End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
The business potential of Smart Contracts
6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.
Importance of cloud continuum service orchestration in industrial environments
Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.
Dynamic Threat Intelligence for Improvement of Resilience of Critical Infrastructure During Pandemics
19th Conference on Computer Science and Intelligence Systems (FedCSIS). Belgrade, Serbia
The COVID-19 pandemic is an example of a temporary situation when critical infrastructure (CI) operators had to operate with continuously changing conditions. The role of cyber infrastructure during pandemics, for example for the remote work or access to critical systems, has also changed.
A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem
IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.
Security and Trust in Open and Disaggregated 6G networks
24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.
How does resilience relate to risk
Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.
Stack and Stick are in Stock
CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).
Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks
IEEE Access Volume 12
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.
A hierarchical AI-based control plane solution for multitechnology deterministic networks.
MobiHoc 2023
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.
5G-PPP Software Network Working Group - Network Applications: Opening up 5G and Beyond networks
5G Infrastructure Public Private Partnership (5G PPP)
Network Applications is seen as a full-potential enabler for future vertical industries beyond current deployment. Therefore, it must be considered along with other 6G enabling technologies in the next-generation network architecture.
A Blockchain-based Trust Management Collaborative System for Transport Multi-stakeholder Scenarios
IEEE Journal of Optical Communications and Networking
A trend in future networks (i.e., beyond 5G and 6G) is the increasing virtualization and disaggregation of networks (i.e., Open Radio Access Network, network function virtulization/software-defined networking, or disaggregated optical networks, among others).
A Testbed for a Nearby-Context Aware: Threat Detection and Mitigation System for Connected Vehicles
IEEE / 2023 JNIC Cybersecurity Conference (JNIC)
The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface.
Collaborative Ranking of Results in Pilot Projects for the EU Cybersecurity Competence Community
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
Cybersecurity ecosystem in EU is a hot topic, as it relates to the recent establishment of the EU Cybersecurity Competence Centre (ECCC), the Network of National Coordination Centres (NCCs) and the Cybersecurity Community (CC).
TERME: a cyber-physical resilience toolset for risk assessment
IEEE/ 2023 JNIC Cybersecurity Conference (JNIC)
With the increased digitalization and adoption of cost-effective off-the-shelf components and cyber connectivity, Critical Infrastructures (CI) operators have benefited in many ways, but the attack surface has also become larger.
An approach to train and evaluate cybersecurity skills of participants in cyber ranges based on cyber risk models
There is an urgent need for highly skilled cybersecurity professionals, and at the same time there is an awareness gap and lack of integrated training modules on cybersecurity related aspects on all school levels.