by Florian Skopik, Markus Wurzenberger and Roman Fiedler (AIT Austrian Institute of Technology)

Today’s security solutions usually address only single architectural layers, and are unable to take account of the full picture. This leads to a system operator having only a limited view regarding the root cause of a cyberattack, which can reduce the overall availability of cyber-physical systems (CPS). Particularly for complex and stealthy multi-stage attacks, an approach is required that correlates information from all CPS layers, including the field area, the SCADA backend, the enterprise IT and the WAN (in the case of large-scale CPS) to promptly react to emerging malicious activities.

by Thomas Lorünser (AIT Austrian Institute of Technology) Eva Munoz and (ETRA Investigación y Desarrollo) and Marco Decandia Brocca (Lombardia Informatica)

Distributing trust among many different players is a common approach in security. In the case of storage, many protocols are known for secure fragmentation of data, however, relatively little research has addressed the aspects relevant for real deployment in cloud based systems, i.e., how to satisfy the underlying trust assumption.

by Gianfranco E. Modoni, Marco Sacco (ITIA-CNR) and Alberto Trombetta (University of Insubria)

In order to face the challenge of strengthening its cyber-security, a manufacturing company can follow the approach of aligning cybersecurity-related goals with its specific business objectives.

by Michele Dolfi, Christoph Auer, Peter W J Staar and Costas Bekas (IBM Research Zurich)

Over recent decades, the number of scientific articles and technical publications have been increasing exponentially, and as a consequence there is a great need for systems that can ingest these documents at scale and make their content discoverable. Unfortunately, both the format of these documents (e.g. the PDF format or bitmap images) as well as the presentation of the data (e.g. complex tables) make the extraction of qualitative and quantitative data extremely challenging. We have developed a platform to ingest documents at scale which is powered by machine learning techniques and allows the user to train custom models on document collections.

by Justina Bieliauskaite (European DIGITAL SME Alliance), Agi Karyda, Stephan Krenn (AIT Austrian Institute of Technology), Erkuden Rios (Tecnalia) and George Suciu Jr (BEIA Consult)

While highly secure and privacy-friendly solutions for sensitive domains are being developed by numerous publicly funded projects, many of them never make it into the real world. TRUSTEE is a network of projects that aims at increasing the visibility of leading-edge technologies by providing interested customers with a single contact point.

by Federica Truglio, Michela Ponticorvo and Franco Rubinacci (University of Naples “Federico II”)

Educational robotics is not only a useful tool to learn how program a robot, but it is. It can also be a powerful method to improve other skills, such as social ability. A lab has been set up to investigate whether educational robotics can help to improve social interaction at school.

by Filip Kruse and Jesper Boserup Thestrup

Enter the matrix: Trials, tribulations – and successes – of doing an inter-institutional data management project in a matrix organization

“Neo, sooner or later you’re going to realize just as I did that there’s a difference between knowing the path and walking the path.” (Morpheus, The Matrix, 1999)

The aim of the project "Data Management in Practice" was to establish a Danish infrastructure setup with services covering all aspects of the research data lifecycle: from application and initial planning, through discovering and selecting data and finally to the dissemination and sharing of results and data. Further, the setup should include facilities for training and education. Researchers’ needs and demands from active projects – hence the “in Practice” – should form the basis of the services. Finally, the project should explore the role of research libraries regarding research data management.  

by Cristina Farmaki and Vangelis Sakkalis (ICS-FORTH)

An innovative and reliable EEG brain-computer navigation system has been developed in the Computational Biomedicine Laboratory (CBML), at ICS-FORTH, in Crete, Greece. The implemented system is intended to enable patients suffering from neuromuscular paralysis to act independently, be able to make their own decisions and to some extent take part in social life. Using such a system challenges mental abilities in various ways and is expected to improve quality of life and benefit mental health.

by Michalis Mountantonakis and Yannis Tzitzikas (ICS-FORTH)

LODsyndesis is the biggest knowledge graph that includes all inferred equivalence relationships, which occur between entities and  schemas of hundreds of Linked Open Data cloud datasets. LODsyndesis webpage offers several services for exploiting the aforementioned knowledge graph, e.g., a service for collecting fast all the available information (and their provenance) for 400 million of entities, an advanced Dataset Discovery service for finding the most connected datasets to a given dataset, and others.

Next issue: July 2021
Special theme:
"Privacy-Preserving Computation"
Call for the next issue
Image ERCIM News 114 epub
This issue in ePub format

Get the latest issue to your desktop
RSS Feed