About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

D2.2 System and dependency analysis (second iteration) – Pilot scenario definition

This deliverable of the CS-AWARE project is the second in an iterative series of three deliverables (D2.1 System and dependency analysis (first iteration) – Cybersecurity requirements for local public administrations, D2.2 System and dependency analysis (second iteration) - Pilot scenario definition and D2.3 System and dependency analysis (third iteration) – Pilot scenario specification and [...]

2021-02-16T19:44:57+00:00March 28th, 2019|Deliverable|

D2.1 System and dependency analysis (first iteration) – Cybersecurity requirements for local public administrations

This deliverable of the CS-AWARE project is the first in an iterative series of three deliverables (D2.1 System and dependency analysis (first iteration) – Cybersecurity requirements for local public administrations, D2.2 System and dependency analysis (second iteration) - Pilot scenario definition and D2.3 System and dependency analysis (third iteration) – Pilot scenario specification and [...]

2021-02-16T19:44:57+00:00March 28th, 2019|Deliverable|

D3.1 System and dependency analysis tool support adaptation

This delivery describes improvements to GraphingWiki. GraphingWiki has been in use to describe complex systems and this document describes the adaptation for CS-AWARE. The adaptation consists of a new user interface. The implementation is continuing, as we still integrate feedback of the adaptation and extend the export functionality. View PDF [...]

2021-02-16T19:44:57+00:00March 28th, 2019|Deliverable|

Risk management and cybersecurity attacks

In the financial sphere, the risk is associated with uncertainty (possibility of fluctuations in value, both in a positive and negative sense). In cybersecurity, the events of interest are always linked to losses of value, but maintain the character of uncertainty. We are therefore interested in the random events concerning the IT security of [...]

2019-03-28T12:48:09+00:00March 28th, 2019|Blog|

Exploring Knowledge Graphs in an Interpretable Composite Approach for Text Entailment

AAAI 2019 : Thirty-Third AAAI conference on artificial intelligence Recognizing textual entailment is a key task for many semantic applications, such as Question Answering, Text Summarization, and Information Extraction, among others. Entailment scenarios can range from a simple syntactic variation to more complex semantic relationships between pieces of text, but most approaches try [...]

2021-02-12T21:56:06+00:00March 28th, 2019|Papers|

Open source technologies within the concept of self-healing

11th Panhellenic Free / Open Source Software Communities Meeting (FOSSCOM 2018), 13-14 October 2018, University of Crete, Heraklion, Crete, Greece. In this talk we'll discuss the main concepts of Self-Healing and analyse Self-Healing models. The analysis and evaluation of each model is done based on a set of criteria such as the management [...]

2021-02-12T21:56:54+00:00March 28th, 2019|Papers|

Cybersecurity & Economic Forum of Delphi

Delphi Economic Forum, one of the most prestigious Greek annual events took place between Thursday, February 28 and Sunday, March 3, 2019 aiming to identify the main global trends, assess their implications and review the resulting challenges and policy options confronting decision-makers of the wider Eastern Mediterranean Region.On the subject of cybersecurity, a fruitful debate [...]

2019-03-26T13:56:14+00:00March 26th, 2019|Blog|

Only 1/3 of the employees trust their digital skills

According to a study of the Vodafone Institute, that investigates the acceptability of new technologies in Europe, Asia and the USA, there is a global shortage of digital skill. In fact, only 29% of the employees consider their digital skills adequate, 85% acknowledges that, nowdays, digital skills are necessary at work, while 56% admit that [...]

2019-03-20T11:53:51+00:00March 20th, 2019|Blog|

Revenge porn: an open problem about privacy

In these days the problem of the revenge porn has been brought again to the attention of the italians by the case of Giulia Sarti. For the ill-unaware some intimate photos of the ex five-stars deputee Giulia Sarti has been shared online. Up to today we do not know who did this or why, but [...]

2019-03-20T11:54:30+00:00March 20th, 2019|Blog|

Cybersecurity act approved by European parliament

This Tuesday (13-03-2019) the European Parliament has approved the adoption of new norms to implement a certification system for Cybersecurity in the European Union. This system, aptly named Cybersecurity act, aims to guarantee that products and services sold on the European market will satisfy a certain standard for security requirements. A concern towards increased risks [...]

2019-03-20T11:39:56+00:00March 20th, 2019|Blog|
Go to Top