Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

artificial Intelligence threat Reporting and Incident response System

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Report on policy recommendations (si apre in una nuova finestra)

D8.7 will report on the progress and work of Task 8.4 on standardisation and policy recommendations. It will provide all the inputs collected throughout the project on standardisation including a potential gap analysis. It will also summarise the main policy recommendations coming from the project, based on elicitation with key stakeholders and the expert group setup for this purpose. It's linked to T8.4.

Report on connection with stakeholders (si apre in una nuova finestra)

D8.8 will report on the progress and work of Task 8.5 on liaison with relevant stakeholders. It will summarise all the activities undertaken during the lifetime of the project as regards networking, liaising and community building. This will include exchange of information with stakeholders, workshops attended and organised, as well as a report on the launch event and the final exploitation workshop. It's linked to T8.5.

Interim report on dissemination, communication, standardisation and exploitation (si apre in una nuova finestra)

D8.4 will include all dissemination, communication and standardisation activities that have been undertaken, during the first two (2) years of the project, and those still planned. It's linked to T8.1, T8.2, T8.3 and T8.4.

User and technical requirements (si apre in una nuova finestra)

A report on the user technical requirements that the IRIS platform will have to satisfy as identified in T22 Its linked to T22

IRIS evaluation and impact assessment (si apre in una nuova finestra)

This document will describe social acceptance strategy of the IRIS technology and provide results from the social acceptance assessment of the proposed solution. It's linked to T2.6.

IRIS cyber range platform (si apre in una nuova finestra)

This deliverable will present the IRIS cyber range environment platform architecture and deployment. It's linked to T5.3.

Final report on dissemination, communication, standardisation and exploitation (si apre in una nuova finestra)

D8.5 will document all dissemination, communication and standardisation activities that have been undertaken, during the second half of the project duration. It will also summarise the most important dissemination, communication and standardisation achievements of IRIS during the project lifetime. It's linked to T8.1.

IRIS lab pods for CERTs/CSIRTs (si apre in una nuova finestra)

A report and prototype of the IRIS lab pods for CERTs/CSIRTs. It's linked to T5.3.

Ethics and data protection requirements specification (si apre in una nuova finestra)

This deliverable will analyze ethical and legal risks by which partners will derive protection measures and constraints to be implemented within the IRIS platform Its linked to T23

Plans for dissemination, communication, and exploitation (si apre in una nuova finestra)

A coordinated dissemination and communication plan will be defined in D82 and will be maintainedupdated throughout the project D82 will describe how IRIS will establish and follow highly effective dissemination and communication activities to promote the project It will also record how the results are being exploited Its linked to T81

APIs and data models for the integration of smart city's infrastructure with the IRIS platform (si apre in una nuova finestra)

A report on the results of the development of API and data models for the integration of smart city’s infrastructure with the IRIS platform will be presented. It's linked to T6.1.

Vision scenarios and use cases definition (si apre in una nuova finestra)

This deliverable will report on the activities of Task T21 and will elaborate on the IRIS pilot use cases Its linked to T21

Initial report on dissemination, communication, standardisation and exploitation (si apre in una nuova finestra)

D83 will include all dissemination and communication activities that have been undertaken during the first twelve 12 months of the project and those still planned The deliverable will also include the analysis of the standardization landscape and policies relevant for IRIS Its linked to T81 T82 T83 and T84

Human factors for co-design methodology (si apre in una nuova finestra)

This deliverable will describe the IRIS methodology for human factors identification for codesign of effective crossborder threat intelligence sharing Its linked to T24

IRIS-enhanced MeliCERTes platform (si apre in una nuova finestra)

A demonstrator of the IRIS-enhanced MeliCERTes platform providing advanced dashboard, extended knowledge base, diverse communities of users, and customized views and access to shared information. It's linked to T4.6

IRIS scenario and asset catalogue (si apre in una nuova finestra)

This deliverable will report on IRIS’s collection of training scenarios and their assets. It's linked to T5.2.

