Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Requirements and reference architecture of the cyber-physical IDS (interim version) (opens in new window)
Taxonomies (opens in new window)
Impact assessment intermediate report (opens in new window)
Design of the Distributed IDS for IACS (interim version) (opens in new window)
Innovation & IPR Plan (opens in new window)
Requirements and reference architecture of the cyber-physical IDS (final version) (opens in new window)
Exploitation management (report & post-project plan) and business model final report (opens in new window)
Final Report on the Distribution of the Community’s Contribution (opens in new window)
Final Activity Report (opens in new window)
First Periodic Management Report (opens in new window)
Integration Report (1st release) (opens in new window)
Integration Report (2nd release) (opens in new window)
Integration Plan (opens in new window)
Impact assessment methodology and criteria (opens in new window)
Design and development Plan (opens in new window)
Societal Impact Interim Report (opens in new window)
Final ATENA prototype validation and evaluation of validation results (Final report) (opens in new window)
Impact assessment preliminary report (opens in new window)
Design and development report of the 2nd release of components (opens in new window)
Requirements and reference architecture of DSS (final report) (opens in new window)
Patentability Report (opens in new window)
Design of the Distributed IDS for IACS (final version) (opens in new window)
Exploitation management (report & re-viewed plan) and business model interim report (opens in new window)
Validation system implementation and aggregation (Interim report) (opens in new window)
Impact assessment final report (opens in new window)
Validation Plan (opens in new window)
Training, dissemination and communication (final report) (opens in new window)
Societal Impact Final Report (opens in new window)
IACS-oriented security components (opens in new window)
Exploitation plan (opens in new window)
First Report on the Distribution of the Community’s Contribution (opens in new window)
State of the art (opens in new window)
Second Periodic Activity Report (opens in new window)
Standardization Final report (opens in new window)
Requirements and reference architecture of DSS (interim report) (opens in new window)
Second Periodic Report on the Distribution of the Community’s Contribution (opens in new window)
Design and development report of the 1st release of components (opens in new window)
Standardization interim report (opens in new window)
First Periodic Activity Report (opens in new window)
Security Defined Software (interim report) (opens in new window)
Final Management Report (opens in new window)
Second Periodic Management Report (opens in new window)
Quality Plan (opens in new window)
Security Defined Software (final report) (opens in new window)
Training, dissemination and communication (interim report) (opens in new window)

Publications

Network composition for optimal disturbance rejection (opens in new window)

Author(s): Riccardo Santini, Andrea Gasparri, Fabio Pasqualetti, Stefano Panzieri
Published in: 2016 American Control Conference (ACC), Issue 2016, 2016, Page(s) 3764-3769, ISBN 978-1-4673-8682-1
Publisher: IEEE
DOI: 10.1109/ACC.2016.7525499

Improved Multi-Criteria Distribution Network Reconfiguration with Information Fusion (opens in new window)

Author(s): Dario Masucci, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri
Published in: 19th International Conference on Information Fusion (FUSION 2016), Issue 2016, 2016, Page(s) 256-263, ISBN 978-0-9964-5274-8
Publisher: IEEE
DOI: 10.5281/zenodo.2649901

Smart Behavioural Filter for SCADA Network (opens in new window)

Author(s): Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri
Published in: Industrial Networks and Intelligent Systems. INISCOM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 188, Issue Volume 188, 2017, Page(s) 101-110, ISBN 978-3-319-52569-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-52569-3_9

Security implications of SCADA ICS virtualization: survey and future trends (opens in new window)

Author(s): Cruz, Tiago and Queiroz, Rui and Simoes, Paulo and Monteiro, Edmundo
Published in: Proceedings of the 15th European Conference on Cyber Warfare and Security (Eccws 2016), 2016, Page(s) 74-83
Publisher: Academic Publishing International (API)
DOI: 10.13140/RG.2.1.1064.2167

Attacking SCADA systems: A practical perspective (opens in new window)

Author(s): Luis Rosa, Tiago Cruz, Paulo Simoes, Edmundo Monteiro, Leonid Lev
Published in: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017, Page(s) 741-746, ISBN 978-3-901882-89-0
Publisher: IEEE
DOI: 10.23919/INM.2017.7987369

