Intrusion Detection for IoT-based Context and Networks

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Decentralized Identity Management

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy

The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.

Stack and Stick are in Stock

CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).

An Approach to Support Automated Deployment of Applications on Heterogeneous Cloud-HPC Infrastructures

22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
Complex applications, which include microservices, computationally intensive batch jobs, and sophisticated interaction with the external environment, demand for heterogeneous computational infrastructures that range from cloud to HPC and edge computing.