECHO multi-sector risk assessment framework. The document will focus on horizontal technologies and cybersecurity in selected critical sectors, as well as addressing inter-sector dependencies and transversal security aspects. The developed framework will provide a foundational approach for organisations to assess their current security standing and to develop a roadmap to investments in technological advancements, training and process innovations aimed to protect their assets against cyber-attacks.
Update Final - Governance alternativesLast update to Deliverable D3.2.
Governance model descriptionBased on agreed goals and criteria, alternatives will be assessed, using the technology of expert assessment of alternatives with the Analytic Hierarchy Process (HAP). Selected options will be defined using the architectural approach and COBIT (Control OBjectives of Iformation and related Technologies) framework.
Transversal technical cybersecurity challenges reportThis deliverable will provide an initial analysis and categorisation of transversal technical cybersecurity challenges based on WP2 outcomes and expert reports by relevant agencies.
Update - Governance model descriptionUpdate to deliverable D3.3.
Update - ECHO Cybersecurity Certification SchemeUpdate to deliverable D2.9.
Update - Inter-sector cybersecurity technology roadmapUpdate to deliverable D4.3.
Update 2 - Governance model descriptionUpdate to deliverable D3.3.
ECHO Cyberskills FrameworkA learning-outcome based competence framework for professionals in the cyber security domain includes a set of skills and knowledge, professional profiles, three sample training programmes, methodology and content for blended training(s), monitoring and assessment framework.
Update - Governance needs and objectivesUpdate to deliverable D3.1.
Inter-sector cybersecurity technology roadmapThis deliverable provides details of inter-sector cybersecurity challenges and needs along with conceptual solution roadmaps and their associated requirements.
Update - Inter-sector technical cybersecurity challenges reportUpdate to deliverable D4.2.
Inter-sector technical cybersecurity challenges reportThis deliverable will provide an initial analysis and categorisation of inter-sector technical cybersecurity challenges based on WP2 outcomes and expert reports by relevant agencies.
Training ResultsProvides documented outcomes of the training modules including participant performance and participant evaluation of training modules.
ECHO Information sharing modelsThis deliverable consists of a comprehensive review of information sharing and trust models from within the cyber domain, as well as models from other domains (e.g., healthcare information sharing models). From these models a set of system requirements and features will be established to support a model that promotes information sharing among partners, while also meeting regulatory requirements. The deliverable includes a set of system requirements and features will be established to support a model that promotes information sharing among partners, while also meeting regulatory requirements. Moreover, the final analysis includes the requirements for information sharing within and between partners across organizational boundaries as derived from multi-sector analysis.
ECHO Operations status reportThis document provides a synthesis of the project’s activities related to implementation of the governance model and includes reports of achievements compared to the plan, along with challenges and an updated risk assessment.
Update 2 - Governance model implementation planUpdate to deliverable D3.4.
Update 2 - Governance alternativesUpdate to deliverable D3.2.
ECHO Cybersecurity Certification SchemeDerived from the ECHO Multi-sector Assessment Framework, the ECHO Cybersecurity Certificatino Scheme documents the methodology to be used to achieve security certification status of sector and inter-sector technologies compliant with the ENISA defined approach for an EU-wide cybersecurity certification framework.
ECHO demonstration summary reportThis deliverable will consolidate the results from the demonstration workshops from T8.3 and highlight the common and unique features, future challenges and future opportunities for the implementation and deployment of the collected ECHO tools as a future concept of operations (CONOPS).
Update - ECHO Multi-sector Assessment FrameworkUpdate to deliverable D2.2.
Update - Transversal technical cybersecurity challenges reportUpdate to deliverable D4.1.
Update to deliverable D9.5.
E-EWS and E-FCR demonstration surveysCollection of surveys used to gather feedback from participants of the E-EWS and E-FCR demonstration events allowing evaluation of prototypes effectiveness and applicability to the challenge of improving cybersecurity across the identified constituents.
