Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

RESIlience enhancement and risk control platform for communication infraSTructure Operators

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

RESISTO platform and tools reference architecture - first (opens in new window)

Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions.

Cyber-physical threat/ risk scenarios and pre-assessment - final (opens in new window)

Event ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database

KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - first (opens in new window)

Tabular Report and database

Risk and resilience management process for cyber-physical threats of telecom CI - first (opens in new window)

Report and digital specification

Countermeasures Draft Definition (opens in new window)

Main envisioned countermeasures definition and progress report about Decision Making Component

Description and definition of the Correlator intelligence (opens in new window)
Dissemination and Communication Activities - third (opens in new window)

Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)

Ethical, Societal and Gender Equality Protocol - first (opens in new window)

Ethical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members

Methods for cyber-physical security management for telecom CI - first (opens in new window)

Inventory including compliance with standards, rigor, effectiveness and efficiency; Tabular Report and database

Interim Software Defined Security System and Decision Making Module (opens in new window)

Interim Report of T5.2 and T5.3 activities

Analysis on Scenario 2 - tests results (1st run) (opens in new window)

Report on the first step test with corrective actions and final analysis of the second test T85

Ethical, Societal and Gender Equality Protocol - second (opens in new window)

Ethical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members

Validation Assessment and Best Practices - first (opens in new window)

Validation Assessment and Best Practices

Analysis on Scenario 3 - test results - final (opens in new window)

Report on the first step test with corrective actions and final analysis of the second test T95

KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - final (opens in new window)

Tabular Report and database

Scenario 2 Test plan definition (opens in new window)

Plan of the pilot, its requirements and design (T8.1, T8.2

Analysis on Scenario 3 - tests results (1st run) (opens in new window)

Report on the first step test with corrective actions and final analysis of the second test T95

Exploitation Activities - first (opens in new window)

Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)

Scenario 3 Test plan definit (opens in new window)

Plan of the pilot, its requirements and design (T9.1, T9.2)

HMI definition and Platform integration (opens in new window)

HMI Def. & integration activities (T6.4, T6.5)

Scenario 3 - 2nd run integration and setup (opens in new window)

Report on the integration of the 3 scenario 3 main use cases and 1 impacted use case and end users test plans T93 T94

Active and Passive Sensor Deployment Plan (opens in new window)

RESISTO detection systems release

Ethical, Societal and Gender Equality Protocol - final (opens in new window)

Ethical Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues including AB members

Advisory Board Activities Plan (opens in new window)

Report on AB events

Real Time Response and Mitigation Results (opens in new window)

Main envisioned countermeasures definition and progress report about Decision Making Component (T5.1)

Complete propagation analysis (opens in new window)
Dissemination and Communication Activities - second (opens in new window)

Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)

Communication material - first (opens in new window)

brochure, leaflets and posters to spread main RESISTO information and its results (T10.2)

Table-top read teaming results of RESISTO architecture, scenarios and use cases (opens in new window)

Table-top read teaming results of RESISTO architecture, scenarios and use cases Tabular report

Adaptors, DSS and Risk predictor (opens in new window)

Integr. Components Development (T6.2, T6.3, T6.4)

End user requirements for integrated cyber-physical risk and resilience management, platform and tools (opens in new window)

Report and digital user requirements specifications

Scenario 2 - 2nd run integration and setup (opens in new window)

Report on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84

Scenario 3 - 1st run integration and setup (opens in new window)

Report on the integration of the 3 scenario 3 main use cases and impacted use case and end users test plans T93 T94

RESISTO platform and tools reference architecture - final (opens in new window)

Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions

Cyber-physical threat/ risk scenarios and pre-assessment - first (opens in new window)

Event ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database

Techniques and Procedures for cyber/physical threats Detection (opens in new window)
Dissemination and Communication Activities - final (opens in new window)

Dissemination Standardisation and communication activities initial Plans and annual plan updates and reports T102 T106

Damage/ Vulnerability models for physical and cyber threats of telecom CI - final (opens in new window)

Report; software module specifications and algorithms

Exploitation Activities - second (opens in new window)

Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)

Dissemination and Communication Activities - first (opens in new window)

Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)

