Author(s):

M. Anastasiadis, G. Aivatoglou, G. Spanos, A. Voulgaridis and K. Votis

Keywords:

Software Vulnerability categorization, Cybersecurity, Machine Learning, Clustering

Author(s):

G. Aivatoglou, M. Anastasiadis, G. Spanos, A. Voulgaridis, K. Votis and D. Tzovaras

Keywords:

Software Vulnerability categorization, Cyber-security, Machine Learning, Decision Trees, Random Forests, Gradient Boosting

Author(s):

Paloma de La Vallee, Georgi Nikolow, Thibault Debatty, Wim Mees

Keywords:

Author(s):

Pavel Varbanov

Keywords:

competencies, cybersecurity skills, design, framework, training program

Author(s):

Vyacheslav Kharchenko, Herman Fesenko, Oleg Illiashenko

Keywords:

artificial intelligence, quality model, quality, characteristic

Author(s):

Viktor Makarichev, Vladimir Lukin, Oleg Illiashenko, Vyacheslav Kharchenko

Keywords:

image representation, lossless image compression, image protection, atomic function, atomic wavelet, discrete atomic transform, security, privacy, IoT, edge computing

Author(s):

Ievgen Babeshko, Oleg Illiashenko, Vyacheslav Kharchenko, Kostiantyn Leontiev

Keywords:

safety, security, FMECA, expert assessment

Author(s):

Vyacheslav Kharchenko, Oleg Illiashenko, Herman Fesenko, Ievgen Babeshko

Keywords:

Artificial intelligence, Automation transportation systems, Cybersecurity assurance, IMECA

Author(s):

Paloma de La Vallee, Georgios Iosifidis, Andrea Rossi, Marco Dri, Wim Mees

Keywords:

maritime, training, cyber range federation

Author(s):

Casper Almén, Nicholas Hagström, and Jyri Rajamäk

Keywords:

Early warning system, ECHO project, cybersecurity, cybercrime, energy sector

Author(s):

Jyri Rajamäki; Janne Lahdenperä; Velizar Shalamanov

Keywords:

Design science research, ECHO governance model, Data governance, Management information system

Author(s):

Irena Mladenova; Georgi Penchev; Velizar Shalamanov

Keywords:

Governance Model, Analytical Hierarchical Process, Change Management, Process Design, Organisational Design, Consulting Services

Author(s):

Rajamäki, Jyri; Ruoslahti, Harri

Keywords:

ECHO project, SHAPES project, federated cyber range, security validation

Author(s):

Georgios Aivatoglou, Mike Anastasiadis, Georgios Spanos, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras & Lefteris Angelis

Keywords:

Software vulnerabilities, Multi-target classification, Cybersecurity, Machine learning

Author(s):

Alessandro Zanasi; Daniele Cristofori; Graziano Giorgi

Keywords:

cyber range, early warning system, cybersecurity, cyberwar, cyberwarfare

Author(s):

Jyri Rajamäki, Rauno Pirinen

Keywords:

COVID-19, Electronic learning, Pandemics, Target recognition, Conferences, Education, Employment

Author(s):

Jarek Duda, Marcin Niemiec

Keywords:

symmetric cryptography, lightweight cryptography, data compression, entropy coding

Author(s):

Sten Mäses, Kaie Maennel, Agnė Brilingaitė

Keywords:

cyber defense exercises, cybersecurity training, scoring system, capacity building, team performance, incident response, performance feedback, cybersecurity exercise design

Author(s):

Marcin Niemiec, Salvatore Marco Pappalardo, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller

Keywords:

cybersecurity, threats, risk assessment, challenges and opportunities

Author(s):

Miłosz Stypiński, Marcin Niemiec

Keywords:

mutual learning, neural networks, key agreement, cybersecurity

Author(s):

Consuelo Colabuono, Douglas Wiemer, Maria Vittoria Marabello, Piotr Bogacki, Andrzej Dziech, Giuseppe Chechile, Riccardo Feletto, Marco Dri, Grégory Depaix, Massimo Ravenna, Marco Quartullo, Paolo Modica, Massimiliano Tarquini

Keywords:

certification scheme, security problem definition, sectoral risk assessment, protection profile, cyber range, assurance level, maritime, healthcare, energy,

Author(s):

