Explore the words cloud of the NeCS project. It provides you a very rough idea of what is the project "NeCS" about.
The following table provides information about the project.
Coordinator |
CONSIGLIO NAZIONALE DELLE RICERCHE
Organization address contact info |
Coordinator Country | Italy [IT] |
Project website | http://www.necs-project.eu |
Total cost | 3˙882˙227 € |
EC max contribution | 3˙882˙227 € (100%) |
Programme |
1. H2020-EU.1.3.1. (Fostering new skills by means of excellent initial training of researchers) |
Code Call | H2020-MSCA-ITN-2015 |
Funding Scheme | MSCA-ITN-ETN |
Starting year | 2015 |
Duration (year-month-day) | from 2015-09-01 to 2019-08-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | CONSIGLIO NAZIONALE DELLE RICERCHE | IT (ROMA) | coordinator | 1˙032˙245.00 |
2 | BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY | UK (LONDON) | participant | 546˙575.00 |
3 | UNIVERSITY OF KENT | UK (CANTERBURY, KENT) | participant | 546˙575.00 |
4 | UNIVERSITA DEGLI STUDI DI TRENTO | IT (TRENTO) | participant | 516˙122.00 |
5 | ATOS IT SOLUTIONS AND SERVICES IBERIA SL | ES (TRES CANTOS MADRID) | participant | 495˙745.00 |
6 | UNIVERSIDAD DE MALAGA | ES (MALAGA) | participant | 495˙745.00 |
7 | TECHNISCHE UNIVERSITAT DARMSTADT | DE (DARMSTADT) | participant | 249˙216.00 |
8 | ATOS SPAIN SA | ES (MADRID) | participant | 0.00 |
9 | HEWLETT PACKARD ITALIANA SRL | IT (CERNUSCO SUL NAVIGLIO MI) | partner | 0.00 |
10 | INCIBE | ES (León) | partner | 0.00 |
11 | UNIPOL GRUPPO FINANZIARIO SPA | IT (Bologna) | partner | 0.00 |
12 | UNITED NATIONS INTERREGIONAL CRIME AND JUSTICE RESEARCH INSTITUTE | IT (TORINO) | partner | 0.00 |
The European Network for Cybersecurity (NECS) was formed in response to the increased need of highly qualified experts able to cope with all the aspects of the European cybersecurity strategy that is currently under implementation. There is indeed an evident need and opportunity to grow a new generation of young researchers able to answer this demand for expertize, trained to the changing nature of the challenges to be faced. These challenges include evolvable threats and new technological means to exploit network and information security vulnerabilities of cyber systems that have eventually consequences in the physical world. Starting from these considerations, the European Commission proposed the “DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information security across the Union” . This directive proposal, on the one hand, recognizes the relevance for the European economy of cybersecurity, on the other one, poses the regulatory basis for achieving a common level of cybersecurity preparedness among the main European public/private stakeholders.
This 4-year project for a cybersecurity research and training network aims at contributing to answer this increased demand of human expertise in the field. The project; by fosters ing a multi-sectorial/disciplinary approach that is clearly necessary for tackling all cybersecurity aspects - as also recognized by the European Network and Information Security (NIS) platform recently established by the EU to contribute to the strategy that is firmly based on a public/private cooperation.
Being cybersecurity inherently multi-sectorial, NECS has participants (beneficiaries and partners) both from the academic sector (7) and non-academic one (5).
In the NECS research and training network, multi-disciplinary expertise has been collected and interlinked in order to have as a centre of gravity the cybersecurity security area.
