Software program/product
BASTION Framework - UMU PoC
Beyond Automated Security orchestraTION (BASTION) framework UMU implementation.
Software program/product
Beyond Automated Security orchestraTION (BASTION) framework UMU implementation.
Software program/product
A security orchestrator is a platform that integrates and automates security enablers and capabilities across multiple domains, enabling centralized policy enforcement and coordinated proactive and reactive security operations across the inter/intra domains.
Dataset
Dataset containing radio-metrics from a real muli-operator 5G network.
Dataset
Dataset containing multi-perspective footage of a urban, vehicular scenario.
Designs
Operational workflow to check and refine LLM outputs in the context of network orchestration.
Proof of Concepts (PoC)
Functional solution that permits the exchange of native C-ITS message through a cellular (5G) infrastructure.
Software program/product
In-kernel program that examines traffic applying ML models.
Software program/product
Software toolset to manage digital identity in the context of SSI and EUDIW, enhanced with privacy-preserving solutions.
Software program/product
Implementation of a distributed privacy-preserving Attribute-Based Credentials scheme based on PS-MultiSignatures.
Proof of Concepts (PoC)
Conformity Certificates for (medical) IoT devices based on p-ABC solutions and trusted execution environments.
IA Systems
Extension of IDIA-FL to integrate LLMs and external cyber threat intelligence platforms through the attack identification process.
Software program/product
Framework to identify attacks in real-time from network flow features, integrating traffic monitoring and federated learning, with SIEM-ready alerts.
IA Systems
Software product for Security Operation Centers aimed to analyze with AI, in real time, user behavioral data coming from different sources to discover anomalies.
IA Systems
LLM-driven synthetic cyber threat intelligence (CTI) generation to improve automatic MITRE technique mapping.
IA Systems
Robust, dynamic aggregation for federated learning, designed to withstand poisoning attacks.
Software program/product
Opt-in application to collect user behavioral signals for human-factor cybersecurity analysis, with privacy-by-design data handling.
IA Systems
Controlled tool that creates realistic phishing-style messages for security awareness training and defensive testing.
IA Systems
Model that identifies anomalous behavior in IoT traffic and generates alerts.
Software program/product
Real-time analytics and modeling platform to enhance cyber situational awareness in next-generation network environments, including 6G infrastructures.
Software program/product
Security playbook enforcement solution leveraging cyber situational awareness and AI planning to determine optimal mitigation strategies.
Designs
Model for a security device passport to collect and share relevant cybersecurity information throughout the device lifecycle.
Proof of Concepts (PoC)
Design and implementation of an automated Hyperledger Fabric deployment system tailored to continuous certification environments.
IA Systems
Multi-agent system for cybersecurity log anomaly detection, combining specialized agents and RAG through MCP tools for classification and explainability.
Designs
Flexible security evaluation methodology that supports certification across diverse ICT systems by integrating risk assessment and test-based evaluation.
Proof of Concepts (PoC)
Design and implementation of a secure IoT onboarding mechanism based on FDO, integrating secure configuration.
Proof of Concepts (PoC)
Framework architecture for security management during IoT device lifecycle, including secure design/deployment, monitoring, mitigation and secure upgrades.
Designs
Extension of the IETF MUD file to describe more fine-grained security policies.
Proof of Concepts (PoC)
Architecture to manage obtaining and enforcement of security profiles based on MUD files.
Software program/product
CTI sharing solution integrating privacy-preserving attribute obfuscation with a blockchain-based auditing and verification system.
Software program/product
Solution for orchestration, automation and creation of IPsec tunnels in multidomain and multioperator B5G scenarios leveraging SDN.