Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

CTTP Models and Programmes Specification Tool (öffnet in neuem Fenster)

This deliverable is the CTTP Models and Programmes Specification Tool of Threat-Arrest.

THREAT-ARREST serious games v1 (öffnet in neuem Fenster)

This deliverable is the first version of the THREAT-ARREST serious games.

Real time trainee performance assessment v2 (öffnet in neuem Fenster)

This deliverable is the second version of the Real time trainee performance assessment mechanisms

The Simulation component IO module v1 (öffnet in neuem Fenster)

This deliverable is the first version of the Simulation component IO module of Threat-Arrest.

Real time trainee performance assessment v1 (öffnet in neuem Fenster)

This deliverable is the first version of the Real time trainee performance assessment mechanisms.

Emulation tool interoperability module v1 (öffnet in neuem Fenster)

This deliverable is the first version of the interfaces that will used by the emulation components to communicate.

CTTP Programme Adaptor v2 (öffnet in neuem Fenster)

This deliverable is the second version of the CTTP Programme Adaptor of ThreatArrest

Simulated components network execution module v2 (öffnet in neuem Fenster)

This deliverable is the second version of the Simulated components network execution module of ThreatArrest

THREAT-ARREST visualisation tools v1 (öffnet in neuem Fenster)

This deliverable is the first version of the THREAT-ARREST visualisation tools.

THREAT-ARREST visualisation tools v2 (öffnet in neuem Fenster)

This deliverable is the second version of the THREATARREST visualisation tools

Simulated components and network generator v1 (öffnet in neuem Fenster)

This deliverable is the first version of the Simulated components and network generator of Threat-Arrest

The Simulation component IO module v2 (öffnet in neuem Fenster)

This deliverable is the second version of the Simulation component IO module of ThreatArrest

Initial Prototype of Integrated THREAT-ARREST platform (öffnet in neuem Fenster)

This deliverable will be the Initial Prototype of Integrated THREATARREST platform

Final Prototype of Integrated THREAT–ARREST platform (öffnet in neuem Fenster)

Final Prototype of Integrated THREATARREST platform

Interlinking of emulated components module v1 (öffnet in neuem Fenster)

This deliverable is the first version of the mechanism to be used for Interlinking of emulated components.

Emulated components' generator module v2 (öffnet in neuem Fenster)

This deliverable is second version of the Emulated components generator module

Emulated components’ generator module v1 (öffnet in neuem Fenster)

This deliverable is first version of the Emulated components’ generator module.

Training and Visualisation tools IO mechanisms v2 (öffnet in neuem Fenster)

This deliverable is the second version of the Training and Visualisation tools IO mechanisms

CTTP Models and Programmes Adaptation Tool (öffnet in neuem Fenster)

This deliverable is the CTTP Models and Programmes Adaptation Tool of ThreatArrest

Simulated components and network generator v2 (öffnet in neuem Fenster)

This deliverable is the second version of the Simulated components and network generator of ThreatArrest

Simulated components network execution module v1 (öffnet in neuem Fenster)

This deliverable is the first version of the Simulated components network execution module of Threat-Arrest.

CTTP Programme Evaluator (öffnet in neuem Fenster)
THREAT-ARREST serious games v2 (öffnet in neuem Fenster)

This deliverable is the second version of the THREATARREST serious games

CTTP Programme Adaptor v1 (öffnet in neuem Fenster)

This deliverable is the first version of the CTTP Programme Adaptor of ThreatArrest

Real event logs statistical profiling module and synthetic event log generator v1 (öffnet in neuem Fenster)

This deliverable is the first version of Real event logs statistical profiling module and synthetic event log generator of Threat-Arrest

Interlinking of emulated components module v2 (öffnet in neuem Fenster)

This deliverable is the second version of the mechanism to be used for Interlinking of emulated components

Real event logs statistical profiling module and synthetic event log generator v2 (öffnet in neuem Fenster)