Final dissemination and exploitation report | Documents, reports | 2020-03-06 15:37:25 |
Final results of WP5 | Documents, reports | 2020-03-06 15:37:34 |
Final results of WP4 | Documents, reports | 2020-03-06 15:37:26 |
Final results of WP3 | Documents, reports | 2020-03-06 15:37:44 |
Final training activities report | Documents, reports | 2020-03-06 15:37:31 |
Draft periodic report | Documents, reports | 2019-08-06 18:45:43 |
Intermediate training activities report | Documents, reports | 2019-08-06 18:45:43 |
Supervisory Board of the network | Documents, reports | 2019-08-06 18:45:43 |
Intermediate results of WP4 | Documents, reports | 2019-08-06 18:45:43 |
Intermediate results of WP3 | Documents, reports | 2019-08-06 18:45:44 |
Ethics | Documents, reports | 2019-08-06 18:45:43 |
Intermediate results of WP5 | Documents, reports | 2019-08-06 18:45:43 |
Mid Term review meeting | Documents, reports | 2019-08-06 18:45:43 |
Intermediate dissemination and exploitation report | Documents, reports | 2019-08-06 18:45:43 |
Progress report | Documents, reports | 2019-08-06 18:45:42 |
Take a look to the deliverables list in detail: detailed list of NeCS deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2016 |
Enrico Carniani, Davide D’Arenzo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori Usage Control on Cloud systems published pages: 37-55, ISSN: 0167-739X, DOI: 10.1016/j.future.2016.04.010 |
Future Generation Computer Systems 63 | 2019-10-31 |
2017 |
Angelica Marotta, Fabio Martinelli, Stefano Nanni, Albina Orlando, Artsiom Yautsiukhin Cyber-insurance survey published pages: 35-61, ISSN: 1574-0137, DOI: 10.1016/j.cosrev.2017.01.001 |
Computer Science Review 24 | 2019-10-31 |
2017 |
Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino Stateful Data Usage Control for Android Mobile Devices published pages: 345-369, ISSN: 1615-5262, DOI: 10.1007/s10207-016-0336-y |
International Journal of Information Security 16/4 | 2019-10-31 |
2019 |
Sandeep Gupta, Attaullah Buriro, Bruno Crispo DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure published pages: 16-20, ISSN: 2405-9595, DOI: 10.1016/j.icte.2018.01.010 |
ICT Express 5/1 | 2019-10-28 |
2019 |
Sandeep Gupta, Attaullah Buriro, Bruno Crispo A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices published pages: , ISSN: , DOI: |
Proceedings of 2nd International Workshop on Emerging Technologies for Authorization and Authentication (Co-Located with ESORICS 2019) | 2019-10-28 |
2019 |
Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez An Analysis of Trust in Smart Home Devices published pages: , ISSN: , DOI: |
The 20th World Conference on Information Security Applications (WISA Workshop 2019) | 2019-10-28 |
2018 |
Chau D.M. Pham, Duc-Ly Vu, Fabio Massacci, Tran Khanh Dang, Sandro Etalle, Davide Fauri Towards Explainable Machine Learning in Intrusion Detection Systems published pages: , ISSN: , DOI: |
International Symposium on Engineering Secure Software and Systems, 2018 | 2019-10-28 |
2019 |
Tiago Andrade, Daniel Bastos Extended Reality in IoT scenarios - Concepts, Applications and Future Trends published pages: , ISSN: , DOI: |
Experiment@ International Conference 2019 (exp.at’19) | 2019-10-28 |
2019 |
Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques published pages: , ISSN: 2263-8733, DOI: 10.1007/s11416-019-00335-w |
Journal of Computer Virology and Hacking Techniques | 2019-10-28 |
2019 |
Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli Distributed UCON in CoAP and MQTT Protocols published pages: , ISSN: , DOI: |
5th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2019) | 2019-10-28 |
2018 |
Sandeep Gupta, Attaullah Buriro, Bruno Crispo Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access published pages: 1-16, ISSN: 1574-017X, DOI: 10.1155/2018/2649598 |
Mobile Information Systems 2018 | 2019-10-28 |
2019 |
Sandeep Gupta, Attaullah Buriro, Bruno Crispo DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms published pages: 122-139, ISSN: 0167-4048, DOI: 10.1016/j.cose.2019.01.007 |
Computers & Security 83 | 2019-10-28 |