Andrzej Dziech, Piotr Bogacki, Jan Derkacz

Keywords:

watermarking, image protection, PHL transform, data embedding, multimedia systems

Author(s):

Miłosz Stypiński, Marcin Niemiec

Keywords:

Synchronization, Security, Protocols, Cryptography, Neurons, Computer architecture, Learning systems

Author(s):

Maciej Sawka and Marcin Niemiec

Keywords:

cybersecurity; cryptography; block ciphers; symmetric key; iterated ciphers; smart grids

Author(s):

Michał Bajor and Marcin Niemiec

Keywords:

blockchain; authorization; authentication; accounting; configuration; smart grids

Author(s):

Maciej Sawka and Marcin Niemiec

Keywords:

cybersecurity; cryptography; block ciphers; symmetric key; iterated ciphers; smart grids

Author(s):

George Sharkov; Christina Todorova; Georgi Koykov; Ivan Nikolov

Keywords:

cyber range, Cybersecurity, exercising, federated, simulation, training

Author(s):

Paloma de la Vallée; Georgios Iosifidis; Wim Mees

Keywords:

automation, cybersecurity training, exercises, orchestration, red teaming, Sly

Author(s):

Pavel Varbanov

Keywords:

competencies, cybersecurity skills, design, framework, training program

Author(s):

Ilona Frisk; Ilkka Tikanmäki; Harri Ruoslahti

Keywords:

cyber threats, E-skills, ICT technologies

Author(s):

Georgi Penchev; Velizar Shalamanov

Keywords:

business model, governance consulting, governance design, proprietary tools, service provision

Author(s):

Irena Mladenova; Velizar Shalamanov; Antoniya Shalamanova-Filipova

Keywords:

change management, governance consulting, service design and provision, stakeholder management

Author(s):

Piotr Jurgała; Tytus Kurek; Marcin Niemiec

Keywords:

access control, authentication, cloud environment, Cybersecurity, privacy, secure services

Author(s):

Arnold Spyros, Angelos Papoutsis, Ilias Koritsas, Notis Mengidis, Christos Iliou, Dimitris Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris

Keywords:

cyber threat intelligence, machine learning, honeypots, ensemble methods, Wazuh

Author(s):

Notis Mengidis, Maya Bozhilova, Cyril Ceresola, Consuelo Colabuono, Michael Cooke, Gregory Depaix, Angel Genchev, Georgi Koykov, Wim Mees, Matteo Merialdo, Antonis Voulgaridis, Theodora Tsikrika , Konstantinos Votis, Stefanos Vrochidis

Keywords:

cyber range, training, federated, simulation, cybersecurity, prototyping, certification

Author(s):

Simola Jussi

Keywords:

Information sharing, Early warning, Standards, ECHO project

Author(s):

Pavlos Evangelatos Information Technologies Institute, CERTH, Thessaloniki, Greece ; Christos Iliou; Thanassis Mavropoulos; Konstantinos Apostolou; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

Keywords:

Cyber Threat Intelligence, Named Entity Recognition, DNRTI, BERT, XLNet, RoBERTa, ELECTRA

Author(s):

Panos Panagiotou; Christos Iliou; Konstantinos Apostolou; Theodora Tsikrika; Stefanos Vrochidis; Periklis Chatzimisios; Ioannis Kompatsiaris

Keywords:

cyber security, cyber threat intelligence, content selection, text classification, machine learning, NER

Author(s):

О. О. Illiashenko; М. А. Kolisnyk; А. E. Strielkina; І. V. Kotsiuba; V. S. Kharchenko

Keywords:

Information and control systems of critical applications, Internet of Things, dependability, cybersecurity, functional safety

Author(s):

J Simola

Keywords:

information sharing, cybersecurity, HAVARO, privacy, early warning

Author(s):

Vasilis Katos, Duncan Ki-Aries, Shamal Faily, Angel Genchev, Maya Bozhilova, Nikolai Stoianov

Keywords:

cyber defense, user requirements elicitation, use case analysis, CAIRIS modelling

Author(s):

Murat Odemis, Cagatay Yucel, Ahmet Koltuksuz

Keywords:

Author(s):

Vyacheslav Kharchenko, Oleg Illiashenko, Vladimir Sklyar

Keywords:

FPGA; project; instrumentation and control systems; design methods and tools; invariant; safety-critical systems; safety assessment

Author(s):

Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos

Keywords:

data-driven circular economy, smart cities, maturity model, vulnerability contextualization

Author(s):

Christos Iliou, Theodoros Kostoulas , Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kompatsiaris

Keywords:

computing methodologies, machine learning, learning paradigms, supervised learning, information systems, world wide web, web mining

Author(s):

Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya, Jane Henriksen-Bulmer, Alice Cooper

Keywords:

data privacy, data sanitisation, cyber threat intelligence, information sharing

Author(s):

Burak Mavzer, Kadir; Konieczna, Ewa; Alves, Henrique; Yucel, Cagatay; Chalkias, Ioannis; Mallis, Dimitrios; Cetinkaya, Deniz; Galindo Sanchez, Luis Angel

Keywords:

trust in cyber threat intelligence, cyber threat intelligence quality, information sharing

Author(s):

Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kopmatsiaris

Keywords:

advanced web bots, generative adversarial networks, evasive web bots, mouse movements, humanlike behaviour

Author(s):

Vyacheslav Kharchenko; Ihor Kliushnikov; Herman Fesenko; Oleg Illiashenko

Keywords:

advanced security assurance case, AI, ASAC, cyberattacks, failures, ML, multi-UAV mission planning, reliability-based model

Author(s):

Georgi Penchev

Keywords:

ADKAR, CNO, collaborative network organisation, cybersecurity community, governance

Author(s):

Cagatay Yucel; Adam Lockett; Ioannis Chalkias; Dimitrios Mallis; Vasilios Katos

Keywords:

cyber threat intelligence, dynamic analysis, malware analysis, malware intelligence, static analysis

Author(s):

Panos Panagiotou; Notis Mengidis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

Keywords:

AI, anomaly detection, artificial intelligence, computer security, Cybersecurity, intrusion detection

Author(s):

Bartłomiej Gdowski; Rafał Kościej; Marcin Niemiec

Keywords:

cybersecurity, heuristic algorithm, intrusion detection, network attack

Author(s):

Andrzej Dziech

Keywords:

orthogonal transform; signal processing; image processing

Author(s):

Andrew Roberts, Nikita Snetkov, Olaf Maennel

Keywords:

Author(s):

Sten Mäses, Kaie Maennel, Mascia Toussaint, Veronica Rosa

Keywords:

organising cybersecurity exercises, evaluation, quality indicators, cybersecurity incident response

Author(s):

Csaba Virág, Jakub Čegan, Tomáš Lieskovan, Matteo Merialdo

Keywords:

systematics, conferences, ecosystems, standards organizations, Europe, organizations, stakeholders

Author(s):

Nikos Oikonomou, Notis Mengidis, Minas Spanopoulos-Karalexidis, Antonis Voulgaridis, Matteo Merialdo, Ivo Raisr, Kaarel Hanson, Paloma de La Vallee, Theodora Tsikrika, Stefanos Vrochidis, Konstantinos Votis

Keywords:

training, conferences, emulation, scattering, security, computer crime, portals

Author(s):

M.A .Brignoli, A.P. Caforio, F. Caturano, M. D’Arienzo, M. Latini, W. Matta, S.P. Romano, B. Ruggiero

Keywords:

network security, key performance indicators, security metrics, network modeling, network testbeds

Author(s):

M. A. Brignoli, S. Mazzaro, G. Fortunato, A. Corà, W. Matta, S. P. Romano, B. Ruggiero, V. Coscia

Keywords:

indicators, analytics, big data, threats, iot, ai, cyber security, cyber resilience

Author(s):

Kristine Hovhannisyan, Piotr Bogacki, Consuelo Assunta Colabuono, Domenico Lofù, Maria Vittoria Marabello, Brady Eugene Maxwell

Keywords:

cybersecurity, certification, common criteria, protection profile, security problem definition, healthcare, PACS, security requirements, security objectives, assurance level,

Author(s):

Carmelo Ardito, Tommaso Di Noia, Domenico Lofù, Andrea Pazienza, Felice Vitulano

Keywords:

Author(s):

Todor Tagarev, Nikolai Stoianov

Keywords:

cybersecurity, cyberattacks, scenario space, capability requirements, technology roadmap, cyber skills

Author(s):

Todor Tagarev, Bríd Á. Davis, Michael Cooke

Keywords:

cybersecurity, collaborative networked organisation, CNO, organisational modalities, business model, governance requirements, governance model, ECHO project

