Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

artificial Intelligence threat Reporting and Incident response System

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Report on policy recommendations (öffnet in neuem Fenster)

D8.7 will report on the progress and work of Task 8.4 on standardisation and policy recommendations. It will provide all the inputs collected throughout the project on standardisation including a potential gap analysis. It will also summarise the main policy recommendations coming from the project, based on elicitation with key stakeholders and the expert group setup for this purpose. It's linked to T8.4.

Report on connection with stakeholders (öffnet in neuem Fenster)

D8.8 will report on the progress and work of Task 8.5 on liaison with relevant stakeholders. It will summarise all the activities undertaken during the lifetime of the project as regards networking, liaising and community building. This will include exchange of information with stakeholders, workshops attended and organised, as well as a report on the launch event and the final exploitation workshop. It's linked to T8.5.

Interim report on dissemination, communication, standardisation and exploitation (öffnet in neuem Fenster)

D8.4 will include all dissemination, communication and standardisation activities that have been undertaken, during the first two (2) years of the project, and those still planned. It's linked to T8.1, T8.2, T8.3 and T8.4.

User and technical requirements (öffnet in neuem Fenster)

A report on the user technical requirements that the IRIS platform will have to satisfy as identified in T22 Its linked to T22

IRIS evaluation and impact assessment (öffnet in neuem Fenster)

This document will describe social acceptance strategy of the IRIS technology and provide results from the social acceptance assessment of the proposed solution. It's linked to T2.6.

IRIS cyber range platform (öffnet in neuem Fenster)

This deliverable will present the IRIS cyber range environment platform architecture and deployment. It's linked to T5.3.

Final report on dissemination, communication, standardisation and exploitation (öffnet in neuem Fenster)

D8.5 will document all dissemination, communication and standardisation activities that have been undertaken, during the second half of the project duration. It will also summarise the most important dissemination, communication and standardisation achievements of IRIS during the project lifetime. It's linked to T8.1.

IRIS lab pods for CERTs/CSIRTs (öffnet in neuem Fenster)

A report and prototype of the IRIS lab pods for CERTs/CSIRTs. It's linked to T5.3.

Ethics and data protection requirements specification (öffnet in neuem Fenster)

This deliverable will analyze ethical and legal risks by which partners will derive protection measures and constraints to be implemented within the IRIS platform Its linked to T23

Plans for dissemination, communication, and exploitation (öffnet in neuem Fenster)

A coordinated dissemination and communication plan will be defined in D82 and will be maintainedupdated throughout the project D82 will describe how IRIS will establish and follow highly effective dissemination and communication activities to promote the project It will also record how the results are being exploited Its linked to T81

APIs and data models for the integration of smart city's infrastructure with the IRIS platform (öffnet in neuem Fenster)

A report on the results of the development of API and data models for the integration of smart city’s infrastructure with the IRIS platform will be presented. It's linked to T6.1.

Vision scenarios and use cases definition (öffnet in neuem Fenster)

This deliverable will report on the activities of Task T21 and will elaborate on the IRIS pilot use cases Its linked to T21

Initial report on dissemination, communication, standardisation and exploitation (öffnet in neuem Fenster)

D83 will include all dissemination and communication activities that have been undertaken during the first twelve 12 months of the project and those still planned The deliverable will also include the analysis of the standardization landscape and policies relevant for IRIS Its linked to T81 T82 T83 and T84

Human factors for co-design methodology (öffnet in neuem Fenster)

This deliverable will describe the IRIS methodology for human factors identification for codesign of effective crossborder threat intelligence sharing Its linked to T24

IRIS-enhanced MeliCERTes platform (öffnet in neuem Fenster)

A demonstrator of the IRIS-enhanced MeliCERTes platform providing advanced dashboard, extended knowledge base, diverse communities of users, and customized views and access to shared information. It's linked to T4.6

IRIS scenario and asset catalogue (öffnet in neuem Fenster)

This deliverable will report on IRIS’s collection of training scenarios and their assets. It's linked to T5.2.