Active distribution grids: A MatLab-Simulink tool for energy performance analysis (opens in new window)

Author(s): E. Ciancamerla, M. Minichino, M.C. Falvo, L. Martirano
Published in: 2016 AEIT International Annual Conference (AEIT), 2016, Page(s) 1-5, ISBN 978-8-8872-3730-6
Publisher: IEEE
DOI: 10.23919/AEIT.2016.7892749

Building an NFV-based vRGW: Lessons learned (opens in new window)

Author(s): Jorge Proenca, Tiago Cruz, Paulo Simoes, Goncalo Gaspar, Bruno Parreira, Alexandre Laranjeira, Fernando Bastos
Published in: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, Page(s) 653-658, ISBN 978-1-5090-6196-9
Publisher: IEEE
DOI: 10.1109/CCNC.2017.7983208

On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks (opens in new window)

Author(s): Alessandro Di Giorgio, Alessandro Giuseppi, Francesco Liberati, Antonio Ornatelli, Antonio Rabezzano, Lorenzo Ricciardi Celsi
Published in: 2017 25th Mediterranean Conference on Control and Automation (MED), 2017, Page(s) 986-992, ISBN 978-1-5090-4533-4
Publisher: IEEE
DOI: 10.1109/MED.2017.7984247

Cyber attacks on SCADA of critical infrastructures by an hybrid testbed

Author(s): E. Ciancamerla, B. Fresilli, M. Minichino, T. Patriarca
Published in: 6th International Defense and Homeland Security Simulation Workshop, DHSS, Larnaca, Cyprus 26-28 September 201, 2016, Page(s) 15-24, ISBN 978-1-5108-3084-4
Publisher: Dime University of Genoa

Controlled electricity distribution network black start with energy storage system support (opens in new window)

Author(s): Alessandro Di Giorgio, Alessandro Giuseppi, Francesco Liberati, Antonio Pietrabissa
Published in: 2017 25th Mediterranean Conference on Control and Automation (MED), 2017, Page(s) 781-786, ISBN 978-1-5090-4533-4
Publisher: IEEE
DOI: 10.1109/MED.2017.7984213

Security for mobile device assets: a survey

Author(s): Lima, A. and Tiago Cruz and Sousa, B. and Simões P.
Published in: Proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2017, Page(s) 227-236, ISBN 978-1-911218-26-5
Publisher: Academic Conferences and Publishing Limited

Dynamic Risk Analyses Based on a Risk Taxonomy for Critical Infrastructures (opens in new window)

Author(s): Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann
Published in: Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science, Issue vol. 10242, 2017, Page(s) 163-175, ISBN 978-3-319-71367-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-71368-7_14

An evolved security architecture for distributed Industrial Automation and Control Systems

Author(s): Rosa, L. and Proença, J.D.G. and Henriques, J.P. and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Monteiro, E.
Published in: Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017), 2017, Page(s) 380-390, ISBN 978-1-911218-43-2
Publisher: Academic Conferences and Publishing Limited

Machine Learning for Reliable Network Attack Detection in SCADA Systems

Author(s): Lopez Perez, Rocio; Adamsky, Florian; Soua, Ridha; Engel, Thomas
Published in: Proceedings The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18). (2018)., Issue 2018 IEEE Trustcom/BigDataSE, 2018, Page(s) 633-638, ISBN 978-1-5386-4387-7
Publisher: IEEE

A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning (opens in new window)

Author(s): Martina Panfili, Alessandro Giuseppi, Andrea Fiaschetti, Homoud B. Al-Jibreen, Antonio Pietrabissa, Franchisco Delli Priscoli
Published in: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 460-465, ISBN 978-1-5386-7890-9
Publisher: IEEE
DOI: 10.1109/MED.2018.8442695

Distributed Wardrop Load Balancing in Multi-MTU SCADA Systems (opens in new window)

Author(s): Vincenzo Suraci, Lorenzo Ricciardi Celsi, Alessandro Giuseppi, Gioacchino Manfredi, Alessandro Di Giorgio
Published in: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 1-9, ISBN 978-1-5386-7890-9
Publisher: IEEE
DOI: 10.1109/med.2018.8442485

Risk Adverse Virtual Power Plant Control in Unsecure Power Systems (opens in new window)