This deliverable is the second version of Real event logs statistical profiling module and synthetic event log generator of TreatAArrest

Emulation tool interoperability module interoperability module v2 (öffnet in neuem Fenster)

This deliverable is the second version of the interfaces that will used by the emulation components to communicate

Training and Visualisation tools IO mechanisms v1 (öffnet in neuem Fenster)

This deliverable is the first version of the Training and Visualisation tools IO mechanisms

Emulated components’ monitoring module (öffnet in neuem Fenster)

This deliverable is the module that will monitor the status of the Emulated components

The Energy Sector pilot report v1 (öffnet in neuem Fenster)

This deliverable is the first version of the report on the Energy Sector use case

The Maritime Sector pilot report v2 (öffnet in neuem Fenster)

This deliverable is the final version of the report on the Maritime Sector use case

The Health Sector pilot report v1 (öffnet in neuem Fenster)

This deliverable is the first version of the report on the Health Sector use case

The Health Sector pilot report v2 (öffnet in neuem Fenster)

This deliverable is the final version of the report on the Health Sector use case

CTTP Models and Programmes Specification Language (öffnet in neuem Fenster)

This report will document the CTTP Models and Programmes Specification Language of Threat-Arrest.

Final Installation and usage guidelines for the THREAT–ARREST platform (öffnet in neuem Fenster)

This deliverable will be the final version of the documentation of Installation and usage guidelines for the THREATARREST platform

THREAT-ARREST dissemination and exploitation report v.1 (öffnet in neuem Fenster)

This deliverable reports on the dissemination and exploitation activities of Threat-Arrest for the first half of the project duration.

Final THREAT-ARREST evaluation report (öffnet in neuem Fenster)

This deliverable is the overall THREATARREST evaluation report

THREAT-ARREST Evaluation Framework and Pilot Set Up Guidelines (öffnet in neuem Fenster)

THREATARREST Evaluation Framework and Pilot Set Up Guidelines

THREAT-ARREST market analysis, business and marketing plan v.2 (öffnet in neuem Fenster)

This deliverable will contain the updated version of the THREATARREST market analysis business and marketing plan

THREAT-ARREST platform’s initial reference architecture (öffnet in neuem Fenster)

This report will document the initial version of the architecture of the THREAT-ARREST platform.

The stakeholders’ engagement & online channels report v.2 (öffnet in neuem Fenster)

This deliverable is the the final version of the report on the stakeholders engagement online channels

Reference CTTP Models and Programmes Specifications v2 (öffnet in neuem Fenster)

This report is the second version of the Reference CTTP Models and Programmes Specifications of TreatArrest

The Energy Sector pilot report v2 (öffnet in neuem Fenster)

This deliverable is the final version of the report on the Energy Sector use case

Reference CTTP Models and Programmes Specifications v1 (öffnet in neuem Fenster)

This report is the first version of the Reference CTTP Models and Programmes Specifications of Treat-Arrest.

The pilots’ requirements analysis report (öffnet in neuem Fenster)

This report will document the requirements analysis for Threat-Arrest pilots.

The stakeholders’ engagement & online channels report v.1 (öffnet in neuem Fenster)

This deliverable is the the first version of the report on the stakeholders’ engagement & online channels.

Platform quality assurance and technical testing report v2 (öffnet in neuem Fenster)
The stakeholders’ engagement plan and online channels development (öffnet in neuem Fenster)

This deliverable will report the stakeholders’ engagement plan and the development of online channels for Threat-Arrest!

The THREAT-ARREST dissemination plan (öffnet in neuem Fenster)
Initial Installation and usage guidelines for the THREAT-ARREST platform (öffnet in neuem Fenster)

This deliverable will be the first version of the documentation of the Installation and usage guidelines for the THREATARREST platform

THREAT-ARREST CTTP programs certification framework (öffnet in neuem Fenster)

This report will document the CTTP programs certification framework of ThreatArrest

THREAT-ARREST dissemination and exploitation report v.2 (öffnet in neuem Fenster)

This deliverable reports on the dissemination and exploitation activities of ThreatArrest for the second half of the project duration

THREAT-ARREST market analysis, business and marketing plan v.1 (öffnet in neuem Fenster)

This deliverable will contain the first version of the THREAT-ARREST market analysis, business and marketing plan.

