Author(s):

Simola, Jussi; Lehto, Martti

Keywords:

information sharing, HAVARO, cybersecurity, early warning

Author(s):

Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller

Keywords:

ECHO project, cybersecurity, risk assessment framework, challenges and opportunities

Author(s):

Maciej Mencner, Marcin Niemiec

Keywords:

security, privacy, bloom filters, SecaaS services, cloud

Author(s):

Potii O., Tsyplinskyi Y., Illiashenko O., Kharchenko V.

Keywords:

critical information infrastructure, critical infrastructure object, categorization assessment techniques, cybersecurity

Author(s):

Michał Bajor, Marcin Niemiec

Keywords:

audio, machine learning, MIDI format, steganography

Author(s):

Vyacheslav Kharchenko, Olga Morozova, Oleg Illiashenko, Sergii Sokolov

Keywords:

digital twin, DT coverage, industrial IoT, industry 4.0, Internet of Things, logistics, manufacturing

Author(s):

Vyacheslav Kharchenko, Sergiy Dotsenko, Yuriy Ponochovnyi, Oleg Illiashenko

Keywords:

online verification, resilience, resilience control system, safety, security

Author(s):

Todor Tagarev, Salvatore Marco Pappalardo, Nikolai Stoianov

Keywords:

critical infrastructure, cyber risk assessment, cybersecurity, E-MAF, ECHO project, essential services, interdependencies

Author(s):

Harri Ruoslahti

Keywords:

COVID19, learning platform, online learning, online teaching

Author(s):

Georgi Penchev; Antoniya Shalamanova

Keywords:

collaborative network organization, cyber security community, governance, innovation management, virtual breeding environment

Author(s):

Yantsislav Yanakiev

Keywords:

CNOs, collaborative networked organisations, cybersecurity, governance model, science and technology

Author(s):

Harri Ruoslahti, Amir Trent

Keywords:

organization, innovation, culture, cybersecurity

Author(s):

Kirsi Aaltola and Harri Ruoslahti

Keywords:

competence development, cybersecurity, innovation, network co-creation, organisational learning, skills acquisition

Author(s):

Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Evangelos Karagiannis, Deniz Cetinkaya and Vasilios Katos

Keywords:

ATT&CK framework, cyber threat intelligence, unified cyber kill chain, pyramid of pain, data quality dimensions

Author(s):

Shahin Rostami, Agnieszka Kleszcz, Daniel Dimanov and Vasilios Katos

Keywords:

cybersecurity, vulnerability, mitre ATT&CK, machine learning, dataset imputation

Author(s):

Oliver Nock, Jonathan Starkey, Constantinos Marios Angelopoulos

Keywords:

cyber-range, IoT, testbed, cybersecurity

Author(s):

Jyri Rajamäki; Vasilis Katos

Keywords:

case study, Cybersecurity, early warning system, ECHO, information sharing, information sharing models, trust models

Author(s):

George Sharkov; Yavor Papazov; Christina Todorova; Georgi Koykov; Georgi Zahariev

Keywords:

cyber threats, information security, cybersecurity, C2 and coordination, emerging technologies,

Author(s):

Todor Tagarev, Bríd Á. Davis

Keywords:

cybersecurity, collaborative networked organisation, business model, governance requirements, governance model, ECHO project

Author(s):

Kaie Maennel

Keywords:

cybersecurity, learning analytics, learning metrics, training, exercises

Author(s):

Yantsislav Yanakiev, Todor Tagarev

Keywords:

applied computing, enterprise computing, IT governance, Information systems, Information systems applications, Enterprise information systems, Social and professional topics

Author(s):

Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos,

Keywords:

computer crime, cryptography, data privacy, internet, security concerns, emerging threat landscape, blockchain-based DNS

Author(s):

Maryna Kolisnyk, Vyacheslav Kharchenko, Iryna Piskachova

Keywords:

Industrial Internet of things, Cyberattacks, Dependability, , Availability function, Cybersecurity,

Author(s):

Todor Tagarev, Yantsislav Yanakiev

Keywords:

Industry 4.0, business model, collaborative networked organisations, CNOs, cybersecurity, taxonomy, ECHO project

Author(s):

Todor Tagarev

Keywords:

Industry 4.0, Industry 5.0, collaborative networked organisations, CNOs, network governance , cybersecurity , interviews , ECHO project

Author(s):

Miralem Mehic, Marcin Niemiec, Harun Siljak, Miroslav Voznak

Keywords:

error reconciliation, quantum key distribution, performances reversibility

Author(s):

Mohammed Al Qurashia, Constantinos Marios Angelopoulosa, Vasilios Katosa

Keywords:

ids, IoT, wireless sensor networks, rpl protocol, sinkhole attack

Author(s):

Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, Georgios Pangalos

Keywords:

digital forensics, digital forensic readiness, threat intelligence, threat hunting

Author(s):

Todor Tagarev

Keywords:

cybersecurity competence network, collaborative networked organisation, network governance, requirements; prioritisation

Author(s):

K. Rantos, A. Spyros, A. Papanikolaou, A. Kritsas, C. Ilioudis, V. Katos

Keywords:

cyber threat information, cyber threat intelligence, interoperability, cybersecurity

Author(s):

Todor Tagarev; George Sharkov

Keywords:

agility, cybersecurity, distributed system,, high-performance computing, operations, policy, resilience, risk management

Author(s):

Todor Tagarev; Nikolai Stoianov; George Sharkov

Keywords:

bio-integrated systems, cyber security, cyber-physical system, decision making

Author(s):

Sergiy Dotsenko; Oleg Illiashenko; Sergii Kamenskyi; Vyacheslav Kharchenko

Keywords:

information security, information technologies, IT security, knowledge management, security standards

Author(s):

Sergiy Dotsenko; Oleg Illiashenko; Sergii Kamenskyi; Vyacheslav Kharchenko

Keywords:

control system, enterprise management system, industry 4.0, integrated security management system, safety,

Author(s):

Jouni Pöyhönen; Viivi Nuojua; Martti Lehto; Jyri Rajamäki

Keywords:

critical Infrastructure, cybersecurity, information sharing, situational awareness

Author(s):

Jyri Rajamäki; Ilkka Tikanmäki; Jari Räsänen

Keywords:

cybersecurity, early warning, echo project, information sharing, maritime surveillance, sharing sensitive cyber information

Author(s):

Jussi Simola

Keywords:

cooperation, early warnings, echo project, indicators, information sharing, situational awareness

Author(s):

Kirsi Aaltola; Petteri Taitto

Keywords:

cybersecurity, education and training, exercises, human factors, organizational learning

Author(s):

Marcin Niemiec; Andrzej Dziech; Miłosz Stypiński; Jan Derkacz

Keywords:

communications, next-generation Internet, quantum techniques,

Author(s):

Notis Mengidis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

Keywords:

AI, blockchain, cybersecurity, energy grid, smart contracts, smart grid

Author(s):

Todor Tagarev; George Sharkov; Nikolai Stoianov; Velizar Shalamanov

Keywords:

cybersecurity, resilience research management

Author(s):

Velizar Shalamanov; Georgi Penchev

Keywords:

cyber security, enterprise architecture, governance, IT security, management, modeling, network analysis, simulation