• Corpus ID: 203693364

4 The FORTIKA Accelerated Edge Solution for Automating SMEs Security

@inproceedings{Markakis20194TF,
  title={4 The FORTIKA Accelerated Edge Solution for Automating SMEs Security},
  author={Evangelos K. Markakis and Yannis Nikoloudakis and Evangelos Pallis and Ales Cernivec and Panayotis E. Fouliras and Ioannis Mavridis and Georgios Sakellariou and Stavros Salonikias and Nikolaos Tsinganos and Anargyros Sideris and Nikolaos Zotos and Anastasios Drosou and Konstantinos M. Giannoutakis and Dimitrios Tzovaras},
  year={2019}
}
1Department of Informatics Engineering, Technological Educational Institute of Crete, Greece 2XLAB d.o.o., Slovenia 3Department of Applied Informatics, University of Macedonia, Greece 4Future Intelligence LTD, United Kingdom 5Information Technologies Institute, Centre for Research & Technology Hellas, Greece E-mail: Markakis@pasiphae.teicrete.gr; Nikoloudakis@pasiphae.teicrete.gr; Pallis@pasiphae.teicrete.gr; ales.cernivec@xlab.si; pfoul@uom.edu.gr; mavridis@uom.edu.gr; geosakel@uom.edu.gr… 

References

SHOWING 1-10 OF 22 REFERENCES
Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case
TLDR
A cross-layered system, which leverages the Software Defined Networking (SDN) paradigm and the distributed Fog architecture, for network slicing and task offloading to provide dynamic, security-aware Vulnerability-Assessment as a service for large ICT infrastructures is proposed.
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments
TLDR
The current state-of-the-art on SE attack recognition systems are presented, a dissecting of a SE attack to recognize the different stages, forms, and attributes and isolate the critical enablers that can influence aSE attack to work.
Social Engineering Attack Detection Model: SEADMv2
TLDR
This paper proposes a revised version of the Social Engineering Attack Detection Model, which is designed with a call centre environment in mind and is only able to cater for social engineering attacks that use bidirectional communication.
Access Control Issues in Utilizing Fog Computing for Transport Infrastructure
TLDR
This paper presents the key pointers of an attribute-based access control scheme suitable for fog computing and aims to set a basis for further work in refining, verifying and validating the proposed solution.
PFC: Privacy Preserving FPGA Cloud - A Case Study of MapReduce
TLDR
PFC leverages the security feature of the existing FPGAs originally designed for bitstream IP protection and proxy re-encryption for preserving user data privacy and applies PFC to the popular MapReduce programming model and extends the FPGA based Map Reduce pipeline with privacy protection capabilities.
Cloud Resource Orchestration: A Data-Centric Approach
TLDR
This paper presents the design and prototype implementation of the Data-centric Management Framework (DMF) as a solution, with data models, query languages and semantics that are speci cally designed for cloud resource orchestration.
Semantic analysis of dialogs to detect social engineering attacks
  • Ram Bhakta, I. Harris
  • Computer Science
    Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)
  • 2015
TLDR
This work presents an approach to detecting a social engineering attack which uses a pre-defined Topic Blacklist (TBL) to verify the discussion topics of each line of text generated by the potential attacker.
Computing, Caching, and Communication at the Edge: The Cornerstone for Building a Versatile 5G Ecosystem
TLDR
An architecture that exploits and advances the edge and extreme edge 3C paradigms toward enabling the 5G ecosystem to meet its own criterion for low end-to-end latencies and, as such, enable it to provide and sustain high QoS/QoE levels is proposed.
A Fog-Based Emergency System for Smart Enhanced Living Environments
TLDR
A virtualized fog-based infrastructure for harvesting and managing distributed IT resources, shifting the entire cloud functionality to the network edge, and utilizing the cloud in an assistive manner to ensure system robustness is presented.
...
...