End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
Security and Trust in Open and Disaggregated 6G networks
24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Title: Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Topics: Security Awareness and Education; Threat Awareness
An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models
There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.
We@Work: Wellbeing, Health and Safety at Work
Proceedings - 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society - Honolulu, Hawaii, USA
Care cost for rehabilitation and treatment of work-related injuries and disorders are steadily increasing.