Project website (öffnet in neuem Fenster)

The IRIS website will be launched at the start of the project Apart from the public website accessible from all internet users a private part will also exist accessible only to consortium members Its linked to T81

Veröffentlichungen

FLVoogd: Robust And Privacy Preserving Federated Learning (öffnet in neuem Fenster)

Autoren: Tian Yuhang, Wang Rui, Qiao Yanqi, Panaousis Emmanouil, Liang Kaitai
Veröffentlicht in: ACLM 2022, 2022
Herausgeber: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.8198995

Threat intelligence using Digital Twin honeypots in Cybersecurity (öffnet in neuem Fenster)

Autoren: Maria Nintsiou, Elisavet Grigoriou, Paris Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis Sarigiannidis
Veröffentlicht in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023, Seite(n) 530-537
Herausgeber: IEEE
DOI: 10.1109/csr57506.2023.10224997

ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms (öffnet in neuem Fenster)

Autoren: Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst
Veröffentlicht in: 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024, Seite(n) 1-6
Herausgeber: IEEE
DOI: 10.23919/date58400.2024.10546519

VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents (öffnet in neuem Fenster)

Autoren: Lambregts, S., Chen, H., Ning, J., Liang, K.
Veröffentlicht in: ESORICS 2022, 2022
Herausgeber: Springer
DOI: 10.1007/978-3-031-17140-6_32

Fine-Grained Coverage-Based Fuzzing (öffnet in neuem Fenster)

Autoren: Bernard Nongpoh, Marwan Nour, Michael Marcozzi, S ébastien Bardin
Veröffentlicht in: The Network and Distributed System Security (NDSS) Symposium 2022 (NDSS 2022), 2022
Herausgeber: NDSS Symposium 2022
DOI: 10.14722/fuzzing.2022.23007

DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay (öffnet in neuem Fenster)

Autoren: Yubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin
Veröffentlicht in: ESORICS 2022 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, 2022, Seite(n) 86–104
Herausgeber: Springer
DOI: 10.1007/978-3-031-17146-8_5

No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent (öffnet in neuem Fenster)

Autoren: Chen, H., Fu, S., Liang, K.
Veröffentlicht in: ESORICS 2022, 2022
Herausgeber: Springer
DOI: 10.1007/978-3-031-17140-6_19

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks (öffnet in neuem Fenster)

Autoren: Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek
Veröffentlicht in: ACSAC 2022, 2022
Herausgeber: ACM
DOI: 10.5281/zenodo.8344605

SiHoneypot: A Digital Twin-Based Honeypot for Autonomous Vehicles (öffnet in neuem Fenster)

Autoren: Athanasios Liatifis, Charis Eleftheriadis, Zisis Mpatzos, Ioannis Nanos, Thomas Lagkas, Sotirios Goudos, Vasileios Argyriou, Konstantinos E. Psannis, Ioannis D. Moscholios, Panagiotis Sarigiannidis
Veröffentlicht in: 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2024, Seite(n) 1-4
Herausgeber: IEEE
DOI: 10.1109/mocast61810.2024.10615785

A New Design for Self-Encryption (öffnet in neuem Fenster)

Autoren: Roland Kromes, João Rodrigues, Duarte Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang
Veröffentlicht in: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Ausgabe 38, 2024, Seite(n) 1645-1652
Herausgeber: IEEE
DOI: 10.1109/trustcom60117.2023.00224

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving (öffnet in neuem Fenster)

Autoren: Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Olaf Maennel, Ehsan Malayjerdi
Veröffentlicht in: Proceedings Inaugural International Symposium on Vehicle Security & Privacy, 2023
Herausgeber: Internet Society
DOI: 10.14722/vehiclesec.2023.23086

WordMarkov: A New Password Probability Model of Semantics (öffnet in neuem Fenster)

Autoren: Jiahong Xie; Rong Zhu; Haibo Cheng; Ping Wang; Kaitai Liang
Veröffentlicht in: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Seite(n) 3034-3038
Herausgeber: IEEE
DOI: 10.1109/ICASSP43922.2022.9746203

