Start Date Event name / material name Dissemination item material type Papers / presentation title Abstract Authors
13 Nov 2019Cybersecurity for Europe 2019
  • Conference contribution
Participation in the panel 4: Good practices in data sharing for incident handlingAbstract
29 Nov 20191ST CYBER SECURITY JOINT PROJECT WORKSHOP
  • Moderation
Certification tools and standardsAbstract
10 Sep 2020Workshop on 5G Security : Current Trends, Challenges and New Enablers
  • Workshop
Organization of Workshop on 5G Security : Current Trends, Challenges and New EnablersAbstract
26 Feb 2020Mobile World Congress - oragnised as virtual event
  • Invited talk
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and BeyondAbstract
01 Jan 2020IEEE Access
  • Journal
Enabling Roaming across Heterogeneous IoT Wireless Networks: LoRaWAN meets 5G Abstract
06 Apr 2020IEEE Wireless Communications and Networking Conference (WCNC'2020)
  • Conference contribution
  • Proceeding
Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN EnvironmentAbstract
01 Jan 2020IEEE Trans. on Wireless Communications
  • Magazine
Physical Layer Authentication for Massive MIMO Systems with Hardware ImpairmentsAbstract
01 Jan 2020IEEE Network Magazine
  • Magazine
AI-driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research DirectionsAbstract
01 Jan 2020IEEE Network Magazine
  • Magazine
ZSM Security: Threat Surface and Best PracticesAbstract
17 Mar 20206G Wireless Summit - organised as virtual event
  • Conference contribution
  • Proceeding
The Role of Blockchain in 6G: Challenges, Opportunities and Research DirectionsAbstract
19 Oct 2020AIBlock - 2nd ACNS Workshop on Application Intelligence and Blockchain Security (In conjunction with ACNS 2020)
  • Conference contribution
  • Presentation
  • Proceeding
Dynamic Group Key Agreement for Resource-Constrained Devices using BlockchainsAbstract
18 Jun 2020ETSI Security Week Webinar/Security Challenges in 5G Multi-access Edge Computing
  • Presentation
  • Webinar
Security Challenges in 5G Multi-access Edge Computing Abstract
08 Mar 20205th edition of the European 5G Annual journal
  • Magazine
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond Abstract
19 Jul 202022nd International Conference on Transparent Optical Networks (ICTON 2020)
  • Conference contribