End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
The NEPHELE Meta-Orchestration Approach for Distributed Applications in the Computing Continuum
SAMOS XXV - 25th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Following the trend for the provision of applications over programmable resources distributed across the computing continuum, in this manuscript, we detail a novel meta-orchestration approach for management of such applications. Two main challenges are considered.
Open Source approach in two metaOS projects
2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Transparency, collaboration, security, and digital sovereignty are the open source values that are also important to many European countries and institutions.
A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection
26th Conference on Innovation in Clouds, Internet and Networks
The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining.