WP.1
D1.1Technical requirement specification – Confidential | 31 Dec 2019 | ||
D1.2Commercial requirement specification | 31 Dec 2019 | ||
D1.3Regulatory requirement specification | 31 Dec 2019 | ||
D1.4System architecture v1 – Confidential | 30 Apr 2020 | ||
D1.5System architecture-final update – Confidential | 28 Feb 2021 | ||
D1.6EnergyShield data privacy and ethical compliance report – Confidential | 30 Jun 2022 |
WP.2
D2.1Socio-cyber-physical threat model – RESTREINT UE | 31 Mar 2020 | ||
D2.2Updated security culture framework and tool | 30 Jun 2020 | ||
D2.3VA tool release incl. usability and performance report – Confidential | 31 Aug 2020 | ||
D2.4Cybersecurity supply chain risk analysis incl. audit best practices – RESTREINT UE | 31 Aug 2020 | ||
D2.5Socio-cyber-physical threat model – final version – RESTREINT UE | 31 Dec 2021 | ||
D2.6Updated security culture framework and tool – final version | 31 Dec 2021 | ||
D2.7VA tool release incl. usability and performance report – final version – Confidential | 31 Dec 2021 | ||
D2.8Cybersecurity supply chain risk analysis incl. audit best practices – final version – RESTREINT UE | 31 Dec 2021 |
WP.3
D3.1Anomaly detection tool release – Confidential | 30 Apr 2020 | ||
D3.2DDoS mitigation tool release – Confidential | 30 Jun 2020 | ||
D3.3Anomaly detection tool release – final version – Confidential | 31 Dec 2021 | ||
D3.4DDoS mitigation tool release – final version – Confidential | 31 Dec 2021 |
WP.4
D4.1SIEM tool release – Confidential | 30 Jun 2020 | ||
D4.2Automated forensic report – Confidential | 30 Apr 2020 | ||
D4.3Data privacy and data security report – Confidential | 30 Apr 2020 | ||
D4.4SIEM tool release – final version – Confidential | 31 Dec 2021 | ||
D4.5Automated forensic report – final version – Confidential | 31 Dec 2021 | ||
D4.6Data privacy and data security report – final version – Confidential | 31 Dec 2021 |
WP.5
D5.1Integration and test plan | 30 Jun 2020 | ||
D5.2Common software platform release, incl. user and developer documentation – Confidential | 30 Sep 2020 | ||
D5.3System release v1 – Confidential | 28 Feb 2021 | ||
D5.4System release v2 – Confidential | 31 Aug 2021 | ||
D5.5System release v3 – Confidential | 31 Dec 2021 | ||
D5.6Test/QA report | 31 Dec 2021 | ||
D5.7Common software platform release, incl. user and developer documentation – final version – Confidential | 30 Apr 2022 |
WP.6
D6.1Offline field trial report – Confidential | 31 Oct 2021 | ||
D6.2Online field trial report – RESTREINT UE | 30 Apr 2022 | ||
D6.3Field trial evaluation summary report | 30 Jun 2022 | ||
D6.4Penetration testing reports – RESTREINT UE | 30 Jun 2022 |
WP.7
D7.1Communication plan – Confidential | 30 Sep 2019 | ||
D7.2Communication report v1 | 30 Jun 2020 | ||
D7.3Communication report final | 30 Jun 2022 | ||
D7.4Dissemination plan – Confidential | 31 Oct 2019 | ||
D7.5Dissemination report v1 | 30 Jun 2020 | ||
D7.6Dissemination report final | 30 Jun 2022 | ||
D7.7Ecosystem report | 30 Jun 2022 | ||
D7.8Collaboration report | 30 Jun 2022 | ||
D7.9Communication report v2 | 30 Jun 2021 | ||
D7.10Dissemination report v2 | 30 Jun 2021 |
WP.8
D8.1Exploitation plan draft – Confidential | 31 Dec 2019 | ||
D8.2Exploitation report v1 – Confidential | 31 Dec 2020 | ||
D8.3Exploitation report final – Confidential | 30 Jun 2022 | ||
D8.4Business cases | 30 Apr 2022 | ||
D8.5IPR registry – Confidential | 30 Jun 2022 | ||
D8.6Standardization report | 30 Jun 2022 |
WP.9
D9.1Societal Impact Report | 30 Jun 2022 | ||
D9.2Project QA Handbook – Confidential | 30 Sep 2019 | ||
D9.3Data Management Plan v1 – Confidential | 31 Dec 2019 | ||
D9.4Data Management Plan v2 – Confidential | 30 Jun 2021 | ||
D9.5Data Management Plan – final version – Confidential | 30 Jun 2022 |
WP.10
D10.1H – Requirement No. 1 – Confidential | 30 Jun 2020 | ||
D10.2H – Requirement No. 2 – Confidential | 30 Jun 2020 | ||
D10.3POPD – Requirement No. 3 – Confidential | 30 Apr 2020 | ||
D10.4POPD – Requirement No. 4 – Confidential | 30 Apr 2020 | ||
D10.5POPD – Requirement No. 5 – Confidential | 30 Apr 2020 | ||
D10.6POPD – Requirement No. 6 – Confidential | 30 Apr 2020 | ||
D10.7POPD – Requirement No. 7 – Confidential | 30 Apr 2020 |
Year | Authors | Title | Venue | Status |
2019 | Hacks, Hacks, Katsikeas, Klaer, Lagerström | Creating MAL Instances Using ArchiMate on the Example of Attacks on Power Plants and Power Grids | 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC) | Published |
2020 | Bounas, Georgiadou, Kontoulis, Mouzakitis, Askounis | Towards a cybersecurity culture tool through a holistic, multi-dimensional assessment framework | IADIS Information Systems Conference | Published |
2020 | Acarali, Rajarajan, Chema, Ginzburg | Modelling DoS Attacks & Interoperability in the Smart Grid | ICCCN 10th Internal Workshop on Security, Privacy, Trust, and Machine Learning for Internet of Things | Published |
2020 | Acarali, Rajarajan, Chema, Ginzburg | A Characterisation of Smart Grid DoS Attacks | EAI International Conference on Security and Privacy in New Computing Environments | Published |
2020 | Välja, Heiding, Lagerström, Franke | Automating threat modeling using an ontology framework | Cybersecurity, Springer Open, journal | Published |
2020 | Ling, Lagerström, Ekstedt | A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain | 15th International Conference on Critical Information Infrastructures Security (CRITIS 2020) | Published |
2020 | Georgiadou, Mouzakitis, Askounis | Towards Assessing Critical Infrastructures’ Cyber-Security Culture during COVID-19 crisis: A Tailor-made Survey | 4th International Conference on Networks and Security (NSEC2020) | Published |
2020 | Georgiadou, Mouzakitis, Askounis, Bounas | A Cyber-Security Culture Framework for Assessing the Organization Readiness | Journal of Computer Information Systems | Published |
2020 | Hacks, Katsikeas, Ling, Lagerström, Ekstedt |
powerLang: a probabilistic attack simulation language for the power domain |
Energy Informatics | Published |
2020 | Katsikeas, Hacks, Johnson, Ekstedt, Lagerström, Jacobsson, Wällstedt, Eliasson |
A probabilistic attack simulation language for the IT domain |
Graphical Models for Security | Published |
2020 | Zarpelão, et al. |
How Machine Learning Can Support Cyberattack Detection in Smart Grids |
Artificial Intelligence Techniques for a Scalable Energy Transition | Published |
2020 | Dixit, Asif and Rajarajan |
Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0 |
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society | Published |
2021 | Georgiadou, Mouzakitis, Askounis | The International Journal of Network Security and Its Applications (IJNSA) | Published | |
2021 | Loxdal, Andersson, Hacks, Lagerström | 54th Hawaii International Conference on System Sciences | Published | |
2021 | Georgiadou, Mouzakitis, Askounis |
Working from home during COVID-19 crisis: a cyber security culture assessment survey |
Security Journal | Published |
2021 | Hacks, Katsikeas |
Towards an Ecosystem of Domain Specific Languages for Threat Modeling |
33rd International Conference on Advanced Information Systems Engineering | Published |