2018 |
Daniel Bastos, Fabio Giubilo, Mark Shackleton, Fadi El-Moussa GDPR Privacy Implication for the Internet of Things published pages: , ISSN: , DOI: |
4th Annual IoT Security Foundation Conference | 2019-10-28 |
2019 |
Daniel Bastos Cloud for IoT - A Survey of Technologies and Security features of Public Cloud IoT solutions published pages: , ISSN: , DOI: |
Living in the Internet of Things 2019: A PETRAS, IoTUK & IET Conference, Forum & Exhibition (LIOT 2019) | 2019-10-28 |
2019 |
Sandeep Gupta, Bruno Crispo A perspective study towards biometric-based rider authentication schemes for driverless taxis published pages: , ISSN: , DOI: |
PRoceedings of the International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT, 2019) | 2019-10-28 |
2018 |
Ly Vu Duc, Trong-Kha Nguyen, Tam. V. Nguyen , Phung. H. Phu, Fabio Massacci Mal2Image- Hybrid Image Transformation for Malware Detection-paper published pages: , ISSN: , DOI: |
International Symposium on Engineering Secure Software and Systems, 2018 | 2019-10-28 |
2018 |
Francesco Buccafurri, Michela Fazzolari, Gianluca Lax, Marinella Petrocchi Contrasting Fake Reviews in TripAdvisor published pages: , ISSN: , DOI: |
SEBD 2018 | 2019-10-10 |
2018 |
Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino Phylogenetic Analysis for Ransomware Detection and Classification into Families published pages: , ISSN: , DOI: |
15th International Joint Conference on e-Business and Telecommunications (ICETE), SECRYPT 2018 | 2019-10-10 |
2018 |
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah, Aniello Cimitile Evaluating model checking for cyber threats code obfuscation identification published pages: 203-218, ISSN: 0743-7315, DOI: 10.1016/j.jpdc.2018.04.008 |
Journal of Parallel and Distributed Computing 119 | 2019-10-10 |
2018 |
Francesco Mercaldo, Andrea Di Sorbo, Corrado Aaron Visaggio, Aniello Cimitile, Fabio Martinelli An exploratory study on the evolution of Android malware quality published pages: e1978, ISSN: 2047-7473, DOI: 10.1002/smr.1978 |
Journal of Software: Evolution and Process 30/11 | 2019-10-10 |
2019 |
Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino Using IFTTT to Express and Enforce UCON Obligations published pages: , ISSN: , DOI: |
ISPEC 2019 : The 15th International Conference on Information Security Practice and Experience | 2019-10-10 |
2019 |
Oleksii Osliak, Andrea Saracino, Fabio Martinelli A scheme for the sticky policy representation supporting secure Cyber-Threat Intelligence analysis and sharing. published pages: , ISSN: 2056-4961, DOI: |
Information and Computer security | 2019-10-10 |
2017 |
Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini Model Checking for Mobile Android Malware Evolution published pages: , ISSN: , DOI: |
Formal Methods in Software Engineering, ICSE, International Conference on Software Engineering, 2017 | 2019-10-10 |
2018 |
Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo Driver and Path Detection through Time-Series Classification published pages: 1-20, ISSN: 0197-6729, DOI: 10.1155/2018/1758731 |
Journal of Advanced Transportation 2018 | 2019-10-10 |
2017 |
Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi A Study on Text-Score Disagreement in Online Reviews published pages: 689-701, ISSN: 1866-9956, DOI: 10.1007/s12559-017-9496-y |
Cognitive Computation 9/5 | 2019-10-10 |
2018 |
Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah Human behavior characterization for driving style recognition in vehicle system published pages: , ISSN: 0045-7906, DOI: 10.1016/j.compeleceng.2017.12.050 |
Computers & Electrical Engineering | 2019-10-10 |
2019 |
Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Fabio Martinelli, Francesco Mercaldo Dynamic malware detection and phylogeny analysis using process mining published pages: 257-284, ISSN: 1615-5262, DOI: 10.1007/s10207-018-0415-3 |
International Journal of Information Security 18/3 | 2019-10-10 |
2018 |
Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio Talos: no more ransomware victims with formal methods published pages: 719-738, ISSN: 1615-5262, DOI: 10.1007/s10207-017-0398-5 |