Project leafletsThis deliverable includes project promotional material such as leaflets and brochures. All marketing material and collateral shall have a common look and associated branding.
eSkills & Training assessment toolkitThe toolkit of eSkills and Training will include the components and resources of easy-to-use form for assessment. eSkills and Training Assessment Toolkit is a resource to sustain and improve the assessment skills. It is based on relevant requirements, policies, analysis, guidelines (such as European e-skills agenda and the Digital Agenda), frameworks and certification.
ECHO Web PlatformDescribe the design of the web-based platform including web-based templates and of the web graphical layouts. The approach for the implementation and maintenance of graphic design & branding will also be included.
Update 2 - Event calendarUpdate to deliverable D9.5.
Inter-sector prototypes demonstration surveyCollection of surveys used to gather feedback from participants of the inter-sector prototypes demonstration events allowing evaluation of prototypes effectiveness and applicability to the challenge of improving cybersecurity across the identified sectors.
Societal impact toolkitThis deliverable develops tools and procedures for the societal impact assessment covering diverse aspects related to governance, assets, people (eSkills + training; jobs) in a form of Societal Impact Toolkit.
Update - Event calendarUpdate to delvierable D9.5.
Communication collateral, social media channels set-upDetails the communication strategy and all the used communication formats, such as brochures, press releases, video clips, collateral, banners, etc. ensuring a common look and feel to all social media activities including LinkedIn, Twitter, etc.. Regular social media activities will be carried out and continuously managed. Presents the coordination strategy and the main steps regarding production of ECHO branding and material and visual presentations such as word documents, presentation files, project leaflets, etc.
Event calendarContinuously updated calendar of the relevant conferences, workshops and other public or industry specific expert events.
Publikacje
Autorzy:
Casper Almén; Nicholas Hagström; Jyri Rajamäki
Opublikowane w:
Numer 17, 2022
Wydawca:
p
DOI:
10.11610/isij.5301
Autorzy:
Kristine Hovhannisyan; Piotr Bogacki; Consuelo Assunta Colabuono; Domenico Lofù; Maria Vittoria Marabello; Brady Eugene Maxwell
Opublikowane w:
IEEE Cyber Science 2021 Conference - 2021, Numer 1, 2021
Wydawca:
IEEE
DOI:
10.1109/CyberSA52016.2021.9478255
Autorzy:
Sten Mäses; Kaie Maennel; Agnė Brilingaitė
Opublikowane w:
Numer 1, 2022
Wydawca:
p
DOI:
10.3389/feduc.2022.958405
Autorzy:
Andrzej Dziech; Piotr Bogacki; Jan Derkacz
Opublikowane w:
Numer 17, 2022
Wydawca:
p
DOI:
10.3390/s22218106
Autorzy:
Vyacheslav Kharchenko; Herman Fesenko; Oleg Illiashenko
Opublikowane w:
Numer 1, 2022
Wydawca:
hh
DOI:
10.3390/s22134865
Autorzy:
Panos Panagiotou; Christos Iliou; Konstantinos Apostolou; Theodora Tsikrika; Stefanos Vrochidis; Periklis Chatzimisios; Ioannis Kompatsiaris
Opublikowane w:
CSR, Numer 15, 2022
Wydawca:
98u
DOI:
10.1109/csr51186.2021.9527909
Autorzy:
Stefano Armenia; Marco Angelini; Fabio Nonino; Giulia Palombi; Mario Francesco Schlitzer
Opublikowane w:
