End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

The NEPHELE Meta-Orchestration Approach for Distributed Applications in the Computing Continuum

SAMOS XXV - 25th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Following the trend for the provision of applications over programmable resources distributed across the computing continuum, in this manuscript, we detail a novel meta-orchestration approach for management of such applications. Two main challenges are considered.

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Transparency, collaboration, security, and digital sovereignty are the open source values that are also important to many European countries and institutions.

Sources, levels, and determinants of indoor air pollutants in Europe: A systematic review

Science of The Total Environment Volume 964 - Elsevier
Clean air is a requirement for life, and the quality of indoor air is a health determinant since people spend most of their daily time indoors.

The business potential of Smart Contracts

6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.

Importance of cloud continuum service orchestration in industrial environments

Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.

Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics

19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.

Assessing computational fluid dynamics on GPU using portable languages

35th Parallel CFD International Conference
Accelerators are essential for achieving optimal performance and energy efficiency in computing. However, market segmentation often leads to language lock-ins, limiting flexibility across accelerators and increasing development costs.

A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem

IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.

Security and Trust in Open and Disaggregated 6G networks

24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.

Systems and Implemented Technologies for Data-Driven Innovation, addressing Data Spaces and Marketplaces Semantic Interoperability Needs

River Publishers
i3-MARKET Series - Part II: Data Economy, Models, Technologies and Solutions

Concepts and Design Innovations addressing the Digital Transformation of Data Spaces and Marketplaces

River Publishers
i3-MARKET Book Series - Part I: A Vision to the future of Data-Driven Economy

How does resilience relate to risk

Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.

Stack and Stick are in Stock

CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).

Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks

IEEE Access Volume 12
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.