International Journal of Information Security 17/6 | 2019-10-10 |
2018 |
Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi Mining Implicit Data Association from Tripadvisor Hotel Reviews published pages: , ISSN: , DOI: |
2019-10-10 | |
2018 |
Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone, Gigliola Vaglini A “pay-how-you-drive†car insurance approach through cluster analysis published pages: 2863–2875, ISSN: 1432-7643, DOI: 10.1007/s00500-018-3274-y |
Soft Computing May 2019, Volume 23, Issue 9 | 2019-10-10 |
2018 |
Gerardo Canfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio LEILA: formaL tool for idEntifying mobIle maLicious behAviour published pages: 1-1, ISSN: 0098-5589, DOI: 10.1109/tse.2018.2834344 |
IEEE Transactions on Software Engineering | 2019-10-10 |
2019 |
Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Massacci and Fabio Martinelli Cyber Insurance and Time-to-Compromise: An Integrated Approach published pages: , ISSN: , DOI: |
2019 International Workshop on Cyber Insurance and Risk Controls (CIRC) | 2019-10-10 |
2019 |
Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto On the effectiveness of system API-related information for Android ransomware detection published pages: 168-182, ISSN: 0167-4048, DOI: 10.1016/j.cose.2019.06.004 |
Computers & Security 86 | 2019-10-10 |
2018 |
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling published pages: 1-1, ISSN: 1545-5971, DOI: 10.1109/tdsc.2017.2681672 |
IEEE Transactions on Dependable and Secure Computing | 2019-10-10 |
2019 |
Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi On the capability of evolved spambots to evade detection via genetic engineering published pages: 1-16, ISSN: 2468-6964, DOI: 10.1016/j.osnem.2018.10.005 |
Online Social Networks and Media 9 | 2019-10-10 |
2018 |
Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra Risk analysis of Android applications: A user-centric solution published pages: 505-518, ISSN: 0167-739X, DOI: 10.1016/j.future.2016.05.035 |
Future Generation Computer Systems 80 | 2019-10-10 |
2019 |
Tiziano Fagni, Leonardo Nizzoli, Marinella Petrocchi, Maurizio Tesconi Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them published pages: , ISSN: , DOI: |
2019-10-10 | |
2017 |
Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo Resilient interconnection in cyber-physical control systems published pages: 2-14, ISSN: 0167-4048, DOI: 10.1016/j.cose.2017.03.004 |
Computers & Security 71 | 2019-10-01 |
2018 |
Cristina Alcaraz, Javier Lopez A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability published pages: 3543-3554, ISSN: 1932-8184, DOI: 10.1109/jsyst.2017.2740719 |
IEEE Systems Journal 12/4 | 2019-10-01 |
2018 |
Ruben Rios, Carmen Fernandez-Gago, Javier Lopez Modelling privacy-aware trust negotiations published pages: 773-789, ISSN: 0167-4048, DOI: 10.1016/j.cose.2017.09.015 |
Computers & Security 77 | 2019-10-01 |
2017 |
Cristina Alcaraz Resilient industrial control systems based on multiple redundancy published pages: 278, ISSN: 1475-3219, DOI: 10.1504/ijcis.2017.10009287 |
International Journal of Critical Infrastructures 13/2/3 | 2019-10-01 |
2018 |
Rodrigo Roman, Javier Lopez, Masahiro Mambo Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges published pages: 680-698, ISSN: 0167-739X, DOI: 10.1016/j.future.2016.11.009 |
Future Generation Computer Systems 78 | 2019-10-01 |
2019 |
Martin Kolar, Carmen Fernandez-Gago, Javier Lopez A model specification for the design of trust negotiations published pages: 288-300, ISSN: 0167-4048, DOI: 10.1016/j.cose.2019.03.024 |
Computers & Security 84 | 2019-09-02 |
2019 |
Davide Ferraris, Carmen Fernandez-Gago TrUStAPIS: a trust requirements elicitation method for IoT published pages: , ISSN: 1615-5262, DOI: 10.1007/s10207-019-00438-x |
International Journal of Information Security | 2019-09-02 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "NECS" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "NECS" are provided by the European Opendata Portal: CORDIS opendata.