Numer 5, 2022
Wydawca:
p
DOI:
10.1016/j.dss.2021.113580
Autorzy:
Ievgen Babeshko; Oleg Illiashenko; Vyacheslav Kharchenko; Kostiantyn Leontiev
Opublikowane w:
Numer 2, 2022
Wydawca:
09
DOI:
10.3390/math10132297
Autorzy:
Simola Jussi; Lehto Martti
Opublikowane w:
ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security, Numer 1, 2020, Strona(/y) 539-548, ISBN 978-1-912764-52-5
Wydawca:
Payne, Brian K.; Wu, Hongyi
DOI:
10.34190/ICCWS.20.106
Autorzy:
Nikos Oikonomou; Notis Mengidis; Minas Spanopoulos-Karalexidis; Antonis Voulgaridis; Matteo Merialdo; Ivo Raisr; Kaarel Hanson; Paloma de La Vallee; Theodora Tsikrika; Stefanos Vrochidis; Konstantinos Votis
Opublikowane w:
CSR, Numer 17, 2022
Wydawca:
iuh
DOI:
10.1109/csr51186.2021.9527985
Autorzy:
George Sharkov; Christina Todorova; Georgi Koykov; Ivan Nikolov
Opublikowane w:
Numer 1, 2022
Wydawca:
p
DOI:
10.11610/isij.5319
Autorzy:
Kaie Maennel
Opublikowane w:
2020
Wydawca:
IEEE European Symposium on Security and Privacy 2020
DOI:
10.1109/euros&pw51379.2020.00012
Autorzy:
Nikos Oikonomou; Notis Mengidis; Minas Spanopoulos - Karalexidis; Antonis Voulgaridis; Matteo Merialdo; Ivo Raisr; Kaarel Hanson; Paloma de La Vallee; Theodora Tsikrika; Stefanos Vrochidis; Konstantinos Votis
Opublikowane w:
in the proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (IEEE CSR), Numer 1, 2021
Wydawca:
IEEE
DOI:
10.1109/CSR51186.2021.9527985
Autorzy:
Kristine Hovhannisyan; Piotr Bogacki; Consuelo Assunta Colabuono; Domenico Lofù; Maria Vittoria Marabello; Brady Eugene Maxwell
Opublikowane w:
eisbn: 978-1-6654-2529-2, Numer 2, 2022
Wydawca:
p
DOI:
10.1109/cybersa52016.2021.9478255
Autorzy:
Panos Panagiotou; Christos Iliou; Konstantinos Apostolou; Theodora Tsikrika; Stefanos Vrochidis; Periklis Chatzimisios; Ioannis Kompatsiaris
Opublikowane w:
IEEEInternational Conference on Cyber Security and Resilience (CSR), 2021, pp. 354-3, Numer 1, 2021
Wydawca:
IEEE
DOI:
10.1109/CSR51186.2021.9527909
Autorzy:
Patsakis, Constantinos; Casino, Fran; Lykousas, Nikolaos; Katos, Vasilios
Opublikowane w:
Numer 18, 2022
Wydawca:
iuhiuh
DOI:
10.48550/arxiv.1912.03552
Autorzy:
Georgios Aivatoglou; Mike Anastasiadis; Georgios Spanos; Antonis Voulgaridis; Konstantinos Votis; Dimitrios Tzovaras
Opublikowane w:
Numer 1, 2023
Wydawca:
p
DOI:
10.1109/CSR51186.2021.9527965
Autorzy:
Vladimir Lukin; Vyacheslav Kharchenko; Victor Makarichev; Oleg Illiashenko
Opublikowane w:
Sensors; Volume 22; Numer 10; Pages: 3751, Numer 16, 2022
Wydawca:
p
DOI:
10.3390/s22103751
Autorzy:
Pavlos Evangelatos; Christos Iliou; Thanassis Mavropoulos; Konstantinos Apostolou; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris
Opublikowane w:
2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, pp. 348-353, Numer 1, 2021
Wydawca:
IEEE
DOI:
10.1109/CSR51186.2021.9527981
Autorzy:
Irena Mladenova; Velizar Shalamanov; Antoniya Shalamanova-Filipova
Opublikowane w:
okkk, Numer 14, 2022
Wydawca:
ppo
DOI:
10.11610/isij.5309
Autorzy:
Paloma de la Vallée; Georgios Iosifidis; Wim Mees
Opublikowane w:
Numer 11, 2022
Wydawca:
p
DOI:
10.11610/isij.5318
Autorzy:
Aleksandr Serkov; Volodymyr Tkachenko; Vyacheslav Kharchenko; Volodymyr Pevnev; Karyna Trubchaninova; Nikolans Doukas
Opublikowane w:
2020 24th International Conference on Circuits, Systems, Communications and Computers (CSCC), Numer 1, 2020
