June 23, 2022

Towards an integrated platform for skills in cyber built on the European Cybersecurity Skills Framework

Difficult to understand the trainings big picture The needs to protect oneself against threats to information and operations, to maintain the cybersecurity posture of an organization and to increase the resilience against such threats, are still urgently felt by all interested parties. A core component to fulfilling these needs, is...

Read More
June 9, 2022

On the Security Assessment of the Cloud

A plethora of highly effective Threat Analysis (TA) techniques exist that focus on analyzing threats to specifically targeted assets (e.g., components, services), typically considering static interconnections among them. On the other hand, the Cloud is a dynamic environment where resources can instantiate or migrate to provide rapid scalability to the...

Read More
May 25, 2022

The ethical contextualization of trust

In the blog series I presented here [1][2], I tried to establish the connection between the human/user behavior and the online trustworthiness of systems, products, people, places, information… I also pointed out the various ways in which system designers try to address trust-related issues, the constrained context in which this...

Read More
May 18, 2022

Initial analysis on the Russo-Ukrainian War corpus on Twitter

Twitter consists one of the most popular social networks, attracting millions of users, including malicious entities. In this study, we delve into a recent dataset regarding the Russo-Ukrainian war in order to analyze malicious activity and suspension of users from Twitter. The scope of this work is to investigate online...

Read More
May 11, 2022

Preparing for a Quantum Era

A very common buzzword frequently being used throughout the tech industry is the inevitable rise of quantum computing. These novel computers, by taking advantage of properties derived from quantum physics, have the ability to surpass computing barriers imposed by the already established and traditional way today’s computers operate. Still, an...

Read More
May 5, 2022

Visualization helps clear the fog of Cyberwar

The phrase “fog of war” is often used to convey the uncertainty prevalent during military operations where unit commanders have to make decisions without having a clear picture of the battlefield, or the movements of bothfriendly and hostile forces. In cyber-defense the same uncertainty is complicating how to respond to...

Read More
April 28, 2022

Smart home and remote health service, use case in CONCORDIA

The developed demonstrator from Y1 and Y2 get progress in Y3 on the following aspects: A smart-card reader is added as a patient identification and authentication feature. This allows to register, identify and log in/out of patients in a real case scenario.User management is integrated for demonstration of concept for...

Read More
April 20, 2022

Countermeasures and Research Actions

COVID-19 has increased reliance on information technologies in all aspects of life, creating new gaps and exacerbating existing ones, making us more than ever vulnerable to new and already existing security threats. As a first thing, in we identified the most relevant threats, gaps, and challenges, with particular reference...

Read More
April 14, 2022

On the Cybersecurity Planning and Investments: An Approach with Economic Bias

Many of the problems plaguing cybersecurity are technical in nature, but they may have an economic motivation (e.g., to obtain financial profits) and certainly, an economic impact. The primary motivation (besides espionage and destruction) behind cyberattacks is making financial profits. On one hand, there are known examples as ransomware attacks...

Read More
April 6, 2022

Anomaly Detection with Privacy-preserved Peer-to-peer Federated Learning

In the context of IoT, the augment of the computational power and capacity of edge devices enables the use of distributed ML approaches, pushing the computation of the models to these edge devices. Federated Learning (FL) has emerged as a very promising paradigm for training distributed ML models. FL allows...

Read More
1 2 3 12