Intrusion Detection for IoT-based Context and Networks
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Decentralized Identity Management
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
The business potential of Smart Contracts
6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.
Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy
The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.
LEPS – Leveraging eID in the Private Sector
Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers.
ISBN: 9788770220880
doi: https://doi.org/10.13052/rp-9788770220873
https://www.riverpublishers.com/research_details.php?book_id=711