End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

A case study on FAME Marketplace for unlocking customer behavioral insights

FAME project - blog
This blogpost explains how the FAME Marketplace offers pre-built analytical tools for effective customer segmentation, and explore two use cases: improving financial recommendations and developing loyalty programs for parking in Athens.

C4 Model: A Research Guide for Designing Software Architectures

8th International Conference on Software and System Engineering (ICoSSE 2025), Nice, France
Given nowadays increasing complexity of software systems, their architectural design prior to their actual implementation becomes quite complicated.

ICOS: An Intelligent MetaOS for the Continuum

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands

Intrusion Detection for IoT-based Context and Networks

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Decentralized Identity Management

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Sources, levels, and determinants of indoor air pollutants in Europe: A systematic review

Science of The Total Environment Volume 964 - Elsevier
Clean air is a requirement for life, and the quality of indoor air is a health determinant since people spend most of their daily time indoors.

Engineering Resource-Efficient Data Management for Smart Cities with Apache Kafka

Future Internet
In terms of the calibre and variety of services offered to end users, smart city management is undergoing a dramatic transformation.

Governance Mesh Approach for Cybersecurity Ecosystem

Plovdiv (Bulgaria)
Four EU pilot projects were launched in 2019 (ECHO, SPARTA, CSEU, and CONCORDIA) with the focus on specific context of EU Regulation that is establishing the European Cybersecurity Competence Centre (ECCC), together with the Network of National Coordination Centers (NCCs), and Competence communit

Current Hot Topics in Data Protection

Big Data Value Association
The BDVA position paper Current Hot Topics in Data Protection summarizes the latest and emerging challenges and developments in the field, with a focus on the European Union: "The new paper introduces pr

Digital Sovereignty in Cyber Security

Cybersec4Europe project has been quite influential as a pilot of the Cyber Competence Network, contributing to a wide and rich community of cybersecurity stakeholders.

3D human big data exchange between the health and garment sectors. Lessons learned in the BodyPass project

BodyPass
3D personal data is a type of data that contains useful information for product design, online sale services, medical research and patient follow-up.

An Artificial Intelligence-Based Collaboration Approach in Industrial IoT Manufacturing: Key Concepts, Architectural Extensions and Potential Applications

MDPI Sensors
The digitization of manufacturing industry has led to leaner and more efficient production, under the Industry 4.0 concept.

An Approach to Support Automated Deployment of Applications on Heterogeneous Cloud-HPC Infrastructures

22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
Complex applications, which include microservices, computationally intensive batch jobs, and sophisticated interaction with the external environment, demand for heterogeneous computational infrastructures that range from cloud to HPC and edge computing.

An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models

There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.