A Cybersecurity Situational Awareness and Information-sharing Solution for Local Public Administrations Based on Advanced Big Data Analysis : The CS-AWARE Project

1University of Vienna – Faculty of Computer Science, Austria 2University of Oulu – Faculty of Information Technology and Electrical Engineering, Finland 3CARIS Research Ltd., United Kingdom 43rd Place, Italy 5University of Passau, Germany 6Peracton, Ireland 7RheaSoft, Denmark 8InnoSec, Greece 9Eastern Macedonia and Thrace Institute of Technology, Department of Computer and Informatics Engineering, Greece E-mail: thomas.schaberreiter@univie.ac.at; juha.röning@oulu.fi; gerald.quirchmayr@univie.ac.at; veronika.kupfersberger@univie.ac.at; ccwills@carisresearch.co.uk; matteo.bregonzio@3rdplace.com; adamantios.koumpis@uni-passau.de; juliano-sales@uni-passau.de; laurentiu.vasiliu@peracton.com; kim@rheasoft.dk; a.papanikolaou@innosec.gr; krantos@teiemt.gr; a.spyros@innosec.gr

[1]  Peter Checkland,et al.  Systems Thinking, Systems Practice , 1981 .

[2]  Karl N. Levitt,et al.  How to sanitize data? , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[3]  Juha Röning,et al.  Graphingwiki - a Semantic Wiki extension for visualising and inferring protocol dependency , 2006, SemWiki.

[4]  Jeff Kramer,et al.  Is abstraction the key to computing? , 2007, CACM.

[5]  Saikou Y. Diallo,et al.  A Conceptual Modeling Method for Critical Infrastructure Modeling , 2008, 41st Annual Simulation Symposium (anss-41 2008).

[6]  Qing Li,et al.  Modeling and Analysis of Enterprise and Information Systems: From Requirements to Realization , 2009 .

[7]  Schahram Dustdar,et al.  A survey on self-healing systems: approaches and systems , 2010, Computing.

[8]  Patrice Clemente,et al.  From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems , 2010, Trans. Comput. Sci..

[9]  Juha Röning,et al.  Socio-technical Security Assessment of a VoIP System , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[10]  Djamel Khadraoui,et al.  Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper) , 2011, CRITIS.

[11]  Jean-Daniel Zucker,et al.  Abstraction in Artificial Intelligence and Complex Systems , 2013, Springer New York.

[12]  Gregory A. Witte,et al.  Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .

[13]  J. C. Jiang,et al.  Finding influential agent groups in complex multiagent software systems based on citation network analyses , 2015, Adv. Eng. Softw..

[14]  Simon A. Dobson,et al.  A survey of self‐healing systems frameworks , 2015, Softw. Pract. Exp..

[15]  Srividya Kona Bansal,et al.  Integrating Big Data: A Semantic Extract-Transform-Load Framework , 2015, Computer.

[16]  Juliano Efson Sales,et al.  A Compositional-Distributional Semantic Model for Searching Complex Entity Categories , 2016, *SEM@ACL.

[17]  David Waltermire,et al.  Guide to Cyber Threat Information Sharing , 2016 .

[18]  André Freitas,et al.  Graphene: Semantically-Linked Propositions in Open Information Extraction , 2018, COLING.