Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Democratizing a Cyber Security Toolkit for SMEs and MEs

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Initial Services for Data Protection (opens in new window)

Report summarizing the work done and tools provided to WP3 during the first project reporting period

CyberKit4SME toolkit specifications (opens in new window)

CyberKit4SME toolkit specifications M12

CyberKit4SME requirements analysis (opens in new window)

CyberKit4SME requirements analysis M06

CyberKit4SME handbook (opens in new window)

CyberKit4SME handbook M36

2nd report on dissemination actions and final results (opens in new window)

2nd report on dissemination actions including crossproject collaboration and results M36 Lead UoS Cyber Status PU

1st report on dissemination actions and preliminary results (opens in new window)

1st report on dissemination actions including crossproject collaboration and results M18 Lead UoS Cyber Status PU

Cyber range training course content (opens in new window)

Cyber range training course content M24 Lead UoS Cyber Status PU

Final Services for Data Protection (opens in new window)

Report summarizing the work done and tools provided to WP3 during the subsequent project reporting period

Marketing material, website, D&C Plan (opens in new window)

Marketing material website DC Plan M03 Lead UoS Cyber Status PU

Collaborative Working Environment and its maintenance (opens in new window)

Collaborative Working Environment and its maintenance M2 Release of the online environment that the Consortium will use as working environment including internal communication tasks monitoring and document sharing It could also provide an area for sharing files with the EC Officers if necessary

Publications

Privacy-Aware IoT: State-of-the-Art and Challenges (opens in new window)

Author(s): Shukun Tokas, Gencer Erdogan, Ketil Stølen
Published in: Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP), Issue pp. 450-461, 2023
Publisher: SciTePress
DOI: 10.5220/0011656400003405

Information Security & Risk Management: Trustworthiness and Human Interaction (opens in new window)

Author(s): Erdogan, G., Tverdal, S., Phillips, S. & Fair, N.
Published in: Tutorial on International Conference on Research Challenges in Information Science (RCIS), 2022
Publisher: Springer Nature
DOI: 10.1007/978-3-031-05760-1

The HORM Diagramming Tool: A Domain-Specific Modelling Tool for SME Cybersecurity Awareness (opens in new window)

Author(s): Costas Boletsis; Sefat Orni; Ragnhild Halvorsrud
Published in: Proceedings of the 18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2023), Issue Volume 3, 2023
Publisher: SciTePress
DOI: 10.5220/0011786600003417

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs. (opens in new window)

Author(s): Gencer Erdogan, Iver Bakken Sperstad, Michele Garau, Oddbjørn Gjerde, Inger Anne Tøndel, Shukun Tokas, Martin Gilje Jaatun
Published in: Software Technologies - 17th International Conference, ICSOFT 2022, Issue Volume 1859, pp. 98-121, 2022
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-37231-5_5

Tell me what that means to you: Small-story narratives in technology adoption. (opens in new window)

Author(s): Pickering, J. B., Phillips, S. & Surridge, M.
Published in: Human-Computer Interaction. Theoretical Approaches and Design Methods - Thematic Area, HCI 2022, Held as Part of the 24th HCI International Conference, (HCII), Issue Volume 13302, pp. 274-289, 2022
Publisher: ACM
DOI: 10.1007/978-3-031-05311-5_19

Private Data Harvesting on Alexa using Third-Party Skills (opens in new window)

Author(s): Jack Corbett and Erisa Karafili
Published in: Emerging Technologies for Authorization and Authentication - 4th International Workshop (ETAA), Issue Volume 13136, pp. 127-142, 2021
Publisher: Springer, Lecture Notes in Computer Science
DOI: 10.1007/978-3-030-93747-8_9

Embedded Vision for Self-Driving on Forest Roads (opens in new window)

Author(s): Grigorescu, S. M., Zaha, M., Trasnea, B. & Ginerica, C.
Published in: 17th Embedded Vision Workshop” (EVW2021) in conjunction with CVPR, Volume abs/2105.13754., 2021
Publisher: arxiv
DOI: 10.48550/arXiv.2105.13754

Forensic analysis of Tor in Windows environment: A case study (opens in new window)

Author(s): Vaia-Maria Angeli; Ahmad Atamli; Erisa Karafili
Published in: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Issue Article No.: 156, 2022
Publisher: ACM
DOI: 10.1145/3538969.3543808

An end-to-end framework for privacy risk assessment of AI models (opens in new window)

Author(s): Goldsteen, A., Shachor, S. & Razinkov, N.
Published in: SYSTOR '22: The 15th ACM International Systems and Storage Conference, 2022
Publisher: ACM
DOI: 10.1145/3534056.3534998

Cybersecurity for SMEs: Introducing the Human Element into Socio-Technical Cybersecurity Risk Assessment (opens in new window)

Author(s): Konstantinos Boletsis, Ragnhild Halvorsrud, J. Brian Pickering, Stephen Phillips, Mike Surridge
Published in: Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), Issue Volume 3, pp. 266-274, 2021
Publisher: SciTePress
DOI: 10.5220/0010332902660274

A Need for Privacy-Assistive Technology in Notice and Consent Paradigm in IoT (opens in new window)

Author(s): Shukun Tokas, Gencer Erdogan
Published in: Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe, Issue Volume 1807, pp. 35-49, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-36096-1_3

Cybersecurity Awareness and Capacities of SMEs (opens in new window)

Author(s): Erdogan, Gencer; Halvorsrud, Ragnhild; Boletsis, Costas; Tverdal, Simeon; Pickering, John Brian
Published in: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), 2023
Publisher: Scitepress
DOI: 10.5220/0011609600003405

Pickering, J. B., Phillips, S. & Erdogan, G. (opens in new window)

Author(s): I Just Want to Help: SMEs Engaging with Cybersecurity Technology.
Published in: HCI for Cybersecurity, Privacy and Trust - 5th International Conference (HCI-CPT), Held as Part of the 25th HCI International Conference (HCII), Issue Volume 14045, pp. 338-352, 2023
Publisher: SPRINGER
DOI: 10.1007/978-3-031-35822-7_23

Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees) (opens in new window)

Author(s): Kaiying Luan; Ragnhild Halvorsrud; Costas Boletsis
Published in: Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), Issue Volume 1, 509-518, 2023
Publisher: scitepress
DOI: 10.5220/0011680500003405

Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles. (opens in new window)

Author(s): Sorin Mihai Grigorescu; Tiberiu T. Cocias; Bogdan Trasnea; Andrea Margheri; Federico Lombardi; Leonardo Aniello
Published in: Sensors, Issue Volume 20, 2020, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20195450

A Hybrid Threat Model for Smart Systems (opens in new window)

Author(s): Fulvio Valenza; Erisa Karafili; Rodrigo Vieira Steiner; Emil C. Lupu
Published in: IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3213577

It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness. (opens in new window)

Author(s): J. Brian Pickering; Costas Boletsis; Ragnhild Halvorsrud; Stephen Phillips; Mike Surridge
Published in: HCI for Cybersecurity, Privacy and Trust - Third International Conference (HCI-CPT), 2021
Publisher: Springer
DOI: 10.1007/978-3-030-77392-2_22

Protecting Sensitive Tabular Data in Hybrid Clouds (opens in new window)

Author(s): Maya Anderson, Gidon Gershinsky, Eliot Salant, Salvador Garcia
Published in: 2023
Publisher: arxiv
DOI: 10.48550/arXiv.2312.01354

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0