Decentralized Identity Management
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Intrusion Detection for IoT-based Context and Networks
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
6GSMART-ICC: A Cloud-Continuum ORChestrator (CORC)
Project 6G SMART blog at i2CAT Foundation website
Nowadays, to meet the demands of Industry 4.0, a seamless convergence between the different cloud domains (edge, edge and cloud) is key for industries to have a cloud-native intelligent orchestration layer capable of establishing the necessary mechanisms to ensure continuity of services as data m
Importance of cloud continuum service orchestration in industrial environments
Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.
Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy
The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.
A hierarchical AI-based control plane solution for multitechnology deterministic networks.
MobiHoc 2023
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.