Resources
Deliverables
- D1.1: Collaborative Working Environment and it’s Maintenance (M02)
- D2.1: Requirements Analysis (M06)
- D2.2: Technical specifications (M12)
- D2.3: CyberKit4SME Handbook (M42)
- D5.1: Initial Services for Data Protection (M16)
- D5.2: Final Services for Data Protection (M40)
- D6.1: Marketing Material, Website, D&C Plan (M03)
- D6.3: 1st Report on Dissemination Actions and Preliminary Results (M18)
- D6.5: Cyber Range Training Course Content (M24)
- D6.6: 2nd Report On Dissemination Actions and Final Results (M42)
*Some Deliverables have been omitted due to the sensitivity of the Deliverable
White Paper
- Finance Sector: Awareness, Assessment and Mitigation in Cybersecurity: JRC(2021)
- Cost-Effective and Accessible Cybersecurity for Digital Finance SMEs: JRC(2022)
- Cybersecurity Blueprint for Finance SMEs: JRC(2023)
- Importance of Cybersecurity in the Automotive Industry: A Comprehensive Evaluation of the CyberKit4SME Toolkit by Elektrobit and 3Soft: Elektrobit and 3Soft(2023)
Publications
- [1] “Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles”, Sorin Grigorescu (EB), Tiberiu Cocias (EB), Bogdan Trasnea (EB), Andrea Margheri (UoS), Federico Lombardi (UoS), Leonardo Aniello (UoS). In Journal of Sensors, special issue on Communication, Positioning, and Sensing Solutions for Autonomous Vehicles. MDPI, Gold OA, https://doi.org/10.3390/s20195450 Published 23/09/2020
- [2] “Cybersecurity for SMEs: Introducing the Human Element into Socio-Technical Cybersecurity Risk Assessment”, Konstantin Boletsis (SintefSINTEF), Ragnhild Halvorsrud (SintefSINTEF), J. Brian Pickering (UoS), Stephen Phillips (UoS) and Mike Surridge (UoS). Proceedings of the “16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications}, (VISIGRAPP 2021), Volume 3: IVAPP, Online Streaming, 8-10 February 2021. Gold OA. https://www.scitepress.org/Papers/2021/103329/103329.pdf https://doi.org/10.5220/0010332902660274
- [3] “Embedded Vision for Self-Driving on Forest Roads” Sorin Grigorescu, Mihai Zaha, Bogdan Trasnea and Cosmin Ginerica (EB). In the “17th Embedded Vision Workshop” (EVW2021) in conjunction with CVPR, Online, 25 June 2021. Green OA. https://arxiv.org/abs/2105.13754
- [4] “It’s Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness”, J. Brian Pickering (UoS), Konstantin Boletsis (SintefSINTEF), Ragnhild Halvorsrud (SintefSINTEF), Stephen Phillips (UoS) and Mike Surridge (UoS). In: Moallem A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science, vol 12788. Springer, Cham. Gold OA. https://doi.org/10.1007/978-3-030-77392-2_22 Published 03/07/2021.https://doi.org/10.1007/978-3-030-77392-2_22 Published 03/07/2021
- [5] “Private Data Harvesting on Alexa using Third-Party Skills”, Jack Corbett, Erisa Karafili (UoS). In Proceedings of the “4th International Workshop on Emerging Technologies for Authorization and Authentication” ETAA 2021, in Conjunction with ESORICS 2021, 8 October 2021, Online. Proceedings to be available soon. Green OA.
- [6] Abigail Goldsteen, Shlomit Shachor, and Natalia Raznikov. 2022. An end-to-end framework for privacy risk assessment of AI models. In Proceedings of the 15th ACM International Conference on Systems and Storage (SYSTOR ’22). Association for Computing Machinery, New York, NY, USA, 142. https://doi.org/10.1145/3534056.3534998
- [7] "Forensic analysis of Tor in Windows environment: A case study", Angeli, V.-M., Atamli, A. & Karafili, E., ARES 2022: The 17th International Conference on Availability, Reliability and Security, Volume 156, pp. 1-10
- [8] "The HORM Diagramming Tool: A Domain-Specific Modelling Tool for SME Cybersecurity Awareness", Boletsis, C., Orni, S. N. & Halvorsrud, R., "18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), Volume 3, pp. 203-",2023
- [9] "Cybersecurity Awareness and Capacities of SMEs",Erdogan, G. et al., "Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP), pp. 296-304", 2023.
- [10] "Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs",Erdogan, G. et al., "Software Technologies - 17th International Conference, ICSOFT 2022, Volume 1859, pp. 98-121",2022.
- [11] "Information Security and Risk Management: Trustworthiness and Human Interaction",Erdogan, G., Tverdal, S., Phillips, S. & Fair, N., " Tutorial on International Conference on Research Challenges in Information Science (RCIS)", Published 2022
- [12] "Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)"
- [13] "I Just Want to Help: SMEs Engaging with Cybersecurity Technology"
- [14] "Tell Me What that Means to You: Small-Story Narratives in Technology Adoption"
- [15] "A Need for Privacy Assistive Technology in Notice and Consent Paradigm"
- [16] "Privacy-Aware IoT: State-of-the-Art and Challenges"
- [17] "A Hybrid Threat Model for Smart Systems"
- [18] "Protecting Sensitive Tabular Data in Hybrid Clouds",2023
Trainings
Leaflet
Download Brochure: 82153 DL6pp brochure CyberKit4SME v2 proof[430]