WP.1

  D1.1Technical requirement specification – Confidential  31 Dec 2019  
D1.2Commercial requirement specification 31 Dec 2019  
D1.3Regulatory requirement specification 31 Dec 2019  
  D1.4System architecture v1 – Confidential  30 Apr 2020  
  D1.5System architecture-final update – Confidential  28 Feb 2021  
  D1.6EnergyShield data privacy and ethical compliance report – Confidential  30 Jun 2022  

 

WP.2

  D2.1Socio-cyber-physical threat model – RESTREINT UE 31 Mar 2020  
D2.2Updated security culture framework and tool 30 Jun 2020  
  D2.3VA tool release incl. usability and performance report – Confidential  31 Aug 2020  
  D2.4Cybersecurity supply chain risk analysis incl. audit best practices – RESTREINT UE 31 Aug 2020  
  D2.5Socio-cyber-physical threat model – final version – RESTREINT UE 31 Dec 2021  
D2.6Updated security culture framework and tool – final version 31 Dec 2021  
  D2.7VA tool release incl. usability and performance report – final version – Confidential  31 Dec 2021  
  D2.8Cybersecurity supply chain risk analysis incl. audit best practices – final version –  RESTREINT UE 31 Dec 2021  

 

WP.3

  D3.1Anomaly detection tool release – Confidential  30 Apr 2020  
  D3.2DDoS mitigation tool release – Confidential  30 Jun 2020  
  D3.3Anomaly detection tool release – final version – Confidential  31 Dec 2021  
  D3.4DDoS mitigation tool release – final version – Confidential  31 Dec 2021  

 

WP.4

  D4.1SIEM tool release – Confidential  30 Jun 2020  
  D4.2Automated forensic report – Confidential  30 Apr 2020  
  D4.3Data privacy and data security report – Confidential  30 Apr 2020  
  D4.4SIEM tool release – final version – Confidential  31 Dec 2021  
  D4.5Automated forensic report – final version – Confidential  31 Dec 2021  
  D4.6Data privacy and data security report – final version – Confidential  31 Dec 2021  

 

WP.5

D5.1Integration and test plan 30 Jun 2020  
  D5.2Common software platform release, incl. user and developer documentation – Confidential  30 Sep 2020  
  D5.3System release v1 – Confidential  28 Feb 2021  
  D5.4System release v2 – Confidential  31 Aug 2021  
  D5.5System release v3 – Confidential  31 Dec 2021  
D5.6Test/QA report 31 Dec 2021  
  D5.7Common software platform release, incl. user and developer documentation – final version – Confidential  30 Apr 2022  

 

WP.6

  D6.1Offline field trial report  – Confidential  31 Oct 2021  
  D6.2Online field trial report –  RESTREINT UE 30 Apr 2022  
D6.3Field trial evaluation summary report 30 Jun 2022  
  D6.4Penetration testing reports –  RESTREINT UE 30 Jun 2022  

 

WP.7

  D7.1Communication plan – Confidential  30 Sep 2019  
D7.2Communication report v1 30 Jun 2020  
D7.3Communication report final 30 Jun 2022  
  D7.4Dissemination plan – Confidential  31 Oct 2019  
D7.5Dissemination report v1 30 Jun 2020  
D7.6Dissemination report final 30 Jun 2022  
D7.7Ecosystem report 30 Jun 2022  
D7.8Collaboration report 30 Jun 2022  
D7.9Communication report v2 30 Jun 2021  
D7.10Dissemination report v2 30 Jun 2021  

 

WP.8

  D8.1Exploitation plan draft – Confidential  31 Dec 2019  
  D8.2Exploitation report v1 – Confidential  31 Dec 2020  
  D8.3Exploitation report final – Confidential  30 Jun 2022  
D8.4Business cases 30 Apr 2022  
  D8.5IPR registry – Confidential  30 Jun 2022  
D8.6Standardization report 30 Jun 2022  

 

