Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics

19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.

Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities

EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.

Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities

EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.

How does resilience relate to risk

Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.

Stack and Stick are in Stock

CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).

Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks

EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.

Collaborative Ranking of Results in Pilot Projects for the EU Cybersecurity Competence Community

IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
Cybersecurity ecosystem in EU is a hot topic, as it relates to the recent establishment of the EU Cybersecurity Competence Centre (ECCC), the Network of National Coordination Centres (NCCs) and the Cybersecurity Community (CC).

TERME: a cyber-physical resilience toolset for risk assessment

IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
With the increased digitalization and adoption of cost-effective off-the-shelf components and cyber connectivity, Critical Infrastructures (CI) operators have benefited in many ways, but the attack surface has also become larger.

Governance Mesh Approach for Cybersecurity Ecosystem

Plovdiv (Bulgaria)
Four EU pilot projects were launched in 2019 (ECHO, SPARTA, CSEU, and CONCORDIA) with the focus on specific context of EU Regulation that is establishing the European Cybersecurity Competence Centre (ECCC), together with the Network of National Coordination Centers (NCCs), and Competence communit

Digital Sovereignty in Cyber Security

Cybersec4Europe project has been quite influential as a pilot of the Cyber Competence Network, contributing to a wide and rich community of cybersecurity stakeholders.

Next Generation Platform-as-a-Service (NGPaaS) From DevOps to Dev-for-Operations

NGPaaS White Paper published on Atos Global Blog

LEPS – Leveraging eID in the Private Sector

Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers. ISBN: 9788770220880 doi: https://doi.org/10.13052/rp-9788770220873 https://www.riverpublishers.com/research_details.php?book_id=711

From Innovative Niches to a Cooperative IoT Ecosystem. Creating Business Value for Federated and Interoperable IoT Platforms.

2nd Global IoT Summit: IoT Technologies and Applications for the Benefit of Society

ZONESEC: built-in cyber-security for wide area surveillance system

ZONESEC: built-in cyber-security for wide area surveillance system. Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz. Reggio Calabria, Italy, August 29 – September 1, 2017 (ARES 2017)

ZONESEC: built-in cyber-security for wide area surveillance system

It describes how the multi-agent architecture originaly proposed in ZONeSEC project can be applied also to cyber-security components in order to address challenges such as cost, complexity or difficulty to coordinate activities in distributed settings, such as cross-border surveillance operations