End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

The NEPHELE Meta-Orchestration Approach for Distributed Applications in the Computing Continuum

SAMOS XXV - 25th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Following the trend for the provision of applications over programmable resources distributed across the computing continuum, in this manuscript, we detail a novel meta-orchestration approach for management of such applications. Two main challenges are considered.

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Transparency, collaboration, security, and digital sovereignty are the open source values that are also important to many European countries and institutions.

Security and Trust in Open and Disaggregated 6G networks

24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.

Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach

Title: Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach Topics: Security Awareness and Education; Threat Awareness

An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models

There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.