Opendata, web and dolomites

NeCS SIGNED

European Network for Cyber-security

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "NeCS" data sheet

The following table provides information about the project.

Coordinator
CONSIGLIO NAZIONALE DELLE RICERCHE 

Organization address
address: PIAZZALE ALDO MORO 7
city: ROMA
postcode: 185
website: www.cnr.it

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Italy [IT]
 Project website http://www.necs-project.eu
 Total cost 3˙882˙227 €
 EC max contribution 3˙882˙227 € (100%)
 Programme 1. H2020-EU.1.3.1. (Fostering new skills by means of excellent initial training of researchers)
 Code Call H2020-MSCA-ITN-2015
 Funding Scheme MSCA-ITN-ETN
 Starting year 2015
 Duration (year-month-day) from 2015-09-01   to  2019-08-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    CONSIGLIO NAZIONALE DELLE RICERCHE IT (ROMA) coordinator 1˙032˙245.00
2    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY UK (LONDON) participant 546˙575.00
3    UNIVERSITY OF KENT UK (CANTERBURY, KENT) participant 546˙575.00
4    UNIVERSITA DEGLI STUDI DI TRENTO IT (TRENTO) participant 516˙122.00
5    ATOS IT SOLUTIONS AND SERVICES IBERIA SL ES (TRES CANTOS MADRID) participant 495˙745.00
6    UNIVERSIDAD DE MALAGA ES (MALAGA) participant 495˙745.00
7    TECHNISCHE UNIVERSITAT DARMSTADT DE (DARMSTADT) participant 249˙216.00
8    ATOS SPAIN SA ES (MADRID) participant 0.00
9    HEWLETT PACKARD ITALIANA SRL IT (CERNUSCO SUL NAVIGLIO MI) partner 0.00
10    INCIBE ES (León) partner 0.00
11    UNIPOL GRUPPO FINANZIARIO SPA IT (Bologna) partner 0.00
12    UNITED NATIONS INTERREGIONAL CRIME AND JUSTICE RESEARCH INSTITUTE IT (TORINO) partner 0.00

Map

 Project objective

The European Network for Cybersecurity (NECS) was formed in response to the increased need of highly qualified experts able to cope with all the aspects of the European cybersecurity strategy that is currently under implementation. There is indeed an evident need and opportunity to grow a new generation of young researchers able to answer this demand for expertize, trained to the changing nature of the challenges to be faced. These challenges include evolvable threats and new technological means to exploit network and information security vulnerabilities of cyber systems that have eventually consequences in the physical world. Starting from these considerations, the European Commission proposed the “DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information security across the Union” . This directive proposal, on the one hand, recognizes the relevance for the European economy of cybersecurity, on the other one, poses the regulatory basis for achieving a common level of cybersecurity preparedness among the main European public/private stakeholders.

This 4-year project for a cybersecurity research and training network aims at contributing to answer this increased demand of human expertise in the field. The project; by fosters ing a multi-sectorial/disciplinary approach that is clearly necessary for tackling all cybersecurity aspects - as also recognized by the European Network and Information Security (NIS) platform recently established by the EU to contribute to the strategy that is firmly based on a public/private cooperation.

Being cybersecurity inherently multi-sectorial, NECS has participants (beneficiaries and partners) both from the academic sector (7) and non-academic one (5).

In the NECS research and training network, multi-disciplinary expertise has been collected and interlinked in order to have as a centre of gravity the cybersecurity security area.