Project website (si apre in una nuova finestra)

The IRIS website will be launched at the start of the project Apart from the public website accessible from all internet users a private part will also exist accessible only to consortium members Its linked to T81

Pubblicazioni

FLVoogd: Robust And Privacy Preserving Federated Learning (si apre in una nuova finestra)

Autori: Tian Yuhang, Wang Rui, Qiao Yanqi, Panaousis Emmanouil, Liang Kaitai
Pubblicato in: ACLM 2022, 2022
Editore: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.8198995

Threat intelligence using Digital Twin honeypots in Cybersecurity (si apre in una nuova finestra)

Autori: Maria Nintsiou, Elisavet Grigoriou, Paris Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis Sarigiannidis
Pubblicato in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023, Pagina/e 530-537
Editore: IEEE
DOI: 10.1109/csr57506.2023.10224997

ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms (si apre in una nuova finestra)

Autori: Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst
Pubblicato in: 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024, Pagina/e 1-6
Editore: IEEE
DOI: 10.23919/date58400.2024.10546519

VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents (si apre in una nuova finestra)

Autori: Lambregts, S., Chen, H., Ning, J., Liang, K.
Pubblicato in: ESORICS 2022, 2022
Editore: Springer
DOI: 10.1007/978-3-031-17140-6_32

Fine-Grained Coverage-Based Fuzzing (si apre in una nuova finestra)

Autori: Bernard Nongpoh, Marwan Nour, Michael Marcozzi, S ébastien Bardin
Pubblicato in: The Network and Distributed System Security (NDSS) Symposium 2022 (NDSS 2022), 2022
Editore: NDSS Symposium 2022
DOI: 10.14722/fuzzing.2022.23007

DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay (si apre in una nuova finestra)

Autori: Yubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin
Pubblicato in: ESORICS 2022 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, 2022, Pagina/e 86–104
Editore: Springer
DOI: 10.1007/978-3-031-17146-8_5

No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent (si apre in una nuova finestra)

Autori: Chen, H., Fu, S., Liang, K.
Pubblicato in: ESORICS 2022, 2022
Editore: Springer
DOI: 10.1007/978-3-031-17140-6_19

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks (si apre in una nuova finestra)

Autori: Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek
Pubblicato in: ACSAC 2022, 2022
Editore: ACM
DOI: 10.5281/zenodo.8344605

SiHoneypot: A Digital Twin-Based Honeypot for Autonomous Vehicles (si apre in una nuova finestra)

Autori: Athanasios Liatifis, Charis Eleftheriadis, Zisis Mpatzos, Ioannis Nanos, Thomas Lagkas, Sotirios Goudos, Vasileios Argyriou, Konstantinos E. Psannis, Ioannis D. Moscholios, Panagiotis Sarigiannidis
Pubblicato in: 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2024, Pagina/e 1-4
Editore: IEEE
DOI: 10.1109/mocast61810.2024.10615785

A New Design for Self-Encryption (si apre in una nuova finestra)

Autori: Roland Kromes, João Rodrigues, Duarte Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang
Pubblicato in: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Numero 38, 2024, Pagina/e 1645-1652
Editore: IEEE
DOI: 10.1109/trustcom60117.2023.00224

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving (si apre in una nuova finestra)

Autori: Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Olaf Maennel, Ehsan Malayjerdi
Pubblicato in: Proceedings Inaugural International Symposium on Vehicle Security & Privacy, 2023
Editore: Internet Society
DOI: 10.14722/vehiclesec.2023.23086

WordMarkov: A New Password Probability Model of Semantics (si apre in una nuova finestra)

Autori: Jiahong Xie; Rong Zhu; Haibo Cheng; Ping Wang; Kaitai Liang
Pubblicato in: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Pagina/e 3034-3038
Editore: IEEE
DOI: 10.1109/ICASSP43922.2022.9746203

