Self-Sovereign Identity: Realising the journey from innovation to market
Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.
Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks
EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.
A hierarchical AI-based control plane solution for multitechnology deterministic networks.
MobiHoc 2023
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.
FAME: Federated Decentralized Trusted Data Marketplace for Embedded Finance
IEEE
Due to its multivariate and multipurpose use and reuse, data’s worth is dramatically increasing, leading to an era characterized by the generation of data marketplaces towards accessing, selling, sharing, and trading data and data assets.
A Blockchain-based Trust Management Collaborative System for Transport Multi-stakeholder Scenarios
IEEE Journal of Optical Communications and Networking
A trend in future networks (i.e., beyond 5G and 6G) is the increasing virtualization and disaggregation of networks (i.e., Open Radio Access Network, network function virtulization/software-defined networking, or disaggregated optical networks, among others).
5G-PPP Software Network Working Group - Network Applications: Opening up 5G and Beyond networks
5G Infrastructure Public Private Partnership (5G PPP)
Network Applications is seen as a full-potential enabler for future vertical industries beyond current deployment. Therefore, it must be considered along with other 6G enabling technologies in the next-generation network architecture.
Mixed Approach for Bike Availability Forecast
IADIS International Conference e-Health 2023 (part of MCCSIS 2023)
A proposal for a predictive analysis model for bike-sharing systems based on a mixed model of statistical and machine-learning approaches.The model assumes a Poisson distribution on bike station arrival and departures.
A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles
IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.
Collaborative Ranking of Results in Pilot Projects for the EU Cybersecurity Competence Community
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
Cybersecurity ecosystem in EU is a hot topic, as it relates to the recent establishment of the EU Cybersecurity Competence Centre (ECCC), the Network of National Coordination Centres (NCCs) and the Cybersecurity Community (CC).
TERME: a cyber-physical resilience toolset for risk assessment
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
With the increased digitalization and adoption of cost-effective off-the-shelf components and cyber connectivity, Critical Infrastructures (CI) operators have benefited in many ways, but the attack surface has also become larger.
CyberSec4Europe - Securing and Preserving Privacy Sharing Health Data
ERCIM News
In the context of EU Horizon 2020 CyberSec4Europe project the medical data exchange demonstrator creates a trusted ecosystem for sharing medical data in a secure and privacy preserving manner.
Analyzing Particularities of Sensor Datasets for Supporting Data Understanding and Preparation
Special Issue Applied Data Science and Intelligence
Data scientists spend much time with data cleaning tasks, and this is especially important when dealing with data gathered from sensors, as finding failures is not unusual (there is an abundance of research on anomaly detection in sensor data).
KRAKEN - Brokerage and Market Platform for Personal data
'Fighting Cyber-Crime'
The EU Horizon 2020 KRAKEN project is dedicated to building a trusted and secure personal data platform enabling exchange and analytics of personal data.
AI for dating stars: a benchmarking study for gyrochronology
2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
In astronomy, age is one of the most difficult stellar properties to measure, and gyrochronology is one of the most promising techniques for the task.
Common pathways and functional profiles reveal underlying patterns in Breast, Kidney and Lung cancers
BMC – Biology Direct
Background: Cancer is an extremely heterogeneous disease, both intra and inter cancer types.
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Title: Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Topics: Security Awareness and Education; Threat Awareness