WP.9

D9.1Societal Impact Report 30 Jun 2022  
  D9.2Project QA Handbook – Confidential  30 Sep 2019  
  D9.3Data Management Plan v1 – Confidential  31 Dec 2019  
  D9.4Data Management Plan v2 – Confidential  30 Jun 2021  
  D9.5Data Management Plan – final version – Confidential  30 Jun 2022  

 

WP.10

  D10.1H – Requirement No. 1 – Confidential  30 Jun 2020  
  D10.2H – Requirement No. 2 – Confidential  30 Jun 2020  
  D10.3POPD – Requirement No. 3 – Confidential  30 Apr 2020  
  D10.4POPD – Requirement No. 4 – Confidential  30 Apr 2020  
  D10.5POPD – Requirement No. 5 – Confidential  30 Apr 2020  
  D10.6POPD – Requirement No. 6 – Confidential  30 Apr 2020  
  D10.7POPD – Requirement No. 7 – Confidential  30 Apr 2020  
EnergyShield – Whitepapers Dissemination Schedule
10 June 2022  
EnergyShield – Final Event Information
10 June 2022  
Good News from EnergyShield Project
01 Nov 2021  
Energy Shield – Workshop a full success 25 May 2021  
Energy Shield – EPES Workshop 24 Mar 2021  
Energy Shield – A successful year comes to an end 08 Dec 2020  
EnergyShield – First Year finished 15 Sep 2020  
EnergyShield reaching out more and more 8 Apr 2020  
EnergyShield project successfully started 12 Dec 2019  
Year Authors Title Venue Status
2019 Hacks, Hacks, Katsikeas, Klaer, Lagerström Creating MAL Instances Using ArchiMate on the Example of Attacks on Power Plants and Power Grids 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC) Published
2020 Bounas, Georgiadou, Kontoulis, Mouzakitis, Askounis Towards a cybersecurity culture tool through a holistic, multi-dimensional assessment framework IADIS Information Systems Conference Published
2020 Acarali, Rajarajan, Chema, Ginzburg Modelling DoS Attacks & Interoperability in the Smart Grid ICCCN 10th Internal Workshop on Security, Privacy, Trust, and Machine Learning for Internet of Things Published
2020 Acarali, Rajarajan, Chema, Ginzburg A Characterisation of Smart Grid DoS Attacks EAI International Conference on Security and Privacy in New Computing Environments Published
2020 Välja, Heiding, Lagerström, Franke Automating threat modeling using an ontology framework Cybersecurity, Springer Open, journal Published
2020 Ling, Lagerström, Ekstedt A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain 15th International Conference on Critical Information Infrastructures Security (CRITIS 2020) Published
2020 Georgiadou, Mouzakitis, Askounis Towards Assessing Critical Infrastructures’ Cyber-Security Culture during COVID-19 crisis: A Tailor-made Survey 4th International Conference on Networks and Security (NSEC2020) Published
2020 Georgiadou, Mouzakitis, Askounis, Bounas A Cyber-Security Culture Framework for Assessing the Organization Readiness Journal of Computer Information Systems Published
2020 Hacks, Katsikeas, Ling, Lagerström, Ekstedt

powerLang: a probabilistic attack simulation language for the power domain

Energy Informatics Published
2020 Katsikeas, Hacks, Johnson, Ekstedt, Lagerström, Jacobsson, Wällstedt, Eliasson

A probabilistic attack simulation language for the IT domain

Graphical Models for Security Published
2020 Zarpelão, et al.