Scenario 2 - 1st run integration and setup (opens in new window)

Report on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84

Communication material - final (opens in new window)

brochure leaflets and posters to spread main RESISTO information and its results T102

Exploitation Activities - final (opens in new window)

Market strategy exploitation and sustainability IPRs initial plan annual plan updates and reports innovation management report and business plan refinements T103 T104 T105

Validation Assessment and Best Practices - final (opens in new window)

Report on Final validation results T101

Risk and resilience management process for cyber-physical threats of telecom CI - final (opens in new window)

Report and digital specification

Analysis on Scenario 2 - test results - final (opens in new window)

Report on the first step test with corrective actions and final analysis of the second test T85

Exploitation Activities - third (opens in new window)

Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)

Scenario 1 Test plan definition (opens in new window)

Plan of the pilot, its requirements and design (T7.1, T7.2)

Analytical security assessment application to use cases and their refinement (opens in new window)

Report, on assessment of RESISTO solutions and refinement recommendations

Damage/ Vulnerability models for physical and cyber threats of telecom CI - first (opens in new window)

Report; software module specifications and algorithms

Telecommunication system model and interfaces - first (opens in new window)

Report and scalable, flexible and tailorable digital model as basis for simulations and parameterizations

Scenario 1 - 2nd run integration and setup (opens in new window)

Report on the integration of 1 scenario 7 main use cases at end users test plans T73 T74

Active and Passive Sensor Definition (opens in new window)

analysis RESISTO detection systems

Telecommunication system model and interfaces - final (opens in new window)

Report and scalable, flexible and tailorable digital model as basis for simulations and parameterizations

Analysis on Scenario 1 - test results - final (opens in new window)

Report on the first step test with corrective actions and final analysis of the second test T75

Interim Workflow Definition and Emergency Warning Communication Function (opens in new window)

Interim Report of T5.4 and T5.5

Methods for cyber-physical security management for telecom CI- final (opens in new window)

Inventory including compliance with standards, rigor, effectiveness and efficiency - Tabular Report and database

Scenario 1 - 1st run integration and setup (opens in new window)

Report on the integration of 1 scenario 7 main use cases at end users test plans T73 T74

Analysis on Scenario 1 - tests results (1st run) (opens in new window)

Report on the first step test with corrective actions and final analysis of the second test T75

Project Web Site (opens in new window)

Official web site, logo, including in its structure news, public documents download and member area (T10.2)

Publications

Anomaly-Based Intrusion Detection System for Cyber-Physical System Security (opens in new window)

Author(s): Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci
Published in: 2021 29th Mediterranean Conference on Control and Automation (MED), 2021, Page(s) 428-434, ISBN 978-1-6654-2258-1
Publisher: IEEE
DOI: 10.1109/med51440.2021.9480182

Blockchain application in simulated environment for Cyber-Physical Systems Security

Author(s): Riccardo Colelli, Chiara Foglietta, Roberto Fusacchia, Stefano Panzieri and Federica Pascucci
Published in: IEEE 19th International Conference on Industrial Informatics, 2021
Publisher: IEEE

Enhancing Critical Infrastructure Protection: The RESISTO Concept

Author(s): Maria Belesioti, Ioannis Chochliouros, Federico Frosali and Rodoula Makri
Published in: European Conference on Networks and Communications 2018 - 5G and beyond (EuCNC 2018), 2018
Publisher: IEEE

A New Security Approach in Telecom Infrastructures: The RESISTO Concept (opens in new window)

Author(s): Maria Belesioti, Rodoula Makri, Mirjam Fehling-Kaschek, Marco Carli, Alexandros Kostopoulos, Ioannis P. Chochliouros, Alberto Neri, Federico Frosali
Published in: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019, Page(s) 212-218, ISBN 978-1-7281-0570-3
Publisher: IEEE
DOI: 10.1109/dcoss.2019.00056

A Systematic Tabular Approach for Risk and Resilience Assessment and Improvement in the Telecommunication Industry (opens in new window)

