CIPSEC Glossary, third release
This glossary gathers all acronyms and keywords formal definition for all the deliverables submitted along the project timeline
This glossary gathers all acronyms and keywords formal definition for all the deliverables submitted along the project timeline
The CIPSEC Project has contributed with a chapter to the book entitled "Challenges in Cybersecurity and Privacy - The European Research Landscape". This book has been coordinated by Antonio Skarmeta and Jorge Bernal, from the University of Murcia, and the chapter about CIPSEC has counted on the contributions of up to 17 people in the Consortium.
Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling strategic data, are involved.
International Journal of Critical Infrastructure Protection, 2019
Abstract
We are glad to announce the publication of the postconference book proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.
This glossary gathers all the acronyms in the submitted deliverables until M27:
IEEE International Symposyum on Hardware Oriented Security and Trust 2018
Leakage Assessment and Side Channel Attacks (SCA) leakage trace acquisition tools and platforms require a considerable amount of time to collect millions of traces and rely on custom, hard to change or handle acquisition control mechanisms
International Conference on Automation, Quality and Testing
ARES International Conference on Availability, Reliability and Security (accepted for publication).
Abstract