IRIS Advanced Threat Intelligence Orchestrator- A way to manage cyber security challenges of IoT ecosystems in Smart Cities (si apre in una nuova finestra)

Autori: Bilali, VG., Kosyvas, D., Theodoropoulos, T., Ouzounoglou, E., Karagiannidis, L., Amditis, A.
Pubblicato in: GIoTS 2022, Lecture Notes in Computer Science, 2022
Editore: Springer
DOI: 10.1007/978-3-031-20936-9_25

IRIS User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability (si apre in una nuova finestra)

Autori: João Rodrigues, Gonçalo Cadete, Duarte NAscimento, Roland Kromes, Carmela Occhipinti, Lorena Volpini
Pubblicato in: RISE 2023, 2024
Editore: RISE-SD
DOI: 10.5281/zenodo.13121554

PASSTRANS: AN IMPROVED PASSWORD REUSE MODEL BASED ON TRANSFORMER (si apre in una nuova finestra)

Autori: Xiaoxi He; Haibo Cheng; Jiahong Xie; Ping Wang; Kaitai Liang
Pubblicato in: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, Pagina/e 3044-3048
Editore: IEEE
DOI: 10.1109/ICASSP43922.2022.9746731

A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments (si apre in una nuova finestra)

Autori: Vasiliki Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis
Pubblicato in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, Pagina/e 1-8
Editore: ACM
DOI: 10.1145/3664476.3670939

Accelerating Blockchain Applications on IoT Architecture Models—Solutions and Drawbacks (si apre in una nuova finestra)

Autori: Roland Kromes, François Verdier
Pubblicato in: Distributed Ledger Technologies: Research and Practice, Numero 3, 2024, Pagina/e 1-24, ISSN 2769-6480
Editore: ACM Journal
DOI: 10.1145/3626200

Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain (si apre in una nuova finestra)

Autori: Roland Kromes, Tianyu Li, Maxime Bouillon, Talha Güler, Victor van der Hulst, Zekeriya Erkin
Pubblicato in: Sensors, Numero 24, 2024, Pagina/e 986, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s24030986

Toward the Conception of a Multichain to Meet Users' Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry (si apre in una nuova finestra)

Autori: Marta Ballatore, Luc Gerrits, Roland Kromes, Lise Arena, François Verdier
Pubblicato in: IEEE Transactions on Engineering Management, Numero 71, 2024, Pagina/e 9994-10008, ISSN 0018-9391
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2023.3317208

Fine-Grained Coverage-Based Fuzzing (si apre in una nuova finestra)

Autori: WEI-CHENG WU; BERNARD NONGPOH; MARWAN NOUR; MICHAËL MARCOZZI; SÉBASTIEN BARDIN; CHRISTOPHE HAUSER
Pubblicato in: ACM Transactions on Software Engineering and Methodology, 2023, ISSN 1049-331X
Editore: Association for Computing Machinary, Inc.
DOI: 10.1145/3587158

User Behavior Analysis for Malware Detection (si apre in una nuova finestra)

Autori: Valentina Dumitrasc, René Serral-Gracià
Pubblicato in: Lecture Notes in Computer Science, Computer Security. ESORICS 2023 International Workshops, 2024, Pagina/e 92-110
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-54129-2_6

Combining ID’s, Attributes, and Policies in Hyperledger Fabric (si apre in una nuova finestra)

Autori: Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Pubblicato in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2023, Pagina/e 32-48
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_3

ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract (si apre in una nuova finestra)

Autori: Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Pubblicato in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Blockchain Technology and Emerging Technologies, 2024, Pagina/e 3-18
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-31420-9_1

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption (si apre in una nuova finestra)

Autori: Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang
Pubblicato in: Lecture Notes in Computer Science, Computer Security – ESORICS 2022, 2022, Pagina/e 105-125
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-17146-8_6

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile