Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Geiger Cybersecurity Counter

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Training Plan (opens in new window)
Intermediate Training report (opens in new window)

Intermediate Training Report

Validation Report (opens in new window)
Intermediate Impact Report (opens in new window)

Intermediate Impact Report includes dissemination report for the first 18 months a refined exploitation plan including the preliminary business model to be tested in the WP4 demonstrations and preliminary results and lessonslearned shared with GEIGERrelated standardisation

Impact Plan (opens in new window)

Impact Plan: includes the dissemination plan and inputs identified from mapping GEIGER-related standardisation.

Final Report (opens in new window)

Final Report including the second Advisory Board report

Architecture (opens in new window)
Release (opens in new window)
Final Training Report (opens in new window)
Demonstration Report (opens in new window)
Final Impact Report (opens in new window)

Final Impact Report includes the dissemination report for up to month 30 and the final exploitation plan including the business model financial analysis report on creating the organisation for offering and maintaining GEIGER recommendations for rolling out GEIGER across Europe and final results and lessonslearned shared with GEIGERrelated standardisation

Year 1 Report (opens in new window)
Data Management Plan (opens in new window)
Year 2 Report (opens in new window)

Year 2 Report including the first Advisory Board report

Requirements (opens in new window)

Publications

The Role of Machine Learning in Cybersecurity (opens in new window)

Author(s): Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
Published in: Digital Threats: Research and Practice, 2022, ISSN 2692-1626
Publisher: Association for Computing Machinery
DOI: 10.1145/3545574

SYMBALS: A Systematic Review Methodology Blending Active Learning and Snowballing (opens in new window)

Author(s): Max van Haastrecht, Injy Sarhan, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Published in: Frontiers in Research Metrics and Analytics, Issue 6, 2021, Page(s) 1-14, ISSN 2504-0537
Publisher: Frontiers
DOI: 10.3389/frma.2021.685591

CySecEscape 2.0—A Virtual Escape Room To Raise Cybersecurity Awareness (opens in new window)

Author(s): Emanuel Löffler, Bettina Schneider, Petra Maria Asprion,Trupti Zanwar
Published in: International Journal of Serious Games, Issue 8/1, 2021, ISSN 2384-8766
Publisher: International Journal of Serious Games
DOI: 10.17083/ijsg.v8i1.413

Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics (opens in new window)

Author(s): Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis, Marco Spruit
Published in: Applied Sciences, Issue 11(15), 2021, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app11156909

Can We Survive without Labelled Data in NLP? Transfer Learning for Open Information Extraction (opens in new window)

Author(s): Injy Sarhan, Marco Spruit
Published in: Applied Sciences, Issue 10/17, 2020, Page(s) 5758, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app10175758

The Effect of Countermeasure Readability on Security Intentions (opens in new window)

Author(s): Tim Smit, Max van Haastrecht, Marco Spruit
Published in: Journal of Cybersecurity and Privacy, Issue 1(4), 2021, ISSN 2624-800X
Publisher: MDPI
DOI: 10.3390/jcp1040034

Requirements Analysis in Disruptive Engineering Solutions Using the Paradigm of Living Systems (opens in new window)

Author(s): Emilia Brad, Stelian Brad
Published in: Applied Sciences 2021, Issue 11(21), 2021, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app11219854

Adaptable GDPR Assessment Tool for Micro and Small Enterprises (opens in new window)

Author(s): Löffler E., Schneider B., Goerre A. and Asprion P.
Published in: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, Issue 1, 2022, Page(s) 301-308, ISSN 2184-4992
Publisher: Scitepress
DOI: 10.5220/0011014200003179

SMEs’ Confidentiality Concerns for Security Information Sharing (opens in new window)

Author(s): Alireza Shojaifar, Samuel A. Fricker
Published in: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, Issue 593, 2020, Page(s) 289-299, ISBN 978-3-030-57403-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57404-8_22

GEIGER: Solution for small businesses to protect themselves against cyber-threats (opens in new window)

Author(s): José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Publisher: Association for Computing Machinery
DOI: 10.1145/3465481.3469202

Classifying SMEs for Approaching Cybersecurity Competence and Awareness (opens in new window)

Author(s): Heini Järvinen, Alireza Shojaifar
Published in: ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, ISBN 9781450390514
Publisher: Association for Computing Machinery
DOI: 10.1145/3465481

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0