Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Data management plan (opens in new window)

The plan for data management in view of the open research data pilot.

Mid-term meeting (opens in new window)

The meeting for the mid-term review of the project.

Publications

BRIDGE: BRIDGing the gap bEtween CTI production and consumption (opens in new window)

Author(s): Marios Karatisoglou; Aristeidis Farao; Vaios Bolgouras; Christos Xenakis
Published in: International Conference on Communications (COMM), 2022
Publisher: IEEE
DOI: 10.1109/comm54429.2022.9817359

Analyzing Coverages of Cyber Insurance Policies Using Ontology (opens in new window)

Author(s): Markos Charalambous; Aristeidis Farao; George Kalantzantonakis; Panagiotis Kanakakis; Nikos Salamanos; Evangelos Kotsifakos; Evangellos Froudakis
Published in: ARES '22, 2022
Publisher: Association for Computing Machinery
DOI: 10.1145/3538969.3544453

A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces (opens in new window)

Author(s): Leonidou, Pantelitsa and Salamanos, Nikos and Farao, Aristeidis and Aspri, Maria and Sirivianos, Michael
Published in: 2023
Publisher: ACM
DOI: 10.1145/3600160.3605087

MITRE ATT&CK-driven Cyber Risk Assessment (opens in new window)

Author(s): Mohamed Ahmed,Sakshyam Panda,Christos Xenakis,Emmanouil Panaousis
Published in: 2022
Publisher: ACM
DOI: 10.1145/3538969.3544420

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic (opens in new window)

Author(s): Pantelakis, Vasileios and Bountakas, Panagiotis and Farao, Aristeidis and Xenakis, Christos
Published in: 2023
Publisher: ACM
DOI: 10.1145/3600160.3605086

A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection (opens in new window)

Author(s): Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis
Published in: 2021
Publisher: ACM
DOI: 10.1145/3465481.3469205

ObjectMap - detecting insecure object deserialization (opens in new window)

Author(s): Nikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis
Published in: Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019, Page(s) 67-72, ISBN 9781450372923
Publisher: ACM
DOI: 10.1145/3368640.3368680

A Bring Your Own Device security awareness survey among professionals (opens in new window)

Author(s): Petihakis, George and Kiritsis, Dimitrios and Farao, Aristeidis and Bountakas, Panagiotis and Panou, Aggeliki and Xenakis, Christos
Published in: 2023
Publisher: ACM
DOI: 10.1145/3600160.3605072

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments (opens in new window)

Author(s): Ioannis Kalderemidis; Aristeidis Farao; Panagiotis Bountakas; Sakshyam Panda; Christos Xenakis
Published in: 2022
Publisher: ACM
DOI: 10.1145/3538969.3544431

ObjectMap: detecting insecure object deserialization (opens in new window)

Author(s): Nikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, and Christos Xenakis
Published in: 2019
Publisher: PCI
DOI: 10.1145/3368640.3368680

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain (opens in new window)

Author(s): Aristeidis Farao; Georgios Paparis; Sakshyam Panda; Emmanouil Panaousis; Apostolis Zarras; Christos Xenakis
Published in: International Journal of Information Security, Issue 2, 2023, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-023-00741-8

[m]allotROPism: a metamorphic engine for malicious software variation development (opens in new window)

Author(s): Christos Lyvas, Christoforos Ntantogian & Christos Xenakis
Published in: International Journal of Information Security, 2022, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-021-00541-y

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements (opens in new window)

Author(s): Antonio Muñoz; Aristeidis Farao; Jordy Ryan Casas Correia; Christos Xenakis
Published in: Information, Issue 15, 2021, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12090357

EKnad: Exploit Kits’ network activity detection (opens in new window)

Author(s): Panagiotis Bountakas, Christoforos Ntantogian, Christos Xenakis
Published in: Future Generation Computer Systems, 2022, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2022.04.001

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats (opens in new window)

Author(s): Anna Angelogianni, Ilias Politis, Farnaz Mohammadi, Christos Xenakis
Published in: IEEE Access, Issue 8, 2020, Page(s) 224677-224701, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.3045322

Defense strategies for Adversarial Machine Learning: A survey (opens in new window)

Author(s): Panagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, Christos Xenakis
Published in: Defense strategies for Adversarial Machine Learning: A survey, 2023, ISSN 1574-0137
Publisher: Elsevier BV
DOI: 10.1016/j.cosrev.2023.100573

HELPHED: Hybrid Ensemble Learning PHishing Email Detection (opens in new window)

Author(s): Panagiotis Bountakas, Christos Xenakis
Published in: Journal of Network and Computer Applications, 2022, ISSN 1084-8045
Publisher: Academic Press
DOI: 10.1016/j.jnca.2022.103545

Post-incident audits on cyber insurance discounts (opens in new window)

Author(s): Sakshyam Panda, Daniel W Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis
Published in: Computers & Security, Issue 87, 2019, Page(s) 101593, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.101593

Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits (opens in new window)

Author(s): Aron Laszka, Emmanouil Panaousis, Jens Grossklags
Published in: Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings, Issue 11199, 2018, Page(s) 508-520, ISBN 978-3-030-01553-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-01554-1_29

SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions (opens in new window)

Author(s): Aristeidis Farao, Sakshyam Panda, Sofia Anna Menesidou, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi, Nikolaos Georgopoulos, Michael Sirivianos, Nikos Salamanos, Spyros Loizou, Michalis Pingos, John Polley, Andrew Fielder, Emmanouil Panaousis, Christos Xenakis
Published in: Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings, Issue 12395, 2020, Page(s) 65-74, ISBN 978-3-030-58985-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-58986-8_5

Cyber-Insurance: Past, Present and Future (opens in new window)

Author(s): Sakshyam Panda; Farao, Aristeidis; Panaousis, Emmanouil; Xenakis, Christos
Published in: Issue 12, 2021
Publisher: Springer
DOI: 10.5281/zenodo.4541119

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0