C4 Model: A Research Guide for Designing Software Architectures
8th International Conference on Software and System Engineering (ICoSSE 2025), Nice, France
Abstract: Given nowadays increasing complexity of software systems, their architectural design prior to their actual implementation becomes quite complicated.
Decentralized Identity Management
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Intrusion Detection for IoT-based Context and Networks
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Sources, levels, and determinants of indoor air pollutants in Europe: A systematic review
Science of The Total Environment Volume 964 - Elsevier
Clean air is a requirement for life, and the quality of indoor air is a health determinant since people spend most of their daily time indoors.
Unlocking efficiency with Marketplace Assets: a case study on FAME Marketplace
FAME's project blog
In today’s ever-changing technological landscape, companies are constantly looking for innovative ways to increase efficiency and minimize costs, and even more nowadays with the advent of artificial intelligence and large language models.
The business potential of Smart Contracts
6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.
6GSMART-ICC: A Cloud-Continuum ORChestrator (CORC)
Project 6G SMART blog at i2CAT Foundation website
Nowadays, to meet the demands of Industry 4.0, a seamless convergence between the different cloud domains (edge, edge and cloud) is key for industries to have a cloud-native intelligent orchestration layer capable of establishing the necessary mechanisms to ensure continuity of services as data m
Importance of cloud continuum service orchestration in industrial environments
Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.
Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics
19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.
Assessing computational fluid dynamics on GPU using portable languages
35th Parallel CFD International Conference
Accelerators are essential for achieving optimal performance and energy efficiency in computing. However, market segmentation often leads to language lock-ins, limiting flexibility across accelerators and increasing development costs.
Placing Computational Tasks within Edge-Cloud Continuum: a DRL Delay Minimization Scheme.
Euro-Par 2024 Conference
In the rapidly evolving landscape of IoT-Edge-Cloud continuum (IECC), effective management of computational tasks offloaded from mobile devices to edge nodes is crucial.
Navigating the Dynamic Heterogeneous Computing Sphere: The Role of EdgeHarbor as a Multi-Edge Orchestrator
Euro-Par 2024 Conference
The term ‘Dynamic Heterogeneous Computing Sphere’ is used to describe a computing paradigm that is heterogeneous, volatile and highly dynamic.
Detecting Compromised Structural Integrity - An AI tool for Critical Infrastructure Operators working towards Climate Resilience
Project SUNRISE's blog
"Critical infrastructure operators across Europe must prepare their facilities, equipment, and personnel to operate under more strenuous conditions in a warming climate.
Preserving data privacy in Machine Learning pipelines with Federated Learning
FAME's project blog
The feature extraction capabilities of Machine Learning (ML) models have led to their wide adoption in a large variety of sectors: from anomaly detection for machinery, to user clustering and behavioral prediction, market trends predictions, or the analysis of text, sound, and image data.
A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem
IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.
Security and Trust in Open and Disaggregated 6G networks
24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.