Wydawca:
IEEE
DOI:
10.1109/cscc49995.2020.00058
Autorzy:
Jyri Rajamäki; Harri Ruoslahti
Opublikowane w:
Numer 14, 2022
Wydawca:
trd
DOI:
10.34190/EWS.21.076
Autorzy:
Pavel Varbanov
Opublikowane w:
Numer 17, 2022
Wydawca:
p
DOI:
10.11610/isij.5312
Autorzy:
Murat Odemis; Cagatay Yucel; Ahmet Koltuksuz
Opublikowane w:
Security and Communication Networks, Vol 2022 (2022), Numer 6, 2022
Wydawca:
p
DOI:
10.1155/2022/7620125
Autorzy:
Carmelo Ardito; Tommaso Di Noia; Eugenio di Sciascio; Domenico Lofu'; Andrea Pazienza; Felice Vitulano
Opublikowane w:
Numer 1, 2022
Wydawca:
p
DOI:
10.5281/zenodo.7833277
Autorzy:
Michał Bajor; Marcin Niemiec
Opublikowane w:
Energies; Volume 15; Numer 18; Pages: 6516, Numer 1, 2022
Wydawca:
p
DOI:
10.3390/en15186516
Autorzy:
Mike Anastasiadis; Georgios Aivatoglou; Georgios Spanos; Antonis Voulgaridis; Konstantinos Votis
Opublikowane w:
Numer 1, 2023
Wydawca:
p
DOI:
10.1109/CSR54599.2022.9850314
Autorzy:
Ilona Frisk; Ilkka Tikanmäki; Harri Ruoslahti
Opublikowane w:
Numer 11, 2022
Wydawca:
p
DOI:
10.5281/zenodo.7833334
Autorzy:
Georgi Penchev; Velizar Shalamanov
Opublikowane w:
Numer 8, 2022
Wydawca:
p
DOI:
10.11610/isij.5310
Autorzy:
Jarosław Duda; Marcin Niemiec
Opublikowane w:
Numer 6, 2022
Wydawca:
p
DOI:
10.34768/amcs-2023-0004
Autorzy:
Papoutsis, Angelos; Iliou, Christos; Kavallieros, Dimitris; Tsikrika, Theodora; Vrochidis, Stefanos; Kompatsiaris, Ioannis
Opublikowane w:
Crossref, Numer 17, 2022
Wydawca:
oiuoiu
DOI:
10.5281/zenodo.6684449
Autorzy:
Miłosz Stypinski; Marcin Niemiec
Opublikowane w:
Numer 15, 2022
Wydawca:
p
DOI:
10.1109/TNNLS.2022.3180197
Autorzy:
Pavlos Evangelatos; Christos Iliou; Thanassis Mavropoulos; Konstantinos Apostolou; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris
Opublikowane w:
CSR, Numer 15, 2022
Wydawca:
trd
DOI:
10.1109/csr51186.2021.9527981
Autorzy:
Georgios Aivatoglou; Mike Anastasiadis; Georgios Spanos; Antonis Voulgaridis; Konstantinos Votis; Dimitrios Tzovaras; Lefteris Angelis
Opublikowane w:
Numer 2, 2022
Wydawca:
p
DOI:
10.1007/s11042-021-11073-x
Autorzy:
Maciej Sawka; Marcin Niemiec
Opublikowane w:
Numer 1, 2022
Wydawca:
p
DOI:
10.3390/en15196864
Autorzy:
Wojciech Szczepanik; Marcin Niemiec
Opublikowane w:
Numer 2, 2022
Wydawca:
p
DOI:
10.3390/en15113951
Autorzy:
Notis Mengidis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris
Opublikowane w:
Numer 1, 2021
Wydawca:
Springer
DOI:
10.1007/978-3-030-65722-2_18
Autorzy:
Michał Bajor, Marcin Niemiec
Opublikowane w:
Information & Security: An International Journal, Numer 47/2, 2020, Strona(/y) 261-275, ISSN 0861-5160
Wydawca:
DIGILIENCE 2020
DOI:
10.11610/isij.4718
Autorzy:
Jyri Rajamäki, Vasilis Katos
Opublikowane w:
Information & Security: An International Journal, Numer 46/2, 2020, Strona(/y) 198-214, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4614
Autorzy:
О. О. Illiashenko; М. А. Kolisnyk; А. E. Strielkina; І. V. Kotsiuba; V. S. Kharchenko
Opublikowane w:
Radio Electronics, Computer Science, Control; № 4 (2020): Radio Electronics, Computer Science, Control; 139 - 150, Numer 1, 2021, ISSN 1445-3312
Wydawca:
Radio Electronics, Computer Science, Control; № 4 (2020): Radio Electronics, Computer Science, Control; 139 - 150
DOI:
10.15588/1607-3274-2020-4-14
Autorzy:
