A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem

IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.

Security and Trust in Open and Disaggregated 6G networks

24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.

Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities

EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.

Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities

EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.

Concepts and Design Innovations addressing the Digital Transformation of Data Spaces and Marketplaces

River Publishers
i3-MARKET Book Series - Part I: A Vision to the future of Data-Driven Economy

Systems and Implemented Technologies for Data-Driven Innovation, addressing Data Spaces and Marketplaces Semantic Interoperability Needs

River Publishers
i3-MARKET Series - Part II: Data Economy, Models, Technologies and Solutions

A Framework for Cognitive, Decentralized Container Orchestration

IEEE Access Volume 12
This perspective paper introduces a novel framework for container orchestration called CODECO.

UAV AI Remote Inspection. Unleashing the power of V-LLM?

Project SUNRISE's blog
It is widely known that we are living through a historic moment in the field of artificial intelligence (AI), capturing the attention of the entire world with spectacular results across multiple application fields, especially in text and image generation.

Flexible robots for intelligent automation of precision agriculture operations

CORDIS - EU Research Results
Artificial intelligence helps coordinate precision agriculture tasks

How does resilience relate to risk

Project SUNRISE's blog
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.

Leveraging Large Language Models for Financial Predictions

FAME project blog
In the world of finance, where every decision can have significant ramifications, the possibility of predicting market movements is invaluable. Traditionally, analysts have relied on a combination of data analysis, market trends, and expert insights to make informed predictions.

Stack and Stick are in Stock

CROSSCON website (blog)
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).

A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection

26th Conference on Innovation in Clouds, Internet and Networks
The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining.

Synthetic Images in People Detection: Balancing Effectiveness and Ethical Imperatives

TEMA project's website
In recent years, the development and refinement of artificial intelligence (AI) technologies have revolutionised various fields, including computer vision.

Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks

IEEE Access Volume 12
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.