Author(s):

Marcin Niemiec, Rafał Kościej, Bartłomiej Gdowski

Keywords:

cybersecurity, intrusion detection, network attack, heuristic algorithm

Author(s):

Ioannis Tsimperidis, Cagatay Yucel, Vasilios Katos

Keywords:

keystroke dynamics; data mining; user classification; feature selection; feature comparison

Author(s):

Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris

Keywords:

cybersecurity, blockchain, AI, energy grid, smart grid, smart contracts, consensus algorithms

Author(s):

Velizar Shalamanov, Silvia Matern, Georgi Penchev

Keywords:

digitalization, cyber resilience, change management, portfolio management, service management, personnel management, innovation management

Author(s):

Sergiy Dotsenko, Oleg Illiashenko, Sergii Kamenskyi, Vyacheslav Kharchenko

Keywords:

security, safety, enterprise management system, control system, standards, integrated security management system, industry 4.0

Author(s):

Sergiy Dotsenko, Oleg Illiashenko, Iegor Budnichenko, Vyacheslav Kharchenko

Keywords:

digitalization, cyber resilience, change management, portfolio management, service management, personnel management, innovation management

Author(s):

Todor Tagarev, Nikolai Stoianov

Keywords:

cybersecurity, cyberattacks, scenario space, capability requirements, technology roadmap, cyber skills

Author(s):

Simola, Jussi; Lehto, Martti

Keywords:

information sharing, HAVARO, cybersecurity, early warning

Author(s):

Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller

Keywords:

ECHO project, cybersecurity, risk assessment framework, challenges and opportunities

Author(s):

Maciej Mencner, Marcin Niemiec

Keywords:

security, privacy, bloom filters, SecaaS services, cloud

Author(s):

Potii O., Tsyplinskyi Y., Illiashenko O., Kharchenko V.

Keywords:

critical information infrastructure, critical infrastructure object, categorization assessment techniques, cybersecurity

Author(s):

Michał Bajor, Marcin Niemiec

Keywords:

audio, machine learning, MIDI format, steganography

Author(s):

Vyacheslav Kharchenko, Olga Morozova, Oleg Illiashenko, Sergii Sokolov

Keywords:

digital twin, DT coverage, industrial IoT, industry 4.0, Internet of Things, logistics, manufacturing

Author(s):

Vyacheslav Kharchenko, Sergiy Dotsenko, Yuriy Ponochovnyi, Oleg Illiashenko

Keywords:

online verification, resilience, resilience control system, safety, security

Author(s):

Todor Tagarev, Salvatore Marco Pappalardo, Nikolai Stoianov

Keywords:

critical infrastructure, cyber risk assessment, cybersecurity, E-MAF, ECHO project, essential services, interdependencies

Author(s):

Harri Ruoslahti

Keywords:

COVID19, learning platform, online learning, online teaching

Author(s):

Georgi Penchev; Antoniya Shalamanova

Keywords:

collaborative network organization, cyber security community, governance, innovation management, virtual breeding environment

Author(s):

Yantsislav Yanakiev

Keywords:

CNOs, collaborative networked organisations, cybersecurity, governance model, science and technology

Author(s):

Harri Ruoslahti, Amir Trent

Keywords:

organization, innovation, culture, cybersecurity

Author(s):

Kirsi Aaltola and Harri Ruoslahti

Keywords:

competence development, cybersecurity, innovation, network co-creation, organisational learning, skills acquisition

Author(s):

Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Evangelos Karagiannis, Deniz Cetinkaya and Vasilios Katos

Keywords:

ATT&CK framework, cyber threat intelligence, unified cyber kill chain, pyramid of pain, data quality dimensions

Author(s):

Shahin Rostami, Agnieszka Kleszcz, Daniel Dimanov and Vasilios Katos

Keywords:

cybersecurity, vulnerability, mitre ATT&CK, machine learning, dataset imputation

Author(s):

Oliver Nock, Jonathan Starkey, Constantinos Marios Angelopoulos

Keywords:

cyber-range, IoT, testbed, cybersecurity

Author(s):

Jyri Rajamäki; Vasilis Katos

Keywords:

case study, Cybersecurity, early warning system, ECHO, information sharing, information sharing models, trust models

Author(s):

George Sharkov; Yavor Papazov; Christina Todorova; Georgi Koykov; Georgi Zahariev

