End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

ICOS: An Intelligent MetaOS for the Continuum

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands

The business potential of Smart Contracts

6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.

Importance of cloud continuum service orchestration in industrial environments

Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.

Placing Computational Tasks within Edge-Cloud Continuum: a DRL Delay Minimization Scheme.

Euro-Par 2024 Conference
In the rapidly evolving landscape of IoT-Edge-Cloud continuum (IECC), effective management of computational tasks offloaded from mobile devices to edge nodes is crucial.

Navigating the Dynamic Heterogeneous Computing Sphere: The Role of EdgeHarbor as a Multi-Edge Orchestrator

Euro-Par 2024 Conference
The term ‘Dynamic Heterogeneous Computing Sphere’ is used to describe a computing paradigm that is heterogeneous, volatile and highly dynamic.

Detecting Compromised Structural Integrity - An AI tool for Critical Infrastructure Operators working towards Climate Resilience

Project SUNRISE's blog
"Critical infrastructure operators across Europe must prepare their facilities, equipment, and personnel to operate under more strenuous conditions in a warming climate. 

A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem

IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.

Security and Trust in Open and Disaggregated 6G networks

24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.

Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities

EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.

Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities

EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.

A Framework for Cognitive, Decentralized Container Orchestration

IEEE Access Volume 12
This perspective paper introduces a novel framework for container orchestration called CODECO.

UAV AI Remote Inspection. Unleashing the power of V-LLM?

Project SUNRISE's blog
It is widely known that we are living through a historic moment in the field of artificial intelligence (AI), capturing the attention of the entire world with spectacular results across multiple application fields, especially in text and image generation.

Synthetic Images in People Detection: Balancing Effectiveness and Ethical Imperatives

TEMA project's website
In recent years, the development and refinement of artificial intelligence (AI) technologies have revolutionised various fields, including computer vision.

Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks

IEEE Access Volume 12
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.