Harri Ruoslahti, Amir Trent
Opublikowane w:
Information & Security: An International Journal, Numer 46/1, 2020, Strona(/y) 65-78, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4605
Autorzy:
Kharchenko, Vyacheslav; Illiashenko, Oleg; Sklyr, Vladimir
Opublikowane w:
Conception and Technique. Computers, 10(125), 19, Numer 1, 2021, ISSN 2073-431X
Wydawca:
Conception and Technique. Computers
DOI:
10.3390/computers10100125
Autorzy:
Harri Ruoslahti
Opublikowane w:
Information & Security: An International Journal, Numer 46/3, 2020, Strona(/y) 285-292, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4620
Autorzy:
Ioannis Tsimperidis; Cagatay Yucel; Vasilios Katos
Opublikowane w:
Electronics 2021, 10(7), 835;, Numer 1, 2021, ISSN 1445-3312
Wydawca:
Electronics 2021, 10(7), 835;
DOI:
10.3390/electronics10070835
Autorzy:
Vyacheslav Kharchenko, Sergiy Dotsenko, Yuriy Ponochovnyi, Oleg Illiashenko
Opublikowane w:
Information & Security: An International Journal, Numer 47/1, 2020, Strona(/y) 77-90, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4705
Autorzy:
George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, Georgi Zahariev
Opublikowane w:
Information & Security: An International Journal, Numer 46/2, 2020, Strona(/y) 155-167, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal 46, no. 2 (2020): 155-167.
DOI:
10.11610/isij.4611
Autorzy:
Oliver Nock, Jonathan Starkey, Constantinos Marios Angelopoulos
Opublikowane w:
Sensors, Numer 20/18, 2020, Strona(/y) 5439, ISSN 1424-8220
Wydawca:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s20185439
Autorzy:
Yantsislav Yanakiev
Opublikowane w:
Information & Security: An International Journal, Numer 46/1, 2020, Strona(/y) 79-98, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4606
Autorzy:
Marcin Niemiec; Rafał Kościej; Bartłomiej Gdowski
Opublikowane w:
Computer Science, Medicine Entropy, Numer 1, 2021, ISSN 1099-4300
Wydawca:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/e23060776
Autorzy:
Kirsi Aaltola, Harri Ruoslahti
Opublikowane w:
Information & Security: An International Journal, Numer 46/1, 2020, Strona(/y) 53-64, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4604
Autorzy:
Todor Tagarev; Bríd Á. Davis; Michael Cooke
Opublikowane w:
Multimedia Tools and Applications, Numer 1, 2021, ISSN 1445-3312
Wydawca:
Springer
DOI:
10.1007/s11042-021-11109-2
Autorzy:
Todor Tagarev
Opublikowane w:
Future Internet, Numer 12/4, 2020, Strona(/y) 62, ISSN 1999-5903
Wydawca:
MDPI
DOI:
10.3390/fi12040062
Autorzy:
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos
Opublikowane w:
IEEE Access, Numer 8, 2020, Strona(/y) 118559-118571, ISSN 2169-3536
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/ACCESS.2020.3004727
Autorzy:
Sergiy Dotsenko, Oleg Illiashenko, Sergii Kamenskyi, Vyacheslav Kharchenko
Opublikowane w:
Information & Security: An International Journal, Numer 43/3, 2019, Strona(/y) 294-304, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4322
Autorzy:
Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
Opublikowane w:
Information & Security: An International Journal, Numer 43/1, 2019, Strona(/y) 21-33, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4302
Autorzy:
Jyri Rajamäki, Ilkka Tikanmäki, Jari Räsänen
Opublikowane w:
