Loading...

An Innovative Self-Healing Approach with STIX Data Utilisation

Spyros, Arnolnt; Rantos, Konstantinos; Papanikolaou, Alexandros; Ilioudis, Christos Organisations nowadays devote many resources in maintaining a robust security posture against emerging cyber-threats. This typically requires rapid response against newly identified or shared threat information so that appropriate countermeasures are immediately deployed to eliminate these threats or reduce the associated risks. For many shared indicators, [...]

2021-02-16T19:51:11+00:00October 7th, 2020|Papers|

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Computers Journal, vol 9(1), 2020, article number 18 IThreat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an [...]

2021-02-12T21:52:48+00:00March 22nd, 2020|Papers|

An Information Flow Model to Support NIS Mandated Reporting

Automous Systems 2019: An Almanac 137-143, 12th Conference on Autonomous Systems  - Cala Millor, Mallorca, Spanien 23-30 October 2019 Gerald Quirchmayir, Veronika Kupfersberger, Gregor Langner, Thomas Schaberreiter

2021-02-12T21:53:25+00:00October 30th, 2019|Papers|

Enhancing credibility of digital evidence through provenance-based incident response handling

ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security ACM New York, NY, USA, 26-29 August 2019 Digital forensics are becoming increasingly important for the investigation of computer-related crimes, white-collar crimes and massive hacker attacks. After an incident has been detected an appropriate incident response is usually initiated with the [...]

2021-02-12T22:04:50+00:00August 29th, 2019|Papers|

A quantitative evaluation of trust in the quality of cyber threat intelligence sources

14th International Conference on Availability, Reliability and Security (ARES 2019) - Canterbury, United Kingdom, 26–29 August 2019 Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr https://phaidra.univie.ac.at/o:1076811

2021-02-12T22:06:14+00:00August 29th, 2019|Papers|

A Cybersecurity Situational Awareness and Information-Sharing Solution for Local Public Administrations based on Advanced Big Data Analysis: The CS-AWARE Project, Challenges in Cybersecurity and Privacy – the European Research Landscape

RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS In this chapter, the EU-H2020 project CS-AWARE (running from 2017 to 2020) is presented. CS-AWARE proposes a cybersecurity awareness solution for local public administrations (LPAs) in line with the currently developing European legislatory cybersecurity framework. CS-AWARE aims to increase the automation of cybersecurity awareness approaches, [...]

2021-02-12T22:07:53+00:00June 1st, 2019|Papers|

Exploring Knowledge Graphs in an Interpretable Composite Approach for Text Entailment

AAAI 2019 : Thirty-Third AAAI conference on artificial intelligence Recognizing textual entailment is a key task for many semantic applications, such as Question Answering, Text Summarization, and Information Extraction, among others. Entailment scenarios can range from a simple syntactic variation to more complex semantic relationships between pieces of text, but most approaches try [...]

2021-02-12T21:56:06+00:00March 28th, 2019|Papers|

Open source technologies within the concept of self-healing

11th Panhellenic Free / Open Source Software Communities Meeting (FOSSCOM 2018), 13-14 October 2018, University of Crete, Heraklion, Crete, Greece. In this talk we'll discuss the main concepts of Self-Healing and analyse Self-Healing models. The analysis and evaluation of each model is done based on a set of criteria such as the management [...]

2021-02-12T21:56:54+00:00March 28th, 2019|Papers|

Applying Soft Systems Methodology to Complex Problem Situations in Critical Infrastructures: The CS-AWARE Case Study

Modern technology, in addition to all its benefits, creates new threats and attack vectors to individuals and organisations. In the past years the number of cyber attacks has increased drastically as has the extent of their effects. These circumstances clearly show that a different approach to cybersecurity is required: a holistic, collaborative strategy to [...]

2021-02-12T21:57:33+00:00February 7th, 2019|Papers|

Security-Driven Information Flow Modelling for Component Integration in Complex Environments

IAIT 2018 Proceedings of the 10th International Conference on Advances in Information Technology Conceptualising and developing a new software solution is always a daunting task, even more so when existing technologies of international partners are to be integrated into a unique and holistic product, as is the case in many international research and innovation projects. The individual [...]

2021-02-12T21:58:08+00:00February 7th, 2019|Papers|
Go to Top