End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
A case study on FAME Marketplace for unlocking customer behavioral insights
FAME project - blog
This blogpost explains how the FAME Marketplace offers pre-built analytical tools for effective customer segmentation, and explore two use cases: improving financial recommendations and developing loyalty programs for parking in Athens.
C4 Model: A Research Guide for Designing Software Architectures
8th International Conference on Software and System Engineering (ICoSSE 2025), Nice, France
Given nowadays increasing complexity of software systems, their architectural design prior to their actual implementation becomes quite complicated.
Intrusion Detection for IoT-based Context and Networks
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 8 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
Unlocking efficiency with Marketplace Assets: a case study on FAME Marketplace
FAME project - blog
In today’s ever-changing technological landscape, companies are constantly looking for innovative ways to increase efficiency and minimize costs, and even more nowadays with the advent of artificial intelligence and large language models.
The business potential of Smart Contracts
6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.
Importance of cloud continuum service orchestration in industrial environments
Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.
Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics
19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.
Preserving data privacy in Machine Learning pipelines with Federated Learning
FAME's project blog
The feature extraction capabilities of Machine Learning (ML) models have led to their wide adoption in a large variety of sectors: from anomaly detection for machinery, to user clustering and behavioral prediction, market trends predictions, or the analysis of text, sound, and image data.
A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem
IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.
Security and Trust in Open and Disaggregated 6G networks
24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.
Flexible robots for intelligent automation of precision agriculture operations
CORDIS - EU Research Results
Artificial intelligence helps coordinate precision agriculture tasks
How does resilience relate to risk
Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.
Leveraging Large Language Models for Financial Predictions
FAME project blog
In the world of finance, where every decision can have significant ramifications, the possibility of predicting market movements is invaluable. Traditionally, analysts have relied on a combination of data analysis, market trends, and expert insights to make informed predictions.
Stack and Stick are in Stock
CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).
Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks
IEEE Access Volume 12
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.