End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

The NEPHELE Meta-Orchestration Approach for Distributed Applications in the Computing Continuum

SAMOS XXV - 25th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Following the trend for the provision of applications over programmable resources distributed across the computing continuum, in this manuscript, we detail a novel meta-orchestration approach for management of such applications. Two main challenges are considered.

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Transparency, collaboration, security, and digital sovereignty are the open source values that are also important to many European countries and institutions.

End-to-end security assessment framework for connected vehicles

Conference Paper for the International Symposium on Wireless Personal Multimedia Communications at Lisboa

Artificial Intelligence as the second phase for IoT

ATOS Blog: https://atos.net/en/blog/artificial-intelligence-second-phase-iot-part-1