Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities
EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.
Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities
EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.
Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks
EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.
A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles
IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Title: Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Topics: Security Awareness and Education; Threat Awareness
An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models
There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.