IRIS Advanced Threat Intelligence Orchestrator- A way to manage cyber security challenges of IoT ecosystems in Smart Cities (öffnet in neuem Fenster)

Autoren: Bilali, VG., Kosyvas, D., Theodoropoulos, T., Ouzounoglou, E., Karagiannidis, L., Amditis, A.
Veröffentlicht in: GIoTS 2022, Lecture Notes in Computer Science, 2022
Herausgeber: Springer
DOI: 10.1007/978-3-031-20936-9_25

IRIS User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability (öffnet in neuem Fenster)

Autoren: João Rodrigues, Gonçalo Cadete, Duarte NAscimento, Roland Kromes, Carmela Occhipinti, Lorena Volpini
Veröffentlicht in: RISE 2023, 2024
Herausgeber: RISE-SD
DOI: 10.5281/zenodo.13121554

PASSTRANS: AN IMPROVED PASSWORD REUSE MODEL BASED ON TRANSFORMER (öffnet in neuem Fenster)

Autoren: Xiaoxi He; Haibo Cheng; Jiahong Xie; Ping Wang; Kaitai Liang
Veröffentlicht in: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Seite(n) 3044-3048
Herausgeber: IEEE
DOI: 10.1109/ICASSP43922.2022.9746731

A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments (öffnet in neuem Fenster)

Autoren: Vasiliki Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis
Veröffentlicht in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Seite(n) 1-8
Herausgeber: ACM
DOI: 10.1145/3664476.3670939

Accelerating Blockchain Applications on IoT Architecture Models—Solutions and Drawbacks (öffnet in neuem Fenster)

Autoren: Roland Kromes, François Verdier
Veröffentlicht in: Distributed Ledger Technologies: Research and Practice, Ausgabe 3, 2024, Seite(n) 1-24, ISSN 2769-6480
Herausgeber: ACM Journal
DOI: 10.1145/3626200

Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain (öffnet in neuem Fenster)

Autoren: Roland Kromes, Tianyu Li, Maxime Bouillon, Talha Güler, Victor van der Hulst, Zekeriya Erkin
Veröffentlicht in: Sensors, Ausgabe 24, 2024, Seite(n) 986, ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s24030986

Toward the Conception of a Multichain to Meet Users' Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry (öffnet in neuem Fenster)

Autoren: Marta Ballatore, Luc Gerrits, Roland Kromes, Lise Arena, François Verdier
Veröffentlicht in: IEEE Transactions on Engineering Management, Ausgabe 71, 2024, Seite(n) 9994-10008, ISSN 0018-9391
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2023.3317208

Fine-Grained Coverage-Based Fuzzing (öffnet in neuem Fenster)

Autoren: WEI-CHENG WU; BERNARD NONGPOH; MARWAN NOUR; MICHAËL MARCOZZI; SÉBASTIEN BARDIN; CHRISTOPHE HAUSER
Veröffentlicht in: ACM Transactions on Software Engineering and Methodology, 2023, ISSN 1049-331X
Herausgeber: Association for Computing Machinary, Inc.
DOI: 10.1145/3587158

User Behavior Analysis for Malware Detection (öffnet in neuem Fenster)

Autoren: Valentina Dumitrasc, René Serral-Gracià
Veröffentlicht in: Lecture Notes in Computer Science, Computer Security. ESORICS 2023 International Workshops, 2024, Seite(n) 92-110
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-54129-2_6

Combining ID’s, Attributes, and Policies in Hyperledger Fabric (öffnet in neuem Fenster)

Autoren: Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Veröffentlicht in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2023, Seite(n) 32-48
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_3

ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract (öffnet in neuem Fenster)

Autoren: Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Veröffentlicht in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2024, Seite(n) 3-18
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_1

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption (öffnet in neuem Fenster)

Autoren: Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang
Veröffentlicht in: Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Seite(n) 105-125
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-17146-8_6

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor