CONCORDIA Blog
Initial analysis on the Russo-Ukrainian War corpus on Twitter
Twitter consists one of the most popular social networks, attracting millions of users, including malicious entities. In this study, we delve into a recent dataset regarding the Russo-Ukrainian war in order to analyze malicious activity and suspension of users from Twitter. The scope of this work is to investigate online...
Read MorePreparing for a Quantum Era
A very common buzzword frequently being used throughout the tech industry is the inevitable rise of quantum computing. These novel computers, by taking advantage of properties derived from quantum physics, have the ability to surpass computing barriers imposed by the already established and traditional way today’s computers operate. Still, an...
Read MoreVisualization helps clear the fog of Cyberwar
The phrase “fog of war” is often used to convey the uncertainty prevalent during military operations where unit commanders have to make decisions without having a clear picture of the battlefield, or the movements of bothfriendly and hostile forces. In cyber-defense the same uncertainty is complicating how to respond to...
Read MoreSmart home and remote health service, use case in CONCORDIA
The developed demonstrator from Y1 and Y2 get progress in Y3 on the following aspects: A smart-card reader is added as a patient identification and authentication feature. This allows to register, identify and log in/out of patients in a real case scenario.User management is integrated for demonstration of concept for...
Read MoreCountermeasures and Research Actions
COVID-19 has increased reliance on information technologies in all aspects of life, creating new gaps and exacerbating existing ones, making us more than ever vulnerable to new and already existing security threats. As a first thing, in https://www.concordia-h2020.eu/blog-post/threats-gaps-and-challenges-in-the-era-of-covid-19/ we identified the most relevant threats, gaps, and challenges, with particular reference...
Read MoreOn the Cybersecurity Planning and Investments: An Approach with Economic Bias
Many of the problems plaguing cybersecurity are technical in nature, but they may have an economic motivation (e.g., to obtain financial profits) and certainly, an economic impact. The primary motivation (besides espionage and destruction) behind cyberattacks is making financial profits. On one hand, there are known examples as ransomware attacks...
Read MoreAnomaly Detection with Privacy-preserved Peer-to-peer Federated Learning
In the context of IoT, the augment of the computational power and capacity of edge devices enables the use of distributed ML approaches, pushing the computation of the models to these edge devices. Federated Learning (FL) has emerged as a very promising paradigm for training distributed ML models. FL allows...
Read MoreWould you like to be certified as a cybersecurity consultant?
The C3 by CONCORDIA Certification and the preparatory Course are back in 2022! What do we have for you? This year we will open again the C3 by CONCORDIA Certification exams and run the preparatory course. And we will, again, offer this for free! But we have a limited number...
Read More5G Cybersecurity: How EU Policy framework ensures Cybersecurity and National Security of Member States?
The impact of 5G 5G, the fifth generation of mobile networks, is now a commercial reality and it is considered a key technology for society in terms of economic and social prosperity and new business procedures. Besides the obvious benefits and merits of 5G, cybersecurity related concerns are emerging as...
Read MoreBlockchain-based Privacy Enforcement in the IoT domain
In 2021 there are 13.8 billion interconnected IoT devices, with an upward trend. IoT devices collect data on the surrounding environment, including sensitive and private information (e.g., wearable IoT devices). As a result, users are experiencing a loss of control over how their data is distributed and processed. Even worse,...
Read More