CyberROAD Cookie Policy

Our site saves cookies on your device in order to deliver better content.
You can disable the usage of cookies by changing the settings of your browser.
By browsing our website without changing the browser settings you grant us permission to store that information on your device. I agree

Cyber ROAD


Development of the Cybercrime and Cyberterrorism research roadmap

CyberRoad Publications

Project Deliverables

D1.1 Management and Quality Procedures. Performance Indicators (Confidential)

 

D1.2 Management and Advisory Board Interim Report (Confidential)

 

D1.3 Management and Advisory Board Interim Report (Confidential)

 

D2.1 Roadmapping Methodologies and Guidelines for Information Collection and Assessment (Public) Icon pdf (3.4 MB)

 

D2.2 Risk Assessment Ranking Methodology (Public) Icon pdf (3.1 MB)

 

D2.3 Final Roadmap (Public) Icon pdf (1.7 MB)

 

D2.4 Ethical Approval of the Relevant Research (Restricted)

 

D3.1 Social, Economic, Political and Legal Landscape Report (Public) Icon pdf (3.3 MB)

 

D3.2 Evaluation of Stakeholder Needs (Public) Icon pdf (2.4 MB)

 

D3.3 Social, Economic, Political and Legal Research Topics (Restricted)

 

D4.1 Technology Landscape Report (Public) Icon pdf (4.4 MB)

 

D4.2 Security Challenges of Future and Emerging Technologies (Restricted)

 

D4.3 Security Challenges in Critical Infrastructures (Restricted)

 

D4.4 Profiles of Cyber-Criminals and Cyber-Attackers (Public) Icon pdf (1.8 MB)

 

D5.1 Stakeholder Needs and Threats Evaluation (Public) Icon pdf (4.3 MB)

 

D5.2 Preliminary Best Practices Analysis Document (Public) Icon pdf (1.4 MB)

 

D5.3 Best Practices Analysis Document (Public) Icon pdf (1.4 MB)

 

D5.4 Preliminary Cyber-Security Solutions Taxonomy (Confidential)

 

D5.5 Cyber-Security Solutions Taxonomy (Confidential)

 

D5.6 Cyber Crime Research Topics (Restricted)

 

D6.1 Cyber Terrorism Stakeholder Needs and Threats Evaluation (Public) Icon pdf (3.9 MB)

 

D6.2 Cyber Terrorism Preliminary Best Practices Analysis (Public) Icon pdf (688.7 KB)

 

D6.3 Cyber Terrorism Best Practices Analysis (Public) Icon pdf (768.7 KB)

 

D6.4 Preliminary Cyber-Security Solutions Taxonomy (Cyber Terrorism) (Confidential)

 

D6.5 Cyber-Security Solutions Taxonomy (Cyber Terrorism) (Confidential)

 

D6.6 Cyber Terrorism Research Topics (Restricted)

 

D7.1 Dissemination Plan and Calendar of Activities (Public) Icon pdf (621.4 KB)

 

D7.2 Dissemination Plan and Calendar of Activities (Public) Icon pdf (7.2 MB)

 

D7.5 Project Website and Social Networking Accounts (Public) Icon pdf (744.5 KB)

 

D7.6 Report on FCCT 2015 (Public) Icon pdf (1.5 MB)

 

D7.7 TUD Workshop Report (Public) Icon pdf (9.4 MB)

 

D7.8 Second ARES-Workshop Report (Public) Icon pdf (7.5 MB)

 

Publications in Journals & Conferences

  • Michal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni. Comprehensive Approach to Increase Cyber Security and Resilience. In proceedings of the First International Workshop on Future Scenarios for Cyber Crime and Cyber Terrorism (FCCT 2015). Toulouse, France. August 2015. Icon pdf (2.7 MB)
  • Max Kilger. Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios. In proceedings of the 10th International Conference on Availability, Reliability and Security (ARES). Toulouse, France. August 2015. Icon pdf (854.6 KB)
  • Jart Armin, Bryn Thompson, Piotr Kijewski, Davide Ariu, Giorgio Giacinto, Fabio Roli. 2020 Cybercrime Economic Costs: No measure No solution. In proceedings of the 10th International Conference on Availability, Reliability and Security (ARES). Toulouse, France. August 2015. Icon pdf (550.3 KB)
  • Paolo Foti, Jart Armin, Marco Cremonini. 0-Day Vulnerabilities and Cybercrime. In proceedings of the 10th International Conference on Availability, Reliability and Security (ARES). Toulouse, France. August 2015. Icon pdf (139.0 KB)
  • Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli. Yet Another Cybersecurity Roadmapping Methodology. In proceedings of the 10th International Conference on Availability, Reliability and Security (ARES). Toulouse, France. August 2015. Icon pdf (1.4 MB)

Presentations & Lectures

Ben Brewster. Consolidated Research Roadmap. Icon pdf (1.2 MB)
Michele Colajanni. Cybersecurity in industry and industrial products (“The need for disruptive ideas”). Icon pdf (1.5 MB)
Enrico Frumento. The CyberROAD roadmap. Icon pdf (1.6 MB)
Fabio Roli. CyberRoad Final Workshop. Icon pdf (4.2 MB)
Jart Armin. Metrics & Quantification of Cybercrime. Icon pdf (1.3 MB)
Piotr Kijewski. A practical look into scenario building and identifying relevant research gaps. Icon pdf (1.1 MB)
At the CyberRoad final event "Future Challenges in Cyber Crime and Cyber Terrorism Research: the CyberROAD perspective", University of Cagliari - Piazza d'Armi, Cagliari, Italy. 25 May, 2016.

 

Davide Ariu. Hitting the CyberROAD, what to expect in cyber crime by 2020. At European Electronic Crime Task Force's Plenary Meeting in Poste Italiane's headquarters in Rome, Italy. 31 March, 2015. Icon pdf (3.5 MB)

 

Przemek Jaroszewski. Presentation on the CyberRoad EU project. At Las Palmas 2015 FIRST/TF-CSIRT Technical Colloquium in Las Palmas, Canary Islands. January 26, 2015. Icon pdf (493.8 KB)

 

Jart Armin. Cybercrime Metrics and Threat Data. At the 18th Conference on Telecommunications and IT Security (SECURE 2014) in Warsaw, Poland. October 22-23, 2014. Icon pdf (2.1 MB)

 

Giorgio Giacinto. Presentation on the CyberRoad EU project. At eCrime Sync-Up conference, NATO school in Oberammergau, Germany. April 1-3, 2014. Icon pdf (1.3 MB)

Other Material