CONCORDIA Blog
Women in Science, ICT and Cybersecurity
In 2015, 17 goals were adopted by the United Nations (UN) member states as a part of the 2030 Agenda for Sustainable Development Goals (SDGs) to cover the 15-year plan. Achieving gender equality and empower all women and girls is goal number 5 in the beforementioned agenda.[1] Over the past...
Read MoreSecuring Eletric Mobility Charging Networks
H2020 Concordia work package 2 is composed by 4x Sector-Specific Pilots: Task T2.1: Telecom Sector Task T2.2: Finance Sector Task T2.3: Transport E-Mobility Sector Task T2.4: e-Heath Sector Related with T2.3 CRF and EFACEC are working together on a pilot project focused on the Security of the e-Charging Infrastructure. Nowadays...
Read MoreCONCORDIA Start-up Community: Where do we find the greatest hits of EU cybersecurity new wave?
We are getting closer and closer to accomplish the objective of pooling Europe's Cybersecurity expertise and implementing European Cybersecurity Competence Centre and Network. The new structure described in the legislative proposal would support all types of cybersecurity stakeholders, but there should be a special attention for start-ups. Nature of cybersecurity...
Read MoreSmart Home and remote health services
Health services in the European Economic Area (EEA) address many stakeholder, like round 1.8 million health professionals and 7.3 million nurses and midwives, working in thousands of hospitals and clinics in 27 Member States (MS). EEA counts 500+ million citizens and with this, potential patients. A huge IT-system is need...
Read MoreA new method to detect exploitable smart-home devices connected behind a NAT
Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) researchers who participate in CONCORDIA have developed a new method that enables telecommunications and internet service providers to monitor these devices. According to their new study, the...
Read MoreThe impact of State–sponsored Trolls during the 2016 US Presidential Election Discourse
It is a widely accepted fact that state-sponsored Twitter accounts operated during the 2016 US presidential election, spreading millions of tweets with misinformation and inflammatory political content. Whether these social media campaigns of the so–called "troll" accounts were able to manipulate public opinion is still in question. In this post...
Read MoreA novel Cybersecurity Maturity Assessment Framework (CMAF)
As organizations, and especially Critical National Infrastructures (CNI), are becoming more vulnerable to cyber-attacks, their protection becomes essential and a lifecycle model of prediction, protection, detection and reaction is considered necessary. Towards this target, assessments help identify the strengths and weaknesses of an organization’s processes and procedures and examine how...
Read MoreAn interview on our new research paper – A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicles
Dr. Leandros Maglaras was interviewed from Elsevier regarding a recently accepted article in Elsevier Array journal. In this paper, an Intrusion Detection System (IDS) based on supervised Machine Learning (ML) algorithms was developed to detect spoofing attackers and exclude them from the proposed system for Dynamic Wireless Charging of Electric...
Read MoreCODE 2020: “European Digital Sovereignty – Road to Success?”
Under the German EU presidency, the Research Institute CODE at the Bundeswehr University Munich organised from 10th to 12th November 2020 its annual conference. Due to the pandemic situation, CODE 2020 was held as a digital conference, including high-level discussions, 7 workshops, an innovation conference as well as science track...
Read MoreCONCORDIA OPENED THE DOOR IN CYBERSPACE
Cyberspace is an idea that resides in our minds but has a poorly concrete image. When I was a doctoral student in software reliability, I thought cyberspace was the data superhighway. My proudly written code could exchange data with other code incredibly fast, no matter where both were running. I...
Read More