THREAT-ARREST contribution to standards report (öffnet in neuem Fenster)

This deliverable will report the THREATARREST contribution to standards

CTTP Models and Programmes Adaptation Procedures (öffnet in neuem Fenster)

This deliverable will document on the CTTP Models and Programmes Adaptation Procedures of ThreatArrest

The Maritime Sector pilot report v1 (öffnet in neuem Fenster)

This deliverable is the first version of the report on the Maritime Sector use case

The platform’s system requirements analysis report. (öffnet in neuem Fenster)

The report will include an updated review of the state of the art and practice on security, simulation, emulation, visualization and training tools and services.

Veröffentlichungen

SPD-Safe: Secure Administration of Railway Intelligent Transportation Systems (öffnet in neuem Fenster)

Autoren: G. Hatzivasilis, K. Fysarakis, S. Ioannidis, I. Hatzakis, G. Vardakis, N. Papadakis, G. Spanoudakis
Veröffentlicht in: Electronics, Ausgabe vol. 10, issue 1, article 92, 2021, Seite(n) 1-26, ISSN 2079-9292
Herausgeber: MDPI
DOI: 10.3390/electronics10010092

The Green Blockchains of Circular Economy (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Sotiris Ioannidis, Konstantinos Fysarakis, George Spanoudakis, Nikos Papadakis
Veröffentlicht in: Electronics, Ausgabe 10/16, 2021, Seite(n) 2008, ISSN 2079-9292
Herausgeber: MDPI
DOI: 10.3390/electronics10162008

CYRA: A Model-Driven CYber Range Assurance Platform (öffnet in neuem Fenster)

Autoren: Michail Smyrlis, Iason Somarakis, George Spanoudakis, George Hatzivasilis, Sotiris Ioannidis
Veröffentlicht in: Applied Sciences, Ausgabe 11/11, 2021, Seite(n) 5165, ISSN 2076-3417
Herausgeber: MDPI AG
DOI: 10.3390/app11115165

Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy (öffnet in neuem Fenster)

Autoren: Dennis-Kenji Kipker, Sebastian Pape
Veröffentlicht in: Datenschutz und Datensicherheit - DuD, Ausgabe 45/5, 2021, Seite(n) 310-314, ISSN 1614-0702
Herausgeber: Springer
DOI: 10.1007/s11623-021-1440-3

WARDOG: Awareness detection watchbog for Botnet infection on the host device (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Othonas Soultatos, Panos Chatziadam, Konstantinos Fysarakis, Ioannis Askoxylakis, Sotiris Ioannidis, George Alaxandris, Vasilis Katos, George Spanoudakis
Veröffentlicht in: IEEE Transactions on Sustainable Computing, Ausgabe Early Access, 2019, Seite(n) 1-1, ISSN 2377-3782
Herausgeber: IEEE
DOI: 10.1109/tsusc.2019.2914917

The coevolution of contagion and behavior with increasing and decreasing awareness (öffnet in neuem Fenster)

Autoren: Samira Maghool, Nahid Maleki-Jirsaraei, Marco Cremonini
Veröffentlicht in: PLOS ONE, Ausgabe 14/12, 2019, Seite(n) e0225447, ISSN 1932-6203
Herausgeber: Public Library of Science
DOI: 10.1371/journal.pone.0225447

MobileTrust (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, Giorgos Demetriou
Veröffentlicht in: ACM Transactions on Cyber-Physical Systems, Ausgabe 4/3, 2020, Seite(n) 1-25, ISSN 2378-962X
Herausgeber: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3364181