Author(s): Alessandro Giuseppi, Roberto Germana, Alessandro Di Giorgio
Published in: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 1-9, ISBN 978-1-5386-7890-9
Publisher: IEEE
DOI: 10.1109/med.2018.8442768

Machine Learning for Reliable Network Attack Detection in SCADA Systems (opens in new window)

Author(s): Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel
Published in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 633-638, ISBN 978-1-5386-4388-4
Publisher: IEEE
DOI: 10.1109/trustcom/bigdatase.2018.00094

Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems (opens in new window)

Author(s): Lopez Perez, Rocio; Adamsky, Florian; Soua, Ridha; Engel, Thomas
Published in: EAI Endorsed Transactions on Security and Safety. European Alliance for Innovation (EAI) (2019)., Issue 1, 2019
Publisher: European Alliance for Innovation (EAI)
DOI: 10.4108/eai.25-1-2019.159348

Detecting Integrity Attacks in IoT-based Cyber Physical Systems: a Case Study on Hydra Testbed (opens in new window)

Author(s): Federica Battisti, Giuseppe Bernieri, Marco Carli, Michela Lopardo, Federica Pascucci
Published in: 2018 Global Internet of Things Summit (GIoTS), 2018, Page(s) 1-6, ISBN 978-1-5386-6451-3
Publisher: IEEE
DOI: 10.1109/giots.2018.8534437

Modeling and simulation of Critical Infrastructures Interdependencies for risk mitigation (opens in new window)

Author(s): Iassinovski, Serguei; Minichino, Michele; Ciancamerla, Ester
Published in: Congress on Intelligent Systems and Information Technologies (IS&IT'17), Issue 1, 2019
Publisher: Physmathlit
DOI: 10.5281/zenodo.3067463

Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection

Author(s): Rinaldi, Giulia; Adamsky, Florian; Soua, Ridha; Baiocchi, Andrea; Engel, Thomas
Published in: 10th International Conference on Networks of the Future (NoF). (2019)., Issue 5, 2019
Publisher: authors' pre-print, to be published

Heterogeneous and distributed simulation models for Critical Infrastructures Interdependencies analysis and risk mitigation (opens in new window)

Author(s): Iassinovski, Serguei; Ciancamerla, Ester; Fresilli, Benedetto; Lavalle, Luisa; Patriarca, Tatiana; Tofani, Alberto
Published in: Congress on Intelligent Systems and Information Technologies (IS&IT'18), Issue 1, 2019
Publisher: Physmathlit
DOI: 10.5281/zenodo.3055109

Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective (opens in new window)

Author(s): Riccardo Colelli, Stefano Panzieri, Federica Pascucci
Published in: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), 2018, Page(s) 1171-1174, ISBN 978-1-5386-7108-5
Publisher: IEEE
DOI: 10.1109/ETFA.2018.8502495

Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms (opens in new window)

Author(s): Alessandro Giuseppi, Andrea Tortorelli, Roberto Germana, Francesco Liberati, Andrea Fiaschetti
Published in: 2019 27th Mediterranean Conference on Control and Automation (MED), 2019, Page(s) 50-56, ISBN 978-1-7281-2803-0
Publisher: IEEE
DOI: 10.1109/MED.2019.8798506

A Framework for Improved Home Network Security (pre-print)

Author(s): A. Craveiro, A. Oliveira, J. Proença, T. Cruz, P. Simões
Published in: 18th European Conference on Cyber Warfare and Security (ECCWS 2019), 2019
Publisher: not yet published

Leveraging virtualization techniques for improving SCADA ICS Security and Reliability

Author(s): T Cruz, R Queiroz, J Proença, P Simões, E Monteiro
Published in: Journal of Information Warfare, Issue Volume 15, Issue 3, 2016, Page(s) 81-100, ISSN 1445-3312
Publisher: Teamlink Australia

Towards energy efficiency of interdependent urban networks (opens in new window)

Author(s): Giuseppe Alonge, Ester Ciancamerla, Alberto Mastrilli, Michele Minichino, Angelo Nicotra, Marco Ranno, Maurizio Reali, Pasquale Regina
Published in: International Journal of Simulation and Process Modelling, Issue 11/6, 2016, Page(s) 529, ISSN 1740-2123
Publisher: Inderscience Publishers
DOI: 10.1504/ijspm.2016.082923

