Intrusion Detection for IoT-based Context and Networks

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

Decentralized Identity Management

Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.

The business potential of Smart Contracts

6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.

Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy

The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.

Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach

Title: Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach Topics: Security Awareness and Education; Threat Awareness

An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models

There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.