How Machine Learning Can Support Cyberattack Detection in Smart Grids

Artificial Intelligence Techniques for a Scalable Energy Transition Published
2020 Dixit, Asif and Rajarajan

Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0

IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society Published
2021 Georgiadou, Mouzakitis, Askounis

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis

The International Journal of Network Security and Its Applications (IJNSA) Published
2021 Loxdal, Andersson, Hacks, Lagerström

Why Phishing Works on Smartphones: A Preliminary Study

54th Hawaii International Conference on System Sciences Published
2021 Georgiadou, Mouzakitis, Askounis

Working from home during COVID-19 crisis: a cyber security culture assessment survey

Security Journal Published
2021 Hacks, Katsikeas

Towards an Ecosystem of Domain Specific Languages for Threat Modeling

33rd International Conference on Advanced Information Systems Engineering Published
2021 Hersén, Hacks, Fögen

Towards Measuring Test Coverage of Attack Simulations

Enterprise, Business-Process and Information Systems Modeling Published
2021 Xiong, Hacks, Lagerström

A Method for Assigning Probability Distributions in Attack Simulation Languages

Complex Systems Informatics and Modeling Quarterly Published
2021 Georgiadou, Mouzakitis, Askounis

Detecting Insider Threat via a Cyber-Security Culture Framework

Journal of Computer Information Systems Published
2021 Georgiadou, Mouzakitis, Askounis

Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework

Sensors Published
2021 Hacks, Butun, Lagerström, Buhaiu, Georgiadou, Michalitsi – Psarrou

Integrating Security Behavior into Attack Simulations

International Conference on Availability, Reliability and Security (ARES 2021) Published
2021 Sklavidis, Angelidis, Babagiannou, Liapis

Enhancing SIEM technology for protecting electrical power and energy sector

 

IEEE CSR EPES-SPR Workshop Published
2021 Sari and Butun

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience

Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities; book by IGI Published
2021 Acarali et al.

Modelling Smart Grid IT-OT Dependencies for DDoS Impact Propagation

Elsevier’s Computers & Security journal Published
2021 Georgiadou et al.

Hospitals’ Cybersecurity Culture during the COVID-19 Crisis

MDPI Healthcare Published
2021 Dixit, Singh, Rahulamathavan and Rajarajan

FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain

IEEE Internet of Things Journal Published
2021 Touloumis et al.

Vulnerabilities Manager, a platform for linking vulnerability data sources

2021 IEEE International Conference on Big Data (Big Data) Published
2022 Georgiadou et al.

A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures

MDPI Healthcare Published
2022 Engström and Lagerström

Two Decades of Cyberattack Simulations: A Systematic Literature Review

Elsevier’s Computers & Security journal Published
2022 Urrea Cabus, Butun and Lagerström Zooming Innovation in Consumer Electronics International Conference 2022 (ZINC 2022) Published
2022

Qadir et al.

Zooming Innovation in Consumer Electronics International Conference 2022 (ZINC 2022) Published

Published whitepapers are enlisted here:

Year Author(s) Title of the Whitepaper  Company
2021  Joar Jacobsson Threat Modeling and Attack Simulations in the Energy Sector Analysis Process Foreseeti AB
2022 Anna Georgiadou Security Behaviour Analysis National Technical University of Athens
2022 Joar Jacobsson
Ismail Butun, Robert Lagerström, Jose Cabus
securiCAD Vulnerability Assessment Tool FORESEETI, KTH Royal Institute of Technology
2022 Anna Georgiadou Automated Forensic Tool National Technical University of Athens
2022 Aras Arasilango Homomorphic Encryption  Tech Inspire Ltd
2022 Gianluca Serale, Giuseppe Carnevale, Stefania Sella, Alessandro Armellin,
Emiliano Roggero
EnergyShield pilot at the electrical energy distribution grid of Turin IREN, IRETI, CSP
2022 Nikolay Palov,
Magda Zafeiropoulou,
Maria Atanasova
Implement the online field trials in Bulgaria Software Company Limited
2022 Christos Angelidis Security Information and Event Management tool Konnektable Technologies
2022 Yisrael Gross, Rajarajan Muttukrishnan Ammune DDoSM Tool for Anomaly Detection & DDoS Mitigation L7 Defense, City University of London
2022 Hagai Galili Anomaly Detection tool SIGA
2022 Iacob Crucianu,
Lavinia Dincă,
Ana-Maria Dumitrescu
EnergyShield toolkit SIMAVI