January 6, 2021

An interview on our new research paper – A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicles

Dr. Leandros Maglaras was interviewed from Elsevier regarding a recently accepted article in Elsevier Array journal. In this paper, an Intrusion Detection System (IDS) based on supervised Machine Learning (ML) algorithms was developed to detect spoofing attackers and exclude them from the proposed system for Dynamic Wireless Charging of Electric...

Read More
November 26, 2020

CODE 2020: “European Digital Sovereignty – Road to Success?”

Under the German EU presidency, the Research Institute CODE at the Bundeswehr University Munich organised from 10th to 12th November 2020 its annual conference. Due to the pandemic situation, CODE 2020 was held as a digital conference, including high-level discussions, 7 workshops, an innovation conference as well as science track...

Read More
November 19, 2020


Cyberspace is an idea that resides in our minds but has a poorly concrete image. When I was a doctoral student in software reliability, I thought cyberspace was the data superhighway. My proudly written code could exchange data with other code incredibly fast, no matter where both were running. I...

Read More
November 13, 2020

Do you need a cyber range? The KYPO Cyber Range Platform is now available for free

Yes, it is true. We release the KYPO Cyber Range Platform (KYPO CRP) as open-source software to help develop cybersecurity skills in Europe. This activity aims to help solve the problem of many lacking cybersecurity experts by providing a platform for training, development, and execution. The release of an open-source...

Read More
November 5, 2020

(Emerging) digital identity models and their impact on user-centric security

According to Kim Cameron[1](Chief Architecture of Identity from 2004 to 2019 at Microsoft), the Internet - as we know it today, was built without an identity layer. Moreover, the World Wide Web inventor, Tim Berners-Lee, recently started a new project named Solid[2], to radically change how the Internet works today...

Read More
October 22, 2020

Cybersecurity in the financial sector – part II

In our last post about Cybersecurity in the Financial Sector we presented some of the main threats to which the financial services entities are exposed, and we concluded about the relevance of cyber-threat intelligence (CTI) sharing tools in order to react fast to several types of cyber-attacks that can affect...

Read More
October 15, 2020

How 5G can leverage Cyber Threat Intelligence

Cellular mobile networks have evolved across five generations starting from analogue voice-centric services, going through IP-based mobile services and, today, we stand before the 5th generation that supports various industry vertical use cases requiring enhanced mobile broadband, massive IoT and critical communications. Along with each generation, the threat surface has...

Read More
October 8, 2020

Make Digital Work, not just Function

Security, Privacy, Trust & Trustworthiness, by Design Misalignment Nr. 1 There still is huge misalignment between the economics of selling technology, products, systems and services, and the economics of security, privacy, trust and trustworthiness. On that, the Head of Europol's Cybercrime Centre (EC3), Steve Wilson, for instance stated the following:...

Read More
October 1, 2020

Integration of MISP into Flowmon ADS

In this document, we will describe the integration of the MISP platform and the Flowmon Anomaly Detection System. The purpose of this integration is to automatically detect a threat in the network using indicators of compromise provided via an instance of the MISP platform connected to Flowmon. One of the...

Read More
September 24, 2020

Work in Progress: the CONCORDIA Platform for Threat Intelligence

Our first steps to improve Europe’s information position in cybersecurity We present CONCORDIA’s vision for a cross-sector, pan-European platform for collecting, analyzing, and sharing threat intelligence, which combines datasets built up in different parts of the project. What is threat intelligence? Threat intelligence can be defined as the process of...

Read More