Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

RESIlience enhancement and risk control platform for communication infraSTructure Operators

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

RESISTO platform and tools reference architecture - first (si apre in una nuova finestra)

Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions.

Cyber-physical threat/ risk scenarios and pre-assessment - final (si apre in una nuova finestra)

Event ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database

KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - first (si apre in una nuova finestra)

Tabular Report and database

Risk and resilience management process for cyber-physical threats of telecom CI - first (si apre in una nuova finestra)

Report and digital specification

Countermeasures Draft Definition (si apre in una nuova finestra)

Main envisioned countermeasures definition and progress report about Decision Making Component

Description and definition of the Correlator intelligence (si apre in una nuova finestra)
Dissemination and Communication Activities - third (si apre in una nuova finestra)

Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)

Ethical, Societal and Gender Equality Protocol - first (si apre in una nuova finestra)

Ethical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members

Methods for cyber-physical security management for telecom CI - first (si apre in una nuova finestra)

Inventory including compliance with standards, rigor, effectiveness and efficiency; Tabular Report and database

Interim Software Defined Security System and Decision Making Module (si apre in una nuova finestra)

Interim Report of T5.2 and T5.3 activities

Analysis on Scenario 2 - tests results (1st run) (si apre in una nuova finestra)

Report on the first step test with corrective actions and final analysis of the second test T85

Ethical, Societal and Gender Equality Protocol - second (si apre in una nuova finestra)

Ethical, Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues, including AB members

Validation Assessment and Best Practices - first (si apre in una nuova finestra)

Validation Assessment and Best Practices

Analysis on Scenario 3 - test results - final (si apre in una nuova finestra)

Report on the first step test with corrective actions and final analysis of the second test T95

KPIs, quantities and metrics for cyber-physical risk and resilience of telecom CI - final (si apre in una nuova finestra)

Tabular Report and database

Scenario 2 Test plan definition (si apre in una nuova finestra)

Plan of the pilot, its requirements and design (T8.1, T8.2

Analysis on Scenario 3 - tests results (1st run) (si apre in una nuova finestra)

Report on the first step test with corrective actions and final analysis of the second test T95

Exploitation Activities - first (si apre in una nuova finestra)

Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)

Scenario 3 Test plan definit (si apre in una nuova finestra)

Plan of the pilot, its requirements and design (T9.1, T9.2)

HMI definition and Platform integration (si apre in una nuova finestra)

HMI Def. & integration activities (T6.4, T6.5)

Scenario 3 - 2nd run integration and setup (si apre in una nuova finestra)

Report on the integration of the 3 scenario 3 main use cases and 1 impacted use case and end users test plans T93 T94

Active and Passive Sensor Deployment Plan (si apre in una nuova finestra)

RESISTO detection systems release

Ethical, Societal and Gender Equality Protocol - final (si apre in una nuova finestra)

Ethical Societal and Gender Equality Protocol with the support of partners and external experts in ethical and societal issues including AB members

Advisory Board Activities Plan (si apre in una nuova finestra)

Report on AB events

Real Time Response and Mitigation Results (si apre in una nuova finestra)

Main envisioned countermeasures definition and progress report about Decision Making Component (T5.1)

Complete propagation analysis (si apre in una nuova finestra)
Dissemination and Communication Activities - second (si apre in una nuova finestra)

Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)

Communication material - first (si apre in una nuova finestra)

brochure, leaflets and posters to spread main RESISTO information and its results (T10.2)

Table-top read teaming results of RESISTO architecture, scenarios and use cases (si apre in una nuova finestra)

Table-top read teaming results of RESISTO architecture, scenarios and use cases Tabular report

Adaptors, DSS and Risk predictor (si apre in una nuova finestra)

Integr. Components Development (T6.2, T6.3, T6.4)

End user requirements for integrated cyber-physical risk and resilience management, platform and tools (si apre in una nuova finestra)

Report and digital user requirements specifications

Scenario 2 - 2nd run integration and setup (si apre in una nuova finestra)

Report on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84

Scenario 3 - 1st run integration and setup (si apre in una nuova finestra)

Report on the integration of the 3 scenario 3 main use cases and impacted use case and end users test plans T93 T94

RESISTO platform and tools reference architecture - final (si apre in una nuova finestra)

Report and e.g. SysML/UML model. The specification will also detail the tailoring and extensions options and prefer open standards and solutions to proprietary solutions

Cyber-physical threat/ risk scenarios and pre-assessment - first (si apre in una nuova finestra)

Event ontology, pre-assessment regarding resilience phases for telecom and related CI; Report and Database

Techniques and Procedures for cyber/physical threats Detection (si apre in una nuova finestra)
Dissemination and Communication Activities - final (si apre in una nuova finestra)

Dissemination Standardisation and communication activities initial Plans and annual plan updates and reports T102 T106

