Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics
19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.
Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities
EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.
Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities
EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.
How does resilience relate to risk
Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.
Stack and Stick are in Stock
CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).
Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks
EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.
Collaborative Ranking of Results in Pilot Projects for the EU Cybersecurity Competence Community
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
Cybersecurity ecosystem in EU is a hot topic, as it relates to the recent establishment of the EU Cybersecurity Competence Centre (ECCC), the Network of National Coordination Centres (NCCs) and the Cybersecurity Community (CC).
TERME: a cyber-physical resilience toolset for risk assessment
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
With the increased digitalization and adoption of cost-effective off-the-shelf components and cyber connectivity, Critical Infrastructures (CI) operators have benefited in many ways, but the attack surface has also become larger.
Governance Mesh Approach for Cybersecurity Ecosystem
Plovdiv (Bulgaria)
Four EU pilot projects were launched in 2019 (ECHO, SPARTA, CSEU, and CONCORDIA) with the focus on specific context of EU Regulation that is establishing the European Cybersecurity Competence Centre (ECCC), together with the Network of National Coordination Centers (NCCs), and Competence communit
Digital Sovereignty in Cyber Security
Cybersec4Europe project has been quite influential as a pilot of the Cyber Competence Network, contributing to a wide and rich community of cybersecurity stakeholders.
MegaM@Rt2 EU Project: Open Source Tools for Mega-Modelling at Runtime of CPSs
16th International Conference on Open Source Systems
Next Generation Platform-as-a-Service (NGPaaS) From DevOps to Dev-for-Operations
NGPaaS White Paper published on Atos Global Blog
LEPS – Leveraging eID in the Private Sector
Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers.
ISBN: 9788770220880
doi: https://doi.org/10.13052/rp-9788770220873
https://www.riverpublishers.com/research_details.php?book_id=711
From Innovative Niches to a Cooperative IoT Ecosystem. Creating Business Value for Federated and Interoperable IoT Platforms.
2nd Global IoT Summit: IoT Technologies and Applications for the Benefit of Society
ZONESEC: built-in cyber-security for wide area surveillance system
ZONESEC: built-in cyber-security for wide area surveillance system. Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz. Reggio Calabria, Italy, August 29 – September 1, 2017 (ARES 2017)
ZONESEC: built-in cyber-security for wide area surveillance system
It describes how the multi-agent architecture originaly proposed in ZONeSEC project can be applied also to cyber-security components in order to address challenges such as cost, complexity or difficulty to coordinate activities in distributed settings, such as cross-border surveillance operations