A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles

IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.

TERME: a cyber-physical resilience toolset for risk assessment

IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
With the increased digitalization and adoption of cost-effective off-the-shelf components and cyber connectivity, Critical Infrastructures (CI) operators have benefited in many ways, but the attack surface has also become larger.

Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach

Title: Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach Topics: Security Awareness and Education; Threat Awareness

An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models

There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.

Engineering a QoS Provider Mechanism for Edge Computing with Deep Reinforcement Learning

With the development of new system solutions that integrate traditional cloud computing with the edge/fog computing paradigm, dynamic optimization of service execution has become a challenge due to the edge computing resources being more distributed and dynamic.

Multi-cloud provisioning of business processes

The Cloud offers enhanced flexibility in the management of resources while it promises the reduction of its cost as well as its infinite scalability. In this way, due to these advantages, there is a recent move towards migrating business processes (BPs) in the Cloud.

Collaborative SLA and reputation-based trust management in cloud federations

Industry and academia shift from the single cloud provider paradigm to cloud federations and alternative models, which orchestrate heterogeneous resources, such as Mobile Edge Computing and Fog Computing.