Blog

CONCORDIA Blog

March 8, 2021

Women in Science, ICT and Cybersecurity

In 2015, 17 goals were adopted by the United Nations (UN) member states as a part of the 2030 Agenda for Sustainable Development Goals (SDGs) to cover the 15-year plan. Achieving gender equality and empower all women and girls is goal number 5 in the beforementioned agenda.[1] Over the past...

Read More
February 26, 2021

Securing Eletric Mobility Charging Networks

H2020 Concordia work package 2 is composed by 4x Sector-Specific Pilots: Task T2.1: Telecom Sector Task T2.2: Finance Sector Task T2.3: Transport E-Mobility Sector Task T2.4: e-Heath Sector Related with T2.3 CRF and EFACEC are working together on a pilot project focused on the Security of the e-Charging Infrastructure. Nowadays...

Read More
February 18, 2021

CONCORDIA Start-up Community: Where do we find the greatest hits of EU cybersecurity new wave?

We are getting closer and closer to accomplish the objective of pooling Europe's Cybersecurity expertise and implementing European Cybersecurity Competence Centre and Network. The new structure described in the legislative proposal would support all types of cybersecurity stakeholders, but there should be a special attention for start-ups. Nature of cybersecurity...

Read More
February 3, 2021

Smart Home and remote health services

Health services in the European Economic Area (EEA) address many stakeholder, like round 1.8 million health professionals and 7.3 million nurses and midwives, working in thousands of hospitals and clinics in 27 Member States (MS). EEA counts 500+ million citizens and with this, potential patients. A huge IT-system is need...

Read More
January 27, 2021

A new method to detect exploitable smart-home devices connected behind a NAT

Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) researchers who participate in CONCORDIA have developed a new method that enables telecommunications and internet service providers to monitor these devices. According to their new study, the...

Read More
January 21, 2021

The impact of State–sponsored Trolls during the 2016 US Presidential Election Discourse

It is a widely accepted fact that state-sponsored Twitter accounts operated during the 2016 US presidential election, spreading millions of tweets with misinformation and inflammatory political content. Whether these social media campaigns of the so–called "troll" accounts were able to manipulate public opinion is still in question. In this post...

Read More
January 13, 2021

A novel Cybersecurity Maturity Assessment Framework (CMAF)

As organizations, and especially Critical National Infrastructures (CNI), are becoming more vulnerable to cyber-attacks, their protection becomes essential and a lifecycle model of prediction, protection, detection and reaction is considered necessary. Towards this target, assessments help identify the strengths and weaknesses of an organization’s processes and procedures and examine how...

Read More
January 6, 2021

An interview on our new research paper – A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicles

Dr. Leandros Maglaras was interviewed from Elsevier regarding a recently accepted article in Elsevier Array journal. In this paper, an Intrusion Detection System (IDS) based on supervised Machine Learning (ML) algorithms was developed to detect spoofing attackers and exclude them from the proposed system for Dynamic Wireless Charging of Electric...

Read More
November 26, 2020

CODE 2020: “European Digital Sovereignty – Road to Success?”

Under the German EU presidency, the Research Institute CODE at the Bundeswehr University Munich organised from 10th to 12th November 2020 its annual conference. Due to the pandemic situation, CODE 2020 was held as a digital conference, including high-level discussions, 7 workshops, an innovation conference as well as science track...

Read More
November 19, 2020

CONCORDIA OPENED THE DOOR IN CYBERSPACE

Cyberspace is an idea that resides in our minds but has a poorly concrete image. When I was a doctoral student in software reliability, I thought cyberspace was the data superhighway. My proudly written code could exchange data with other code incredibly fast, no matter where both were running. I...

Read More
1 6 7 8 9 10 14