End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
A case study on FAME Marketplace for unlocking customer behavioral insights
FAME project - blog
This blogpost explains how the FAME Marketplace offers pre-built analytical tools for effective customer segmentation, and explore two use cases: improving financial recommendations and developing loyalty programs for parking in Athens.
C4 Model: A Research Guide for Designing Software Architectures
8th International Conference on Software and System Engineering (ICoSSE 2025), Nice, France
Given nowadays increasing complexity of software systems, their architectural design prior to their actual implementation becomes quite complicated.
ICOS: An Intelligent MetaOS for the Continuum
2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Open Source approach in two metaOS projects
2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Decentralized Identity Management
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Intrusion Detection for IoT-based Context and Networks
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Sources, levels, and determinants of indoor air pollutants in Europe: A systematic review
Science of The Total Environment Volume 964 - Elsevier
Clean air is a requirement for life, and the quality of indoor air is a health determinant since people spend most of their daily time indoors.
Self-Sovereign Identity: Realising the journey from innovation to market
Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.
Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks
EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.
A hierarchical AI-based control plane solution for multitechnology deterministic networks.
MobiHoc 2023
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.
FAME: Federated Decentralized Trusted Data Marketplace for Embedded Finance
IEEE
Due to its multivariate and multipurpose use and reuse, data’s worth is dramatically increasing, leading to an era characterized by the generation of data marketplaces towards accessing, selling, sharing, and trading data and data assets.
Mixed Approach for Bike Availability Forecast
IADIS International Conference e-Health 2023 (part of MCCSIS 2023)
A proposal for a predictive analysis model for bike-sharing systems based on a mixed model of statistical and machine-learning approaches.The model assumes a Poisson distribution on bike station arrival and departures.
A Blockchain-based Trust Management Collaborative System for Transport Multi-stakeholder Scenarios
IEEE Journal of Optical Communications and Networking
A trend in future networks (i.e., beyond 5G and 6G) is the increasing virtualization and disaggregation of networks (i.e., Open Radio Access Network, network function virtulization/software-defined networking, or disaggregated optical networks, among others).
5G-PPP Software Network Working Group - Network Applications: Opening up 5G and Beyond networks
5G Infrastructure Public Private Partnership (5G PPP)
Network Applications is seen as a full-potential enabler for future vertical industries beyond current deployment. Therefore, it must be considered along with other 6G enabling technologies in the next-generation network architecture.
A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles
IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.