Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Organization sPecific Threat Intelligence Mining and sharing

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Data Management Plan (opens in new window)

The Data Management Plan describes the data management life cycle for all data sets that will be collected processed or generated by the action It is a document describing what data will be collected processed or generated and following what methodology and standards whether and how this data will be shared andor made open and how it will be curated and preserved

Communication, Dissemination & Outreach Plan (opens in new window)

The plan describes the planned measures to maximize the impact of the project, including the dissemination and exploitation measures that are planned, and the target group(s) addressed. Regarding communication measures and public engagement strategy, the aim is to inform and reach out to society and show the activities performed, and the use and the benefits the project will have for citizens

Publications

Effectiveness of machine learning based android malware detectors against adversarial attacks (opens in new window)

Author(s): Jyothish, A., Mathew, A. & Vinod, P
Published in: Cluster Computing, 2023, ISSN 1573-7543
Publisher: Springer
DOI: 10.1007/s10586-023-04086-8

Computer Communications (opens in new window)

Author(s): Sameera, K. M., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman KA, P. Vinod, and Mauro Conti.
Published in: Computer Communications, 2024, ISSN 0140-3664
Publisher: Elsevier BV
DOI: 10.1016/j.comcom.2024.04.024

vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment (opens in new window)

Author(s): Avantika Gaur, Preeti Mishra, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Tupakula, Mauro Conti
Published in: Computers and Electrical Engineering, Issue 120, 2024, ISSN 0045-7906
Publisher: Elsevier BV
DOI: 10.1016/j.compeleceng.2024.109742

SecDefender: Detecting low-quality models in multidomain federated learning systems (opens in new window)

Author(s): Sameera K.M., Arnaldo Sgueglia, Vinod P., Rafidha Rehiman K.A., Corrado Aaron Visaggio, Andrea Di Sorbo, Mauro Conti
Published in: Future Generation Computer Systems, Issue 164, 2024, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2024.107587

Deep learning fusion for effective malware detection: leveraging visual features (opens in new window)

Author(s): Jahez Abraham Johny, K. A. Asmitha, P. Vinod, G. Radhamani, K. A. Rafidha Rehiman, Mauro Conti
Published in: Cluster Computing, Issue 28, 2024, ISSN 1386-7857
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s10586-024-04723-w

Android malware defense through a hybrid multi-modal approach (opens in new window)

Author(s): Asmitha K.A., Vinod P., Rafidha Rehiman K.A., Neeraj Raveendran, Mauro Conti
Published in: Journal of Network and Computer Applications, Issue 233, 2024, ISSN 1084-8045
Publisher: Elsevier BV
DOI: 10.1016/j.jnca.2024.104035

Through the static: Demystifying malware visualization via explainability (opens in new window)

Author(s): Matteo Brosolo, Vinod P., Mauro Conti
Published in: Journal of Information Security and Applications, Issue 91, 2025, ISSN 2214-2126
Publisher: Elsevier BV
DOI: 10.1016/J.JISA.2025.104063

Deep learning vs. adversarial noise: a battle in malware image analysis (opens in new window)

Author(s): Asmitha, K. A., Vinod Puthuvath, K. A. Rafidha Rehiman, and S. L. Ananth.
Published in: Cluster Computing, 2024, ISSN 1573-7543
Publisher: Springer
DOI: 10.1007/s10586-024-04397-4

OSTIS: A novel Organization-Specific Threat Intelligence System (opens in new window)

Author(s): Dincy R. Arikkat, Vinod P., Rafidha Rehiman K.A., Serena Nicolazzo, Antonino Nocera, Georgiana Timpau, Mauro Conti
Published in: Computers & Security, Issue 145, 2024, ISSN 0167-4048
Publisher: Elsevier BV
DOI: 10.1016/j.cose.2024.103990

LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network (opens in new window)

Author(s): Sameera K.M., Vinod P., Rafidha Rehiman K.A., Mauro Conti
Published in: Computer Networks, Issue 254, 2024, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.1016/j.comnet.2024.110768

SeCTIS: A framework to Secure CTI Sharing (opens in new window)

Author(s): Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K.A., Serena Nicolazzo, Antonino Nocera, Vinod P.
Published in: Future Generation Computer Systems, Issue 164, 2024, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2024.107562

Interpretable PDF Malware Detector (opens in new window)

Author(s): Sneha Rajagopal C.H.M.M College For Advanced Studies, Trivandrum, Kerala, India ; Avanthika Gaur; P. Vinod
Published in: SINCONF, 2023, ISBN 979-8-3503-4321-2
Publisher: IEEE
DOI: 10.1109/SIN60469.2023.10474653

Relation Extraction Techniques in Cyber Threat Intelligence (opens in new window)

Author(s): Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Mauro Conti
Published in: Lecture Notes in Computer Science, Natural Language Processing and Information Systems, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-70239-6_24

SoK: Visualization-based Malware Detection Techniques (opens in new window)

Author(s): Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman, Mauro Conti
Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2025
Publisher: ACM
DOI: 10.1145/3664476.3664514

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0