A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem (öffnet in neuem Fenster)

Autoren: Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani
Veröffentlicht in: Journal of Information Security and Applications, Ausgabe 51, 2020, Seite(n) 102462, ISSN 2214-2126
Herausgeber: Elsevier
DOI: 10.1016/j.jisa.2020.102462

An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning (öffnet in neuem Fenster)

Autoren: Ebrahim Al Alkeem, Song-Kyoo Kim, Chan Yeob Yeun, Mohamed Jamal Zemerly, Kin Fai Poon, Gabriele Gianini, Paul D. Yoo
Veröffentlicht in: IEEE Access, Ausgabe 7, 2019, Seite(n) 123069-123075, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2019.2937357

AI-driven composition and security validation of an IoT ecosystem (öffnet in neuem Fenster)

Autoren: George Hatzivasilis,Nikos Papadakis, Ilias Hatzakis, Sotiris Ioannidis, George Vardakis
Veröffentlicht in: Applied Sciences, Ausgabe vol. 10, issue 14, article 4862, August 2020, 2020, Seite(n) 1-31, ISSN 2076-3417
Herausgeber: MDPI AG
DOI: 10.3390/app10144862

Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis, Hristo Koshutanski
Veröffentlicht in: Applied Sciences, Ausgabe 10/16, 2020, Seite(n) 5702, ISSN 2076-3417
Herausgeber: MDPI
DOI: 10.3390/app10165702

Temporal-based intrusion detection for IoV (öffnet in neuem Fenster)

Autoren: Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Veröffentlicht in: it - Information Technology, Ausgabe 62/5-6, 2020, Seite(n) 227-239, ISSN 2196-7032
Herausgeber: De Gruyter Oldenbourg
DOI: 10.1515/itit-2020-0009

Managing a pool of rules for credit card fraud detection by a Game Theory based approach (öffnet in neuem Fenster)

Autoren: Gabriele Gianini, Leopold Ghemmogne Fossi, Corrado Mio, Olivier Caelen, Lionel Brunie, Ernesto Damiani
Veröffentlicht in: Future Generation Computer Systems, Ausgabe 102, 2020, Seite(n) 549-561, ISSN 0167-739X
Herausgeber: Elsevier BV
DOI: 10.1016/j.future.2019.08.028

A Large-scale Study on the Risks of Mobile Sensor-based Attacks (öffnet in neuem Fenster)

Autoren: MICHALIS DIAMANTARIS; FRANCESCO MARCANTONI; SOTIRIS IOANNIDIS; JASON POLAKIS
Veröffentlicht in: ACM Transactions on Privacy and Security (TOPS), Ausgabe 23(4), 2020, Seite(n) 1-19, ISSN 2471-2566
Herausgeber: ACM
DOI: 10.1145/3403947

Software System Exploration Using Library Call Analysis (öffnet in neuem Fenster)

Autoren: Marinos Tsantekidis, Vassilis Prevelakis
Veröffentlicht in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Ausgabe 12512, 2020, Seite(n) 125-139, ISBN 978-3-030-62432-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-62433-0_8

Password Management: How Secure Is Your Login Process? (öffnet in neuem Fenster)

Autoren: George Hatzivasilis
Veröffentlicht in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Ausgabe 12512, 2020, Seite(n) 157-177, ISBN 978-3-030-62432-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-62433-0_10

Towards the Insurance of Healthcare Systems (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Veröffentlicht in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Ausgabe 11981, 2020, Seite(n) 185-198, ISBN 978-3-030-42050-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_13

A Model Driven Approach for Cyber Security Scenarios Deployment (öffnet in neuem Fenster)

Autoren: Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene
Veröffentlicht in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Ausgabe 11981, 2020, Seite(n) 107-122, ISBN 978-3-030-42050-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_8

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective (öffnet in neuem Fenster)

Autoren: Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis
Veröffentlicht in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Ausgabe 11981, 2020, Seite(n) 172-184, ISBN 978-3-030-42050-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_12

PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks (öffnet in neuem Fenster)

Autoren: Ludger Goeke, Alejandro Quintanar, Kristian Beckers, Sebastian Pape
Veröffentlicht in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Ausgabe 11981, 2020, Seite(n) 156-171, ISBN 978-3-030-42050-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_11

The THREAT-ARREST Cyber-Security Training Platform (öffnet in neuem Fenster)

Autoren: Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, Menelaos Ioannidis
Veröffentlicht in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Ausgabe 11981, 2020, Seite(n) 199-214, ISBN 978-3-030-42050-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_14

A Secure and Efficient File System Access Control Mechanism (FlexFS) (öffnet in neuem Fenster)

Autoren: Jihane Najar, Vassilis Prevelakis
Veröffentlicht in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Ausgabe 11398, 2019, Seite(n) 15-26, ISBN 978-3-030-12084-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_2

Chasing Botnets: A Real Security Incident Investigation (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Martin Kunc
Veröffentlicht in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Ausgabe 12512, 2020, Seite(n) 111-124, ISBN 978-3-030-62432-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-62433-0_7

Systematic Scenario Creation for Serious Security-Awareness Games (öffnet in neuem Fenster)

Autoren: Vera Hazilov, Sebastian Pape
Veröffentlicht in: Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers, Ausgabe 12580, 2020, Seite(n) 294-311, ISBN 978-3-030-66503-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-66504-3_18

Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges (öffnet in neuem Fenster)

Autoren: Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh
Veröffentlicht in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Ausgabe 12512, 2020, Seite(n) 79-91, ISBN 978-3-030-62432-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-62433-0_5

Learning Vector Quantization and Radial Basis Function Performance Comparison Based Intrusion Detection System (öffnet in neuem Fenster)

Autoren: Joël T. Hounsou, Pamela Bélise Ciza Niyomukiza, Thierry Nsabimana, Ghislain Vlavonou, Fulvio Frati, Ernesto Damiani
Veröffentlicht in: Intelligent Human Systems Integration 2021 - Proceedings of the 4th International Conference on Intelligent Human Systems Integration (IHSI 2021): Integrating People and Intelligent Systems, February 22-24, 2021, Palermo, Italy, Ausgabe 1322, 2021, Seite(n) 561-572, ISBN 978-3-030-68016-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-68017-6_83

Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models (öffnet in neuem Fenster)

Autoren: Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, George Hatzivasilis
Veröffentlicht in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Ausgabe 12512, 2020, Seite(n) 22-37, ISBN 978-3-030-62432-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-62433-0_2

Conceptualization of a CyberSecurity Awareness Quiz (öffnet in neuem Fenster)

Autoren: Sebastian Pape, Ludger Goeke, Alejandro Quintanar, Kristian Beckers
Veröffentlicht in: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers, Ausgabe 12512, 2020, Seite(n) 61-76, ISBN 978-3-030-62432-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-62433-0_4

Leech: Let's Expose Evidently bad data Collecting Habits - Towards a Serious Game on Understanding Privacy Policies

Autoren: S. Pape, A. Klauer, M. Rebler
Veröffentlicht in: 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021, Seite(n) 1
Herausgeber: USENIX

Review of Security and Privacy for the Internet of Medical Things (IoMT) (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, Christos Tsatsoulis
Veröffentlicht in: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Ausgabe 29-31 May 2019, 2019, Seite(n) 457-464, ISBN 978-1-7281-0570-3
Herausgeber: IEEE
DOI: 10.1109/dcoss.2019.00091

A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks (öffnet in neuem Fenster)

Autoren: Francesco Marcantoni, Michalis Diamantaris, Sotiris Ioannidis, Jason Polakis
Veröffentlicht in: The World Wide Web Conference on - WWW '19, Ausgabe May 13 - 17, 2019, 2019, Seite(n) 3063-3071, ISBN 9781-450366748
Herausgeber: ACM Press
DOI: 10.1145/3308558.3313539