Virtualizing Programmable Logic Controllers: Toward a Convergent Approach (opens in new window)

Author(s): Tiago Cruz, Paulo Simoes, Edmundo Monteiro
Published in: IEEE Embedded Systems Letters, Issue 8/4, 2016, Page(s) 69-72, ISSN 1943-0663
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/les.2016.2608418

Robust protection scheme against cyber-physical attacks in power systems (opens in new window)

Author(s): Alessandro Di Giorgio, Antonio Pietrabissa, Francesco DelliPriscoli, Alberto Isidori
Published in: IET Control Theory & Applications, Issue 12/13, 2018, Page(s) 1792-1801, ISSN 1751-8644
Publisher: Institution of Engineering and Technology
DOI: 10.1049/iet-cta.2017.0725

Integrated protection of industrial control systems from cyber-attacks: the ATENA approach (opens in new window)

Author(s): F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa, R. Soua
Published in: International Journal of Critical Infrastructure Protection, Issue 21, 2018, Page(s) 72-82, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2018.04.004

Economic Model Predictive and Feedback Control of a Smart Grid Prosumer Node (opens in new window)

Author(s): Francesco Liberati, Alessandro Di Giorgio
Published in: Energies, Issue 11/1, 2018, Page(s) 48, ISSN 1996-1073
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/en11010048

A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation (opens in new window)

Author(s): Luis Rosa, Miguel Freitas, Sergey Mazo, Edmundo Monteiro, Tiago Cruz, Paulo Simoes
Published in: IEEE Access, Issue 7, 2019, Page(s) 42156-42168, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2906926

From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment (opens in new window)

Author(s): Chiara Foglietta, Dario Masucci, Cosimo Palazzo, Riccardo Santini, Stefano Panzieri, Luis Rosa, Tiago Cruz, Leonid Lev
Published in: IEEE Systems Journal, Issue 13/1, 2019, Page(s) 424-435, ISSN 1932-8184
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/JSYST.2018.2824252

A stealth monitoring mechanism for cyber-physical systems (opens in new window)

Author(s): Vitor Graveto, Luís Rosa, Tiago Cruz, Paulo Simões
Published in: International Journal of Critical Infrastructure Protection, Issue 24, 2019, Page(s) 126-143, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2018.10.006

Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence (opens in new window)

Author(s): Konstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro, Paulo Simoes
Published in: IEEE Access, Issue 6, 2018, Page(s) 59705-59727, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2018.2875068

Smart Behavioural Filter for Industrial Internet of Things (opens in new window)

Author(s): Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri
Published in: Mobile Networks and Applications, Issue 23/4, 2018, Page(s) 809-816, ISSN 1383-469X
Publisher: Baltzer Science Publishers B.V.
DOI: 10.1007/s11036-017-0882-1

On the Use of Ontology Data for Protecting Critical Infrastructures (pre-print)

Author(s): Henriques, J.P., Caldeira F., Cruz, T., and Simões, P.
Published in: Journal of Information Warfare, Issue "Vol. 17, #4", 2019, Page(s) 38-55, ISSN 1445-3312
Publisher: Journal of Information Warfare

SDN-Enabled Virtual Data Diode (opens in new window)

Author(s): Miguel Borges de Freitas, Luis Rosa, Tiago Cruz, Paulo Simões
Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 102-118, ISBN 978-3-030-12785-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-12786-2_7

Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process (opens in new window)

Author(s): Ivo Frazão, Pedro Henriques Abreu, Tiago Cruz, Hélder Araújo, Paulo Simões
Published in: Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers, Issue 11260, 2019, Page(s) 230-235, ISBN 978-3-030-05848-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-05849-4_19

Network Softwarization for IACS Security Applications

Author(s): Freitas, Miguel Rosado Borges de
Published in: Issue 1, 2018
Publisher: UNIVERSIDADE DE COIMBRA

Cyber-security Modbus ICS Dataset (opens in new window)

Author(s): I. Frazão, P. Abreu, T. Cruz, H Araújo, P. Simões
Published in: 2019
Publisher: IEEE
DOI: 10.21227/pjff-1a03

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0