Loading...
/PUBLICATIONS & DELIVERABLES
PUBLICATIONS & DELIVERABLES 2018-11-20T10:48:21+00:00

PUBLICATIONS & DELIVERABLES

Below you can find DiSIEM-related documents produced by the members of the DiSIEM consortium.

PUBLICATIONS

DELIVERABLES

DiSIEM project leaflet

DOWNLOAD

 
The DiSIEM Consortium. DiSIEM Project Overview. September 2016.

DOWNLOAD

 
Phong H. Nguyen, Cagatay Turkay, Gennady Andrienko, Natalia Andrienko and Olivier Thonnard, A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis, EuroVA 2017, June 12-13, 2017, Barcelona, Spain.

DOWNLOAD

 
João Alves, Ana Respício, Ivo Rosa, Pedro Rodrigues, Threat Intelligence – Improving SIEM cybercriminality awareness using information from IP blacklists, eCrime2017.EU – APWG.EU Symposium on Electronic Crime Research, October 24-26, 2017, Porto, Portugal.

DOWNLOAD

 
Eduardo Viegas, Altair Santin, Nuno Neves, Alysson Bessani, Vilmar Abreu. A Resilient Stream Learning Intrusion Detection Mechanism for Real-time Analysis of Network Traffic. Proc. of the IEEE Global Communications Conference – Globecom 2017. Singapore, December 2017.

DOWNLOAD

 
Phong H. Nguyen, Cagatay Turkay, Gennady Andrienko, Natalia Andrienko, Olivier Thonnard, Jihane Zouaoui. Understanding User Behaviour through Action Sequences: from the Usual to the Unusual. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. July 2018. (doi: 10.1109/TVCG.2018.2859969)

DOWNLOAD

 
Henrique Mendes, Ibéria Medeiros, Nuno Neves. Validating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework. Proc of the 3rd Workshop on Security and Dependability of Critical Embedded Real-Time Systems – CERTS’18 (together with IEEE/IFIP DSN’18). Luxembourg. July 2018.

DOWNLOAD

 
P. Marques, Z. Dabbabi, M-M Mironescu, O. Thonnard, A. Bessani, F. Buontempo, I. Gashi. Using Diverse Detectors for Detecting Malicious Web Scraping Activity. Fast Abstract at the IEEE/IFIP International Conference on Dependable Systems and Networks – DSN’18. Luxembourg. July 2018.

LINK

 
Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Mario Faiella. Towards an Enhanced Security Data Analytic Platform. Proc. of the 15th International Conference on Security and Cryptography – SECRYPT’18. Porto, Portugal. July 2018.

DOWNLOAD

 
Luis Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows. Proc. of the 17th IEEE International Conference On Trust, Security, and Privacy In Computing And Communications – TrustCom’18. New York, USA. July 2018.

DOWNLOAD

 
Y. Movahedi, M. Cukier, A. Andongabo, I. Gashi. Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing. September 2018 (doi: 10.1007/s00607-018-0663-0)

LINK

 
I. Gashi, H. Asad. Diversity in Open Source Intrusion Detection Systems. Proc. of the 37th International Conference on Computer Safety, Reliability,  and Security – SAFECOMP 2018. Västerås, Sweden. September 2018.

LINK

 
Ivo Vacas, Ibéria Medeiros, Nuno Neves. Detecting Network Threats using OSINT Knowledge-based IDS. Proc. of the 14th European Dependable Computing Conference – EDCC’18. Iasi, Romania. September 2018.

DOWNLOAD

 
Rui Azevedo, Iberia Medeiros, Alysson Bessani. Automated Solution for Enrichment and Quality IoC Creation from OSINT. Inforum 2018. Coimbra, Portugal. September 2018.

DOWNLOAD

 
Eduardo Viegas, Altair Santin, Alysson Bessani, Nuno Neves. BigFlow: Real-time and Reliable Anomaly-based Intrusion Detection for High-Speed Networks. Future Generation Computer Systems. Accepted for publication. September 2018.

DOWNLOAD

 

Siming Chen, Shuai Chen, Natalia Andrienko, Gennady Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan. User Behavior Map: Visual Exploration for Cyber Security Session Data. Proceedings of 2018 IEEE Symposium on Visualization for Cyber Security – VizSec’18, Berlin, Germany, October 2018.

DOWNLOAD

 
Phong H. Nguyen, Siming Chen, Natalia Andrienko, Michael Kamp, Linara Adilova, Gennady Andrienko, Olivier Thonnard, Alysson Bessani, Cagatay Turkay. Designing Visualisation Enhancements for SIEM Systems. Poster paper at 15th IEEE Symposium on Visualization for Cyber Security – VizSec 2018. Berlin, Germany. October 2018.

DOWNLOAD

 
Phong H. Nguyen, Siming Chen, Natalia Andrienko, Gennady Andrienko, Olivier Thonnard, Cagatay Turkay. Doing User Behaviour Analytics through Interactive Visual User Profiles. Poster paper at 15th IEEE Symposium on Visualization for Cyber Security – VizSec 2018. Berlin, Germany. October 2018.

DOWNLOAD

 
Olivier Thonnard, Zayani Dabbabi, Miruna Mironescu, Damien Fontanes. SKEPTIC: Reinforcing Application Security through User Behavioural Analysis. CESAR 2018. November 2018.

DOWNLOAD

 
P. Marques, Z. Dabbabi, M-M Mironescu, O. Thonnard, A. Bessani, F. Buontempo, I. Gashi. Detecting Malicious Web Scraping Activity: a Study with Diverse Detectors. Proc. of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing – PRDC’18. Taipei, Taiwan. December 2018.

LINK

D2.1 – In-depth analysis of SIEMs extensibility

DOWNLOAD

 
D2.2 – Reference Architecture and Integration Plan

DOWNLOAD

 
D3.1 – Security Metrics and Measurements

DOWNLOAD

 
D3.2 – Probabilistic Modelling of Diversity for Security and Security Trends

DOWNLOAD

 
D4.1 – Techniques and tools for OSINT-based threat analysis

DOWNLOAD

 
D4.2 – OSINT data fusion and analysis architecture

DOWNLOAD

 
D4.3 – OSINT threat preditors prototype

CONFIDENTIAL

 
D5.1 – Visualization System Infrastructure and Requirement Analysis

DOWNLOAD

 
D5.2 – Early-stage prototypes

DOWNLOAD

 
D6.1 – Preliminary Architecture and Service Model of Infrastructure Enhancements

DOWNLOAD

 
D6.2 – Early stage of the prototype of the components

CONFIDENTIAL

 
D7.1 – Validation plan

DOWNLOAD

 
D8.1 – Internal and External IT Communication Infrastructure

DOWNLOAD

 
D8.2 – Data Management Plan

DOWNLOAD

 
D8.3 – Intermediate business plan and exploitation report

CONFIDENTIAL


D9.1 – Project Quality Plan

DOWNLOAD


D9.2 – Risk Assessment Plan

DOWNLOAD