 Deliverables

List of deliverables.
Final dissemination and exploitation report Documents, reports 2020-03-06 15:37:25
Final results of WP5 Documents, reports 2020-03-06 15:37:34
Final results of WP4 Documents, reports 2020-03-06 15:37:26
Final results of WP3 Documents, reports 2020-03-06 15:37:44
Final training activities report Documents, reports 2020-03-06 15:37:31
Draft periodic report Documents, reports 2019-08-06 18:45:43
Intermediate training activities report Documents, reports 2019-08-06 18:45:43
Supervisory Board of the network Documents, reports 2019-08-06 18:45:43
Intermediate results of WP4 Documents, reports 2019-08-06 18:45:43
Intermediate results of WP3 Documents, reports 2019-08-06 18:45:44
Ethics Documents, reports 2019-08-06 18:45:43
Intermediate results of WP5 Documents, reports 2019-08-06 18:45:43
Mid Term review meeting Documents, reports 2019-08-06 18:45:43
Intermediate dissemination and exploitation report Documents, reports 2019-08-06 18:45:43
Progress report Documents, reports 2019-08-06 18:45:42

Take a look to the deliverables list in detail:  detailed list of NeCS deliverables.

 Publications

year authors and title journal last update
List of publications.
2016 Enrico Carniani, Davide D’Arenzo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
Usage Control on Cloud systems
published pages: 37-55, ISSN: 0167-739X, DOI: 10.1016/j.future.2016.04.010
Future Generation Computer Systems 63 2019-10-31
2017 Angelica Marotta, Fabio Martinelli, Stefano Nanni, Albina Orlando, Artsiom Yautsiukhin
Cyber-insurance survey
published pages: 35-61, ISSN: 1574-0137, DOI: 10.1016/j.cosrev.2017.01.001
Computer Science Review 24 2019-10-31
2017 Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino
Stateful Data Usage Control for Android Mobile Devices
published pages: 345-369, ISSN: 1615-5262, DOI: 10.1007/s10207-016-0336-y
International Journal of Information Security 16/4 2019-10-31
2019 Sandeep Gupta, Attaullah Buriro, Bruno Crispo
DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure
published pages: 16-20, ISSN: 2405-9595, DOI: 10.1016/j.icte.2018.01.010
ICT Express 5/1 2019-10-28
2019 Sandeep Gupta, Attaullah Buriro, Bruno Crispo
A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices
published pages: , ISSN: , DOI:
Proceedings of 2nd International Workshop on Emerging Technologies for Authorization and Authentication (Co-Located with ESORICS 2019) 2019-10-28
2019 Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez
An Analysis of Trust in Smart Home Devices
published pages: , ISSN: , DOI:
The 20th World Conference on Information Security Applications (WISA Workshop 2019) 2019-10-28
2018 Chau D.M. Pham, Duc-Ly Vu, Fabio Massacci, Tran Khanh Dang, Sandro Etalle, Davide Fauri
Towards Explainable Machine Learning in Intrusion Detection Systems
published pages: , ISSN: , DOI:
International Symposium on Engineering Secure Software and Systems, 2018 2019-10-28
2019 Tiago Andrade, Daniel Bastos
Extended Reality in IoT scenarios - Concepts, Applications and Future Trends
published pages: , ISSN: , DOI:
Experiment@ International Conference 2019 (exp.at’19) 2019-10-28
2019 Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques
published pages: , ISSN: 2263-8733, DOI: 10.1007/s11416-019-00335-w
Journal of Computer Virology and Hacking Techniques 2019-10-28
2019 Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli
Distributed UCON in CoAP and MQTT Protocols
published pages: , ISSN: , DOI:
5th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2019) 2019-10-28
2018 Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
published pages: 1-16, ISSN: 1574-017X, DOI: 10.1155/2018/2649598
Mobile Information Systems 2018 2019-10-28
2019 Sandeep Gupta, Attaullah Buriro, Bruno Crispo
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms
published pages: 122-139, ISSN: 0167-4048, DOI: 10.1016/j.cose.2019.01.007
Computers & Security 83 2019-10-28
2018 Daniel Bastos, Fabio Giubilo, Mark Shackleton, Fadi El-Moussa
GDPR Privacy Implication for the Internet of Things