Damage/ Vulnerability models for physical and cyber threats of telecom CI - final (si apre in una nuova finestra)

Report; software module specifications and algorithms

Exploitation Activities - second (si apre in una nuova finestra)

Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)

Dissemination and Communication Activities - first (si apre in una nuova finestra)

Dissemination, Standardisation and communication activities: initial Plans and annual plan updates and reports (T10.2, T10.6)

Scenario 2 - 1st run integration and setup (si apre in una nuova finestra)

Report on the integration of the 2 scenario 2 main use cases and 3 impacted use case and end users test plans T83 T84

Communication material - final (si apre in una nuova finestra)

brochure leaflets and posters to spread main RESISTO information and its results T102

Exploitation Activities - final (si apre in una nuova finestra)

Market strategy exploitation and sustainability IPRs initial plan annual plan updates and reports innovation management report and business plan refinements T103 T104 T105

Validation Assessment and Best Practices - final (si apre in una nuova finestra)

Report on Final validation results T101

Risk and resilience management process for cyber-physical threats of telecom CI - final (si apre in una nuova finestra)

Report and digital specification

Analysis on Scenario 2 - test results - final (si apre in una nuova finestra)

Report on the first step test with corrective actions and final analysis of the second test T85

Exploitation Activities - third (si apre in una nuova finestra)

Market strategy, exploitation and sustainability, IPRs: initial plan, annual plan updates and reports, innovation management report and business plan refinements (T10.3, T10.4, T10.5)

Scenario 1 Test plan definition (si apre in una nuova finestra)

Plan of the pilot, its requirements and design (T7.1, T7.2)

Analytical security assessment application to use cases and their refinement (si apre in una nuova finestra)

Report, on assessment of RESISTO solutions and refinement recommendations

Damage/ Vulnerability models for physical and cyber threats of telecom CI - first (si apre in una nuova finestra)

Report; software module specifications and algorithms

Telecommunication system model and interfaces - first (si apre in una nuova finestra)

Report and scalable, flexible and tailorable digital model as basis for simulations and parameterizations

Scenario 1 - 2nd run integration and setup (si apre in una nuova finestra)

Report on the integration of 1 scenario 7 main use cases at end users test plans T73 T74

Active and Passive Sensor Definition (si apre in una nuova finestra)

analysis RESISTO detection systems

Telecommunication system model and interfaces - final (si apre in una nuova finestra)

Report and scalable, flexible and tailorable digital model as basis for simulations and parameterizations

Analysis on Scenario 1 - test results - final (si apre in una nuova finestra)

Report on the first step test with corrective actions and final analysis of the second test T75

Interim Workflow Definition and Emergency Warning Communication Function (si apre in una nuova finestra)

Interim Report of T5.4 and T5.5

Methods for cyber-physical security management for telecom CI- final (si apre in una nuova finestra)

Inventory including compliance with standards, rigor, effectiveness and efficiency - Tabular Report and database

Scenario 1 - 1st run integration and setup (si apre in una nuova finestra)

Report on the integration of 1 scenario 7 main use cases at end users test plans T73 T74

Analysis on Scenario 1 - tests results (1st run) (si apre in una nuova finestra)

Report on the first step test with corrective actions and final analysis of the second test T75

Project Web Site (si apre in una nuova finestra)

Official web site, logo, including in its structure news, public documents download and member area (T10.2)

Pubblicazioni

Anomaly-Based Intrusion Detection System for Cyber-Physical System Security (si apre in una nuova finestra)

Autori: Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci
Pubblicato in: 2021 29th Mediterranean Conference on Control and Automation (MED), 2021, Pagina/e 428-434, ISBN 978-1-6654-2258-1
Editore: IEEE
DOI: 10.1109/med51440.2021.9480182

Blockchain application in simulated environment for Cyber-Physical Systems Security

Autori: Riccardo Colelli, Chiara Foglietta, Roberto Fusacchia, Stefano Panzieri and Federica Pascucci
Pubblicato in: IEEE 19th International Conference on Industrial Informatics, 2021
Editore: IEEE

Enhancing Critical Infrastructure Protection: The RESISTO Concept

Autori: Maria Belesioti, Ioannis Chochliouros, Federico Frosali and Rodoula Makri
Pubblicato in: European Conference on Networks and Communications 2018 - 5G and beyond (EuCNC 2018), 2018
Editore: IEEE

A New Security Approach in Telecom Infrastructures: The RESISTO Concept (si apre in una nuova finestra)

Autori: Maria Belesioti, Rodoula Makri, Mirjam Fehling-Kaschek, Marco Carli, Alexandros Kostopoulos, Ioannis P. Chochliouros, Alberto Neri, Federico Frosali
Pubblicato in: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019, Pagina/e 212-218, ISBN 978-1-7281-0570-3
Editore: IEEE
DOI: 10.1109/dcoss.2019.00056