Information & Security: An International Journal, Numer 43/2, 2019, Strona(/y) 215-235, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4317
Autorzy:
Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos
Opublikowane w:
Journal of Information Security and Applications, Numer 53, 2020, Strona(/y) 102530, ISSN 2214-2126
Wydawca:
Elsevier
DOI:
10.1016/j.jisa.2020.102530
Autorzy:
Jussi Simola
Opublikowane w:
Information & Security: An International Journal, Numer 43/2, 2019, Strona(/y) 175-195, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4315
Autorzy:
Sergiy Dotsenko, Oleg Illiashenko, Sergii Kamenskyi, Vyacheslav Kharchenko
Opublikowane w:
Information & Security: An International Journal, Numer 43/3, 2019, Strona(/y) 305-317, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4323
Autorzy:
Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, Georgios Pangalos
Opublikowane w:
Future Internet, Numer 11/7, 2019, Strona(/y) 162, ISSN 1999-5903
Wydawca:
MDPI
DOI:
10.3390/fi11070162
Autorzy:
Marcin Niemiec, Andrzej Dziech, Miłosz Stypiński, Jan Derkacz
Opublikowane w:
Information & Security: An International Journal, Numer 43/1, 2019, Strona(/y) 62-72, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4306
Autorzy:
Kirsi Aaltola, Petteri Taitto
Opublikowane w:
Information & Security: An International Journal, Numer 43/2, 2019, Strona(/y) 123-133, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4311
Autorzy:
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos
Opublikowane w:
Computers, Numer 9/1, 2020, Strona(/y) 18, ISSN 2073-431X
Wydawca:
MDPI
DOI:
10.3390/computers9010018
Autorzy:
Jouni Pöyhönen, Viivi Nuojua, Martti Lehto, Jyri Rajamäki
Opublikowane w:
Information & Security: An International Journal, Numer 43/2, 2019, Strona(/y) 236-256, ISSN 0861-5160
Wydawca:
Procon Ltd.
DOI:
10.11610/isij.4318
Autorzy:
Georgi Penchev, Antoniya Shalamanova
Opublikowane w:
Information & Security: An International Journal, Numer 46/1, 2020, Strona(/y) 99-113, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4607
Autorzy:
Vyacheslav Kharchenko
Opublikowane w:
Information & Security: An International Journal, Numer 47/1, 2020, Strona(/y) 125-134, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4708
Autorzy:
Jussi, Simola
Opublikowane w:
Journal of Information Warfare: 20 pp. 17-32 (1)., Numer 1, 2021, ISSN 1445-3312
Wydawca:
Journal of Information Warfare: 20 pp. 17-32 (1).
DOI:
10.5281/zenodo.5566578
Autorzy:
Todor Tagarev, Salvatore Marco Pappalardo, Nikolai Stoianov
Opublikowane w:
Information & Security: An International Journal, Numer 47/1, 2020, Strona(/y) 13-26, ISSN 0861-5160
Wydawca:
Information & Security: An International Journal
DOI:
10.11610/isij.4701
Autorzy:
Simola Jussi
Opublikowane w:
Digital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84, Numer 1, 2021, ISBN 978-3-030-65722-2
Wydawca:
Springer
DOI:
10.1007/978-3-030-65722-2_9
Autorzy:
Miralem Mehic, Marcin Niemiec, Harun Siljak, Miroslav Voznak
Opublikowane w:
Reversible Computation: Extending Horizons of Computing - Selected Results of the COST Action IC1405, Numer 12070, 2020, Strona(/y) 222-236, ISBN 978-3-030-47360-0
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-47361-7_11
Wyszukiwanie danych OpenAIRE...
Podczas wyszukiwania danych OpenAIRE wystąpił błąd
Brak wyników