published pages: , ISSN: , DOI:
4th Annual IoT Security Foundation Conference 2019-10-28
2019 Daniel Bastos
Cloud for IoT - A Survey of Technologies and Security features of Public Cloud IoT solutions
published pages: , ISSN: , DOI:
Living in the Internet of Things 2019: A PETRAS, IoTUK & IET Conference, Forum & Exhibition (LIOT 2019) 2019-10-28
2019 Sandeep Gupta, Bruno Crispo
A perspective study towards biometric-based rider authentication schemes for driverless taxis
published pages: , ISSN: , DOI:
PRoceedings of the International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT, 2019) 2019-10-28
2018 Ly Vu Duc, Trong-Kha Nguyen, Tam. V. Nguyen , Phung. H. Phu, Fabio Massacci
Mal2Image- Hybrid Image Transformation for Malware Detection-paper
published pages: , ISSN: , DOI:
International Symposium on Engineering Secure Software and Systems, 2018 2019-10-28
2018 Francesco Buccafurri, Michela Fazzolari, Gianluca Lax, Marinella Petrocchi
Contrasting Fake Reviews in TripAdvisor
published pages: , ISSN: , DOI:
SEBD 2018 2019-10-10
2018 Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino
Phylogenetic Analysis for Ransomware Detection and Classification into Families
published pages: , ISSN: , DOI:
15th International Joint Conference on e-Business and Telecommunications (ICETE), SECRYPT 2018 2019-10-10
2018 Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah, Aniello Cimitile
Evaluating model checking for cyber threats code obfuscation identification
published pages: 203-218, ISSN: 0743-7315, DOI: 10.1016/j.jpdc.2018.04.008
Journal of Parallel and Distributed Computing 119 2019-10-10
2018 Francesco Mercaldo, Andrea Di Sorbo, Corrado Aaron Visaggio, Aniello Cimitile, Fabio Martinelli
An exploratory study on the evolution of Android malware quality
published pages: e1978, ISSN: 2047-7473, DOI: 10.1002/smr.1978
Journal of Software: Evolution and Process 30/11 2019-10-10
2019 Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Using IFTTT to Express and Enforce UCON Obligations
published pages: , ISSN: , DOI:
ISPEC 2019 : The 15th International Conference on Information Security Practice and Experience 2019-10-10
2019 Oleksii Osliak, Andrea Saracino, Fabio Martinelli
A scheme for the sticky policy representation supporting secure Cyber-Threat Intelligence analysis and sharing.
published pages: , ISSN: 2056-4961, DOI:
Information and Computer security 2019-10-10
2017 Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Model Checking for Mobile Android Malware Evolution
published pages: , ISSN: , DOI:
Formal Methods in Software Engineering, ICSE, International Conference on Software Engineering, 2017 2019-10-10
2018 Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Driver and Path Detection through Time-Series Classification
published pages: 1-20, ISSN: 0197-6729, DOI: 10.1155/2018/1758731
Journal of Advanced Transportation 2018 2019-10-10
2017 Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
A Study on Text-Score Disagreement in Online Reviews
published pages: 689-701, ISSN: 1866-9956, DOI: 10.1007/s12559-017-9496-y
Cognitive Computation 9/5 2019-10-10
2018 Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah
Human behavior characterization for driving style recognition in vehicle system
published pages: , ISSN: 0045-7906, DOI: 10.1016/j.compeleceng.2017.12.050
Computers & Electrical Engineering 2019-10-10
2019 Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Fabio Martinelli, Francesco Mercaldo
Dynamic malware detection and phylogeny analysis using process mining
published pages: 257-284, ISSN: 1615-5262, DOI: 10.1007/s10207-018-0415-3
International Journal of Information Security 18/3 2019-10-10
2018 Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Talos: no more ransomware victims with formal methods
published pages: 719-738, ISSN: 1615-5262, DOI: 10.1007/s10207-017-0398-5
International Journal of Information Security 17/6 2019-10-10
2018 Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Mining Implicit Data Association from Tripadvisor Hotel Reviews