A Systematic Tabular Approach for Risk and Resilience Assessment and Improvement in the Telecommunication Industry (si apre in una nuova finestra)

Autori: Mirjam Fehling-Kaschek, Katja Faist,, Natalie Miller, Jörg Finger, Ivo Häring, Marco Carli, Federica Battisti
Pubblicato in: Proceedings of the 29th European Safety and Reliability Conference (ESREL), 2019, Pagina/e 1312-1319, ISBN 978-981-11-2724-3
Editore: Research Publishing Services
DOI: 10.3850/978-981-11-2724-3_0242-cd

Risk and Resilience Assessment and Improvement in the Telecommunication Industry

Autori: Mirjam Fehling-Kaschek, Natalie Miller, Gael Haab, Katja Faist, Alexander Stolz, Ivo Häring, Alberto Neri, Giuseppe Celozzi, Jose Sanchez, Javier Valera, Rodoula Makri
Pubblicato in: 30th European Safety and Reliability Conference and 15th Probabilistic Safety Assessment and Management Conference, 2020
Editore: SREL2020-PSAM15 Organizers

Inferring Anomaly Situation from Multiple Data Sources in Cyber Physical Systems (si apre in una nuova finestra)

Autori: Sara Baldoni, Giuseppe Celozzi, Alessandro Neri, Marco Carli, Federica Battisti
Pubblicato in: Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers, Numero 12618, 2021, Pagina/e 67-76, ISBN 978-3-030-69780-8
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-69781-5_5

Resilience in Critical Infrastructures: The Role of Modelling and Simulation (si apre in una nuova finestra)

Autori: Chiara Foglietta, Stefano Panzieri
Pubblicato in: Numeros on Risk Analysis for Critical Infrastructure Protection, 2021, ISBN 978-1-83962-620-3
Editore: IntechOpen
DOI: 10.5772/intechopen.94506

RESISTO - RESIlience enhancement and risk control platform for communication infraSTructure Operators (si apre in una nuova finestra)

Autori: Alberto Neri, Alessandro Neri
Pubblicato in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Editore: Now Publisher
DOI: 10.1561/9781680836875

Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector

Autori: Federica Battisti, Marco Carli, Federica Pascucci, Mirjam Fehling-Kaschek, Rodoula Makri, Maria Belesioti, Ioannis Chochliouros, Ioan Constatin, Xiao-Si Wang
Pubblicato in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Editore: Now Publisher

Manage Security on 5G communication networks: the Software Defined Security paradigm

Autori: Luca Baldini, Marco Carli, Giuseppe Celozzi, Federico Colangelo, Alessandro Neri, Cosimo Zotti
Pubblicato in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Editore: Now Publisher

Resilience analysis and quantification for Critical Infrastructures

Autori: N. Miller, M. Fehling-Kaschek, G. Haab, K. Faist, A. Stolz, I. Håring
Pubblicato in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Editore: Now Publisher

CISIApro Critical Infrastructures Modeling Technique for an Effective Decision Making Support

Autori: Chiara Foglietta, Stefano Panzieri
Pubblicato in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Editore: Now Publisher

Modern innovative detectors of physical threats for Critical Infrastructures

Autori: Rodoula Makri, Panos Karaivazoglou, Alexandros Kyritsis, Michael Skitsas, Nikolaos Koutras, Javier Valera, Jose Manuel Sanchez
Pubblicato in: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures, 2020, ISBN 978-1-68083-686-8
Editore: Now Publisher

A performance-based tabular approach for joint systematic improvement of risk control and resilience applied to telecommunication grid, gas network, and ultrasound localization system (si apre in una nuova finestra)

Autori: Ivo Häring, Mirjam Fehling-Kaschek, Natalie Miller, Katja Faist, Sebastian Ganter, Kushal Srivastava, Aishvarya Kumar Jain, Georg Fischer, Kai Fischer, Jörg Finger, Alexander Stolz, Tobias Leismann, Stefan Hiermaier, Marco Carli, Federica Battisti, Rodoula Makri, Giuseppe Celozzi, Maria Belesioti, Evangelos Sfakianakis, Evita Agrafioti, Anastasia Chalkidou, George Papadakis, Clemente Fuggini, Fa
Pubblicato in: Environment Systems and Decisions, Numero 41/2, 2021, Pagina/e 286-329, ISSN 2194-5403
Editore: Springer Science + Business Media
DOI: 10.1007/s10669-021-09811-5

On the Use of Fibonacci Sequences for Detecting Injection Attacks in Cyber Physical Systems (si apre in una nuova finestra)

Autori: Sara Baldoni, Federica Battisti, Marco Carli, Federica Pascucci
Pubblicato in: IEEE Access, Numero 9, 2021, Pagina/e 41787-41798, ISSN 2169-3536
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3065228

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0