Intrusion Detection for IoT-based Context and Networks
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Decentralized Identity Management
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
6GSMART-ICC: A Cloud-Continuum ORChestrator (CORC)
Project 6G SMART blog at i2CAT Foundation website
Nowadays, to meet the demands of Industry 4.0, a seamless convergence between the different cloud domains (edge, edge and cloud) is key for industries to have a cloud-native intelligent orchestration layer capable of establishing the necessary mechanisms to ensure continuity of services as data m
Importance of cloud continuum service orchestration in industrial environments
Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.
Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics
19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.
Detecting Compromised Structural Integrity - An AI tool for Critical Infrastructure Operators working towards Climate Resilience
Project SUNRISE's blog
"Critical infrastructure operators across Europe must prepare their facilities, equipment, and personnel to operate under more strenuous conditions in a warming climate.
Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy
The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.
UAV AI Remote Inspection. Unleashing the power of V-LLM?
Project SUNRISE's blog
It is widely known that we are living through a historic moment in the field of artificial intelligence (AI), capturing the attention of the entire world with spectacular results across multiple application fields, especially in text and image generation.
How does resilience relate to risk
Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.
Collaborative Ranking of Results in Pilot Projects for the EU Cybersecurity Competence Community
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
Cybersecurity ecosystem in EU is a hot topic, as it relates to the recent establishment of the EU Cybersecurity Competence Centre (ECCC), the Network of National Coordination Centres (NCCs) and the Cybersecurity Community (CC).
TERME: a cyber-physical resilience toolset for risk assessment
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
With the increased digitalization and adoption of cost-effective off-the-shelf components and cyber connectivity, Critical Infrastructures (CI) operators have benefited in many ways, but the attack surface has also become larger.