Keywords:

cyber threats, information security, cybersecurity, C2 and coordination, emerging technologies,

Author(s):

Todor Tagarev, Bríd Á. Davis

Keywords:

cybersecurity, collaborative networked organisation, business model, governance requirements, governance model, ECHO project

Author(s):

Kaie Maennel

Keywords:

cybersecurity, learning analytics, learning metrics, training, exercises

Author(s):

Yantsislav Yanakiev, Todor Tagarev

Keywords:

applied computing, enterprise computing, IT governance, Information systems, Information systems applications, Enterprise information systems, Social and professional topics

Author(s):

Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos,

Keywords:

computer crime, cryptography, data privacy, internet, security concerns, emerging threat landscape, blockchain-based DNS

Author(s):

Maryna Kolisnyk, Vyacheslav Kharchenko, Iryna Piskachova

Keywords:

Industrial Internet of things, Cyberattacks, Dependability, , Availability function, Cybersecurity,

Author(s):

Todor Tagarev, Yantsislav Yanakiev

Keywords:

Industry 4.0, business model, collaborative networked organisations, CNOs, cybersecurity, taxonomy, ECHO project

Author(s):

Todor Tagarev

Keywords:

Industry 4.0, Industry 5.0, collaborative networked organisations, CNOs, network governance , cybersecurity , interviews , ECHO project

Author(s):

Miralem Mehic, Marcin Niemiec, Harun Siljak, Miroslav Voznak

Keywords:

error reconciliation, quantum key distribution, performances reversibility

Author(s):

Mohammed Al Qurashia, Constantinos Marios Angelopoulosa, Vasilios Katosa

Keywords:

ids, IoT, wireless sensor networks, rpl protocol, sinkhole attack

Author(s):

Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, Georgios Pangalos

Keywords:

digital forensics, digital forensic readiness, threat intelligence, threat hunting

Author(s):

Todor Tagarev

Keywords:

cybersecurity competence network, collaborative networked organisation, network governance, requirements; prioritisation

Author(s):

K. Rantos, A. Spyros, A. Papanikolaou, A. Kritsas, C. Ilioudis, V. Katos

Keywords:

cyber threat information, cyber threat intelligence, interoperability, cybersecurity

Author(s):

Todor Tagarev; George Sharkov

Keywords:

agility, cybersecurity, distributed system,, high-performance computing, operations, policy, resilience, risk management

Author(s):

Todor Tagarev; Nikolai Stoianov; George Sharkov

Keywords:

bio-integrated systems, cyber security, cyber-physical system, decision making

Author(s):

Sergiy Dotsenko; Oleg Illiashenko; Sergii Kamenskyi; Vyacheslav Kharchenko

Keywords:

information security, information technologies, IT security, knowledge management, security standards

Author(s):

Sergiy Dotsenko; Oleg Illiashenko; Sergii Kamenskyi; Vyacheslav Kharchenko

Keywords:

control system, enterprise management system, industry 4.0, integrated security management system, safety,

Author(s):

Jouni Pöyhönen; Viivi Nuojua; Martti Lehto; Jyri Rajamäki

Keywords:

critical Infrastructure, cybersecurity, information sharing, situational awareness

Author(s):

Jyri Rajamäki; Ilkka Tikanmäki; Jari Räsänen

Keywords:

cybersecurity, early warning, echo project, information sharing, maritime surveillance, sharing sensitive cyber information

Author(s):

Jussi Simola

Keywords:

cooperation, early warnings, echo project, indicators, information sharing, situational awareness

Author(s):

Kirsi Aaltola; Petteri Taitto

Keywords:

cybersecurity, education and training, exercises, human factors, organizational learning

Author(s):

Marcin Niemiec; Andrzej Dziech; Miłosz Stypiński; Jan Derkacz

Keywords:

communications, next-generation Internet, quantum techniques,

Author(s):

Notis Mengidis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

Keywords:

AI, blockchain, cybersecurity, energy grid, smart contracts, smart grid

Author(s):

Todor Tagarev; George Sharkov; Nikolai Stoianov; Velizar Shalamanov

Keywords:

cybersecurity, resilience research management

Author(s):

Velizar Shalamanov; Georgi Penchev

Keywords:

cyber security, enterprise architecture, governance, IT security, management, modeling, network analysis, simulation