Skip to main content
All Posts By

Anna Marton, Safepay Systems

Nakip M, Gelenbe E. 2024. Online Self-Supervised Deep Learning for Intrusion Detection Systems. IEEE Transactions on Information Forensics and Security. 2024. Publications

Nakip M, Gelenbe E. 2024. Online Self-Supervised Deep Learning for Intrusion Detection Systems. IEEE Transactions on Information Forensics and Security. 2024.

Journal: IEEE Transactions on Information Forensics and Security. 2024. Authors: Nakip M, Gelenbe E. Abstract: This paper proposes a novel Self-Supervised Intrusion Detection (SSID) framework, which enables a fully online Deep Learning (DL) based Intrusion Detection System (IDS) that requires no human intervention or prior off-line learning. The proposed framework…
Webinar: Certification for the Secure Lifecycle of Systems, 7. May 2024 News

Webinar: Certification for the Secure Lifecycle of Systems, 7. May 2024

On 7 May 2024, at 14:00-15:00 (CEST), the ECCC, together with ECCO (European Cyber Security COmmunity project) will organize a knowledge-sharing webinar focused on the certification processes in the supply chain. The webinar will provide a comprehensive vision around the certification processes for the secure management of systems’ lifecycle and…
Software Requirements Classification using Large Language Models (LLMs) Insights

Software Requirements Classification using Large Language Models (LLMs)

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) The definition of software requirements, both functional and non-functional, is the first step of the Software Development Lifecycle (SDLC). The correct specification of these requirements is critical for the production of high-quality and dependable software…
Summary of the 4th IoT Day Roundtable “IoT Supply Chain Security: Challenges and Impacts” News

Summary of the 4th IoT Day Roundtable “IoT Supply Chain Security: Challenges and Impacts”

On the occasion of the Global IoT Day,  we successfully organized the 4th IoT Day Roundtable on April 8, 2024, titled “IoT Supply Chain Security: Challenges and Impacts”. With the participation of speakers from ENISA, NIST, EUROSMART, BEUC, ECSO, EY, TÜVIT and ourselves, the DOSS project, we managed to give…
The UK Product Security and Telecommunications Infrastructure (PSTI) Regulation comes into force on 29 April 2024 News

The UK Product Security and Telecommunications Infrastructure (PSTI) Regulation comes into force on 29 April 2024

The PSTI applies to all “internet connectable products” and “network connectable products” (together “relevant connectable products”), except for “exempted products”. While the definition of relevant connectable products is rather complex, all M2M, IoT products, including connected vehicles and smart TV as well as home Wi-Fi routers belong in the scope. The PSTI…
Top 10 (+2) Things You Need to Know About the EUCC Implementing Act Insights

Top 10 (+2) Things You Need to Know About the EUCC Implementing Act

The European Common Criteria-based cybersecurity certification scheme (EUCC) By Roland Atoui and Ayman Khalil, Red Alert Labs   With the introduction of the European Common Criteria-based cybersecurity certification scheme (EUCC), the European Commission makes a significant advancement in a time when cybersecurity threats are more serious than ever. Supported by…
The Federal Communications Commission approves “U.S. Cyber Trust Mark” labeling program for consumer IoT products News

The Federal Communications Commission approves “U.S. Cyber Trust Mark” labeling program for consumer IoT products

On 14. March 2024, the US Federal Communications Commission (FCC) approved, based on criteria developed by the NIST, a voluntary program that would create a cybersecurity label for consumer IoT and smart devices, like (not limited to) home security cameras, voice-activated shopping devices, internet-connected appliances, fitness trackers, garage door openers,…