Author(s): Mirjam Fehling-Kaschek, Katja Faist,, Natalie Miller, Jörg Finger, Ivo Häring, Marco Carli, Federica Battisti
Published in: Proceedings of the 29th European Safety and Reliability Conference (ESREL), 2019, Page(s) 1312-1319, ISBN 978-981-11-2724-3
Publisher: Research Publishing Services
DOI: 10.3850/978-981-11-2724-3_0242-cd

Risk and Resilience Assessment and Improvement in the Telecommunication Industry

Author(s): Mirjam Fehling-Kaschek, Natalie Miller, Gael Haab, Katja Faist, Alexander Stolz, Ivo Häring, Alberto Neri, Giuseppe Celozzi, Jose Sanchez, Javier Valera, Rodoula Makri
Published in: 30th European Safety and Reliability Conference and 15th Probabilistic Safety Assessment and Management Conference, 2020
Publisher: SREL2020-PSAM15 Organizers

Inferring Anomaly Situation from Multiple Data Sources in Cyber Physical Systems (opens in new window)

Author(s): Sara Baldoni, Giuseppe Celozzi, Alessandro Neri, Marco Carli, Federica Battisti
Published in: Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers, Issue 12618, 2021, Page(s) 67-76, ISBN 978-3-030-69780-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-69781-5_5

Resilience in Critical Infrastructures: The Role of Modelling and Simulation (opens in new window)

Author(s): Chiara Foglietta, Stefano Panzieri
Published in: Issues on Risk Analysis for Critical Infrastructure Protection, 2021, ISBN 978-1-83962-620-3
Publisher: IntechOpen
DOI: 10.5772/intechopen.94506

RESISTO - RESIlience enhancement and risk control platform for communication infraSTructure Operators (opens in new window)

Author(s): Alberto Neri, Alessandro Neri
Published in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher: Now Publisher
DOI: 10.1561/9781680836875

Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector

Author(s): Federica Battisti, Marco Carli, Federica Pascucci, Mirjam Fehling-Kaschek, Rodoula Makri, Maria Belesioti, Ioannis Chochliouros, Ioan Constatin, Xiao-Si Wang
Published in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher: Now Publisher

Manage Security on 5G communication networks: the Software Defined Security paradigm

Author(s): Luca Baldini, Marco Carli, Giuseppe Celozzi, Federico Colangelo, Alessandro Neri, Cosimo Zotti
Published in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher: Now Publisher

Resilience analysis and quantification for Critical Infrastructures

Author(s): N. Miller, M. Fehling-Kaschek, G. Haab, K. Faist, A. Stolz, I. Håring
Published in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher: Now Publisher

CISIApro Critical Infrastructures Modeling Technique for an Effective Decision Making Support

Author(s): Chiara Foglietta, Stefano Panzieri
Published in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher: Now Publisher

Modern innovative detectors of physical threats for Critical Infrastructures

Author(s): Rodoula Makri, Panos Karaivazoglou, Alexandros Kyritsis, Michael Skitsas, Nikolaos Koutras, Javier Valera, Jose Manuel Sanchez
Published in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Publisher: Now Publisher

A performance-based tabular approach for joint systematic improvement of risk control and resilience applied to telecommunication grid, gas network, and ultrasound localization system (opens in new window)

Author(s): Ivo Häring, Mirjam Fehling-Kaschek, Natalie Miller, Katja Faist, Sebastian Ganter, Kushal Srivastava, Aishvarya Kumar Jain, Georg Fischer, Kai Fischer, Jörg Finger, Alexander Stolz, Tobias Leismann, Stefan Hiermaier, Marco Carli, Federica Battisti, Rodoula Makri, Giuseppe Celozzi, Maria Belesioti, Evangelos Sfakianakis, Evita Agrafioti, Anastasia Chalkidou, George Papadakis, Clemente Fuggini, Fa
Published in: Environment Systems and Decisions, Issue 41/2, 2021, Page(s) 286-329, ISSN 2194-5403
Publisher: Springer Science + Business Media
DOI: 10.1007/s10669-021-09811-5

On the Use of Fibonacci Sequences for Detecting Injection Attacks in Cyber Physical Systems (opens in new window)

Author(s): Sara Baldoni, Federica Battisti, Marco Carli, Federica Pascucci
Published in: IEEE Access, Issue 9, 2021, Page(s) 41787-41798, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3065228

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0