ProSEV: Proxy-Based Secure and Efficient Vehicular Communication (öffnet in neuem Fenster)

Autoren: Mohammad Hamad, Mustafa R. Agha, Vassilis Prevelakis
Veröffentlicht in: 2018 IEEE Vehicular Networking Conference (VNC), Ausgabe 5-7 Dec. 2018, 2018, Seite(n) 1-8, ISBN 978-1-5386-9428-2
Herausgeber: IEEE
DOI: 10.1109/vnc.2018.8628360

The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Nikos Christodoulakis, Christos Tzagkarakis, Sotiris Ioannidis, Giorgos Demetriou, Konstantinos Fysarakis, Marios Panayiotou
Veröffentlicht in: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Ausgabe 29-31 May 2019, 2019, Seite(n) 436-442, ISBN 978-1-7281-0570-3
Herausgeber: IEEE
DOI: 10.1109/dcoss.2019.00088

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Veröffentlicht in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Ausgabe 11-13 Sept. 2019, 2019, Seite(n) 1-6, ISBN 978-1-7281-1016-5
Herausgeber: IEEE
DOI: 10.1109/camad.2019.8858165

Secure Semantic Interoperability for IoT Applications with Linked Data (öffnet in neuem Fenster)

Autoren: George Hatzivasilis, Lukasz Ciechomski, Othonas Soultatos, Darko Anicic, Arne Broring, Konstantinos Fysarakis, George Spanoudakis, Eftychia Lakka, Sotiris Ioannidis, Mirko Falchetto
Veröffentlicht in: 2019 IEEE Global Communications Conference (GLOBECOM), Ausgabe 9-13 Dec. 2019, 2019, Seite(n) 1-6, ISBN 978-1-7281-0962-6
Herausgeber: IEEE
DOI: 10.1109/globecom38437.2019.9013147

Efficient Monitoring of Library Call Invocation (öffnet in neuem Fenster)

Autoren: Marinos Tsantekidis, Vassilis Prevelakis
Veröffentlicht in: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Ausgabe October 2019, 2019, Seite(n) 387-392, ISBN 978-1-7281-2949-5
Herausgeber: IEEE
DOI: 10.1109/iotsms48152.2019.8939203

Secure Data Exchange for Computationally Constrained Devices

Autoren: V. Prevelakis, M., J. Najar, I. Spais
Veröffentlicht in: International workshop on Information & Operational Technology (IT & OT) security systems (IOSec), ESORICS, Ausgabe September 2019, 2019
Herausgeber: Springer

REAPER - Real-time App Analysis for Augmenting the Android Permission System (öffnet in neuem Fenster)

Autoren: Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
Veröffentlicht in: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, Ausgabe March 25-27, 2019, 2019, Seite(n) 37-48, ISBN 9781-450360999
Herausgeber: ACM
DOI: 10.1145/3292006.3300027

The THREAT-ARREST cyber ranges platform

Autoren: G. Hatzivasilis, et al.
Veröffentlicht in: IEEE CSR Workshop on Cyber Ranges and Security Training (CRST), 2021, Seite(n) 1-6
Herausgeber: IEEE

Teaching Users New IoT Tricks: A Model-driven Cyber Range for IoT Security Training

Autoren: Michalis Smyrlis, George Spanoudakis, Konstantinos Fysarakis
Veröffentlicht in: IEEE Internet of Things (IoT) Magazine, Ausgabe March, 2021
Herausgeber: IEEE

Cyber-Ranges as a Mean of Security Culture Establishment

Autoren: George Hatzivasilis, Kostas Fysarakis, Sotiris Ioannidis
Veröffentlicht in: ERCIM News – Special Theme: The Climate Action, Ausgabe Ausgabe 121, Article no. 36, April 2020, 2020, Seite(n) 36-37
Herausgeber: ERCIM News

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0