End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

A case study on FAME Marketplace for unlocking customer behavioral insights

FAME project - blog
This blogpost explains how the FAME Marketplace offers pre-built analytical tools for effective customer segmentation, and explore two use cases: improving financial recommendations and developing loyalty programs for parking in Athens.

C4 Model: A Research Guide for Designing Software Architectures

8th International Conference on Software and System Engineering (ICoSSE 2025), Nice, France
Given nowadays increasing complexity of software systems, their architectural design prior to their actual implementation becomes quite complicated.

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands

ICOS: An Intelligent MetaOS for the Continuum

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands

Decentralized Identity Management

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Intrusion Detection for IoT-based Context and Networks

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Sources, levels, and determinants of indoor air pollutants in Europe: A systematic review

Science of The Total Environment Volume 964 - Elsevier
Clean air is a requirement for life, and the quality of indoor air is a health determinant since people spend most of their daily time indoors.

Self-Sovereign Identity: Realising the journey from innovation to market

Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.

Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks

EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.

A hierarchical AI-based control plane solution for multitechnology deterministic networks.

MobiHoc 2023
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.

FAME: Federated Decentralized Trusted Data Marketplace for Embedded Finance

IEEE
Due to its multivariate and multipurpose use and reuse, data’s worth is dramatically increasing, leading to an era characterized by the generation of data marketplaces towards accessing, selling, sharing, and trading data and data assets.

5G-PPP Software Network Working Group - Network Applications: Opening up 5G and Beyond networks

5G Infrastructure Public Private Partnership (5G PPP)
Network Applications is seen as a full-potential enabler for future vertical industries beyond current deployment. Therefore, it must be considered along with other 6G enabling technologies in the next-generation network architecture.

Mixed Approach for Bike Availability Forecast

IADIS International Conference e-Health 2023 (part of MCCSIS 2023)
A proposal for a predictive analysis model for bike-sharing systems based on a mixed model of statistical and machine-learning approaches.The model assumes a Poisson distribution on bike station arrival and departures.

A Blockchain-based Trust Management Collaborative System for Transport Multi-stakeholder Scenarios

IEEE Journal of Optical Communications and Networking
A trend in future networks (i.e., beyond 5G and 6G) is the increasing virtualization and disaggregation of networks (i.e., Open Radio Access Network, network function virtulization/software-defined networking, or disaggregated optical networks, among others).

A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles

IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.