published pages: , ISSN: , DOI:
2019-10-10
2018 Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone, Gigliola Vaglini
A “pay-how-you-drive” car insurance approach through cluster analysis
published pages: 2863–2875, ISSN: 1432-7643, DOI: 10.1007/s00500-018-3274-y
Soft Computing May 2019, Volume 23, Issue 9 2019-10-10
2018 Gerardo Canfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
LEILA: formaL tool for idEntifying mobIle maLicious behAviour
published pages: 1-1, ISSN: 0098-5589, DOI: 10.1109/tse.2018.2834344
IEEE Transactions on Software Engineering 2019-10-10
2019 Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Massacci and Fabio Martinelli
Cyber Insurance and Time-to-Compromise: An Integrated Approach
published pages: , ISSN: , DOI:
2019 International Workshop on Cyber Insurance and Risk Controls (CIRC) 2019-10-10
2019 Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto
On the effectiveness of system API-related information for Android ransomware detection
published pages: 168-182, ISSN: 0167-4048, DOI: 10.1016/j.cose.2019.06.004
Computers & Security 86 2019-10-10
2018 Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling
published pages: 1-1, ISSN: 1545-5971, DOI: 10.1109/tdsc.2017.2681672
IEEE Transactions on Dependable and Secure Computing 2019-10-10
2019 Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
On the capability of evolved spambots to evade detection via genetic engineering
published pages: 1-16, ISSN: 2468-6964, DOI: 10.1016/j.osnem.2018.10.005
Online Social Networks and Media 9 2019-10-10
2018 Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
Risk analysis of Android applications: A user-centric solution
published pages: 505-518, ISSN: 0167-739X, DOI: 10.1016/j.future.2016.05.035
Future Generation Computer Systems 80 2019-10-10
2019 Tiziano Fagni, Leonardo Nizzoli, Marinella Petrocchi, Maurizio Tesconi
Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them
published pages: , ISSN: , DOI:
2019-10-10
2017 Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo
Resilient interconnection in cyber-physical control systems
published pages: 2-14, ISSN: 0167-4048, DOI: 10.1016/j.cose.2017.03.004
Computers & Security 71 2019-10-01
2018 Cristina Alcaraz, Javier Lopez
A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability
published pages: 3543-3554, ISSN: 1932-8184, DOI: 10.1109/jsyst.2017.2740719
IEEE Systems Journal 12/4 2019-10-01
2018 Ruben Rios, Carmen Fernandez-Gago, Javier Lopez
Modelling privacy-aware trust negotiations
published pages: 773-789, ISSN: 0167-4048, DOI: 10.1016/j.cose.2017.09.015
Computers & Security 77 2019-10-01
2017 Cristina Alcaraz
Resilient industrial control systems based on multiple redundancy
published pages: 278, ISSN: 1475-3219, DOI: 10.1504/ijcis.2017.10009287
International Journal of Critical Infrastructures 13/2/3 2019-10-01
2018 Rodrigo Roman, Javier Lopez, Masahiro Mambo
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
published pages: 680-698, ISSN: 0167-739X, DOI: 10.1016/j.future.2016.11.009
Future Generation Computer Systems 78 2019-10-01
2019 Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
A model specification for the design of trust negotiations
published pages: 288-300, ISSN: 0167-4048, DOI: 10.1016/j.cose.2019.03.024
Computers & Security 84 2019-09-02
2019 Davide Ferraris, Carmen Fernandez-Gago
TrUStAPIS: a trust requirements elicitation method for IoT
published pages: , ISSN: 1615-5262, DOI: 10.1007/s10207-019-00438-x
International Journal of Information Security 2019-09-02

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "NECS" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "NECS" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.3.1.)

i-CONN (2019)

Interdisciplinary connectivity: Understanding and managing complex systems using connectivity science

Read More  

BIGMATH (2018)

Big Data Challenges for Mathematics

Read More  

FEINART (2020)

The Future of European Independent Art Spaces in a Period of Socially Engaged Art

Read More