2021 | Hersén, Hacks, Fögen | Enterprise, Business-Process and Information Systems Modeling | Published | |
2021 | Xiong, Hacks, Lagerström |
A Method for Assigning Probability Distributions in Attack Simulation Languages |
Complex Systems Informatics and Modeling Quarterly | Published |
2021 | Georgiadou, Mouzakitis, Askounis |
Detecting Insider Threat via a Cyber-Security Culture Framework |
Journal of Computer Information Systems | Published |
2021 | Georgiadou, Mouzakitis, Askounis |
Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework |
Sensors | Published |
2021 | Hacks, Butun, Lagerström, Buhaiu, Georgiadou, Michalitsi – Psarrou | International Conference on Availability, Reliability and Security (ARES 2021) | Published | |
2021 | Sklavidis, Angelidis, Babagiannou, Liapis |
Enhancing SIEM technology for protecting electrical power and energy sector
|
IEEE CSR EPES-SPR Workshop | Published |
2021 | Sari and Butun |
Early Detection and Recovery Measures for Smart Grid Cyber-Resilience |
Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities; book by IGI | Published |
2021 | Acarali et al. |
Modelling Smart Grid IT-OT Dependencies for DDoS Impact Propagation |
Elsevier’s Computers & Security journal | Published |
2021 | Georgiadou et al. |
MDPI Healthcare | Published | |
2021 | Dixit, Singh, Rahulamathavan and Rajarajan |
FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain |
IEEE Internet of Things Journal | Published |
2021 | Touloumis et al. |
Vulnerabilities Manager, a platform for linking vulnerability data sources |
2021 IEEE International Conference on Big Data (Big Data) | Published |
2022 | Georgiadou et al. |
A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures |
MDPI Healthcare | Published |
2022 | Engström and Lagerström |
Two Decades of Cyberattack Simulations: A Systematic Literature Review |
Elsevier’s Computers & Security journal | Published |
2022 | Urrea Cabus, Butun and Lagerström | Zooming Innovation in Consumer Electronics International Conference 2022 (ZINC 2022) | Published | |
2022 |
Qadir et al. |
Zooming Innovation in Consumer Electronics International Conference 2022 (ZINC 2022) | Published |
Published whitepapers are enlisted here:
Year | Author(s) | Title of the Whitepaper | Company |
2021 | Joar Jacobsson | Threat Modeling and Attack Simulations in the Energy Sector Analysis Process | Foreseeti AB |
2022 | Anna Georgiadou | Security Behaviour Analysis | National Technical University of Athens |
2022 | Joar Jacobsson Ismail Butun, Robert Lagerström, Jose Cabus |
securiCAD Vulnerability Assessment Tool | FORESEETI, KTH Royal Institute of Technology |
2022 | Anna Georgiadou | Automated Forensic Tool | National Technical University of Athens |
2022 | Aras Arasilango | Homomorphic Encryption | Tech Inspire Ltd |
2022 | Gianluca Serale, Giuseppe Carnevale, Stefania Sella, Alessandro Armellin, Emiliano Roggero |
EnergyShield pilot at the electrical energy distribution grid of Turin | IREN, IRETI, CSP |
2022 | Nikolay Palov, Magda Zafeiropoulou, Maria Atanasova |
Implement the online field trials in Bulgaria | Software Company Limited |
2022 | Christos Angelidis | Security Information and Event Management tool | Konnektable Technologies |
2022 | Yisrael Gross, Rajarajan Muttukrishnan | Ammune DDoSM Tool for Anomaly Detection & DDoS Mitigation | L7 Defense, City University of London |
2022 | Hagai Galili | Anomaly Detection tool | SIGA |
2022 | Iacob Crucianu, Lavinia Dincă, Ana-Maria Dumitrescu |
EnergyShield toolkit | SIMAVI |