End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

Security and Trust in Open and Disaggregated 6G networks

24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.

A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles

IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.

The MegaM@ Rt2 ECSEL project: MegaModelling at Runtime–Scalable model-based framework for continuous development and runtime validation of complex systems

This paper presents an overview of the ECSEL 1 project entitled “MegaModelling at runtime – Scalable model-based framework for continuous development and runtime validation of complex systems” (MegaM@Rt2), whose aim is to address the challenges facing MDE.