Blog

CONCORDIA Blog

May 18, 2022

Initial analysis on the Russo-Ukrainian War corpus on Twitter

Twitter consists one of the most popular social networks, attracting millions of users, including malicious entities. In this study, we delve into a recent dataset regarding the Russo-Ukrainian war in order to analyze malicious activity and suspension of users from Twitter. The scope of this work is to investigate online...

Read More
May 11, 2022

Preparing for a Quantum Era

A very common buzzword frequently being used throughout the tech industry is the inevitable rise of quantum computing. These novel computers, by taking advantage of properties derived from quantum physics, have the ability to surpass computing barriers imposed by the already established and traditional way today’s computers operate. Still, an...

Read More
May 5, 2022

Visualization helps clear the fog of Cyberwar

The phrase “fog of war” is often used to convey the uncertainty prevalent during military operations where unit commanders have to make decisions without having a clear picture of the battlefield, or the movements of bothfriendly and hostile forces. In cyber-defense the same uncertainty is complicating how to respond to...

Read More
April 28, 2022

Smart home and remote health service, use case in CONCORDIA

The developed demonstrator from Y1 and Y2 get progress in Y3 on the following aspects: A smart-card reader is added as a patient identification and authentication feature. This allows to register, identify and log in/out of patients in a real case scenario.User management is integrated for demonstration of concept for...

Read More
April 20, 2022

Countermeasures and Research Actions

COVID-19 has increased reliance on information technologies in all aspects of life, creating new gaps and exacerbating existing ones, making us more than ever vulnerable to new and already existing security threats. As a first thing, in https://www.concordia-h2020.eu/blog-post/threats-gaps-and-challenges-in-the-era-of-covid-19/ we identified the most relevant threats, gaps, and challenges, with particular reference...

Read More
April 14, 2022

On the Cybersecurity Planning and Investments: An Approach with Economic Bias

Many of the problems plaguing cybersecurity are technical in nature, but they may have an economic motivation (e.g., to obtain financial profits) and certainly, an economic impact. The primary motivation (besides espionage and destruction) behind cyberattacks is making financial profits. On one hand, there are known examples as ransomware attacks...

Read More
April 6, 2022

Anomaly Detection with Privacy-preserved Peer-to-peer Federated Learning

In the context of IoT, the augment of the computational power and capacity of edge devices enables the use of distributed ML approaches, pushing the computation of the models to these edge devices. Federated Learning (FL) has emerged as a very promising paradigm for training distributed ML models. FL allows...

Read More
Education
March 22, 2022

Would you like to be certified as a cybersecurity consultant?

The C3 by CONCORDIA Certification and the preparatory Course are back in 2022! What do we have for you? This year we will open again the C3 by CONCORDIA Certification exams and run the preparatory course. And we will, again, offer this for free! But we have a limited number...

Read More
March 17, 2022

5G Cybersecurity: How EU Policy framework ensures Cybersecurity and National Security of Member States?

The impact of 5G 5G, the fifth generation of mobile networks, is now a commercial reality and it is considered a key technology for society in terms of economic and social prosperity and new business procedures. Besides the obvious benefits and merits of 5G, cybersecurity related concerns are emerging as...

Read More
March 10, 2022

Blockchain-based Privacy Enforcement in the IoT domain

In 2021 there are 13.8 billion interconnected IoT devices, with an upward trend. IoT devices collect data on the surrounding environment, including sensitive and private information (e.g., wearable IoT devices). As a result, users are experiencing a loss of control over how their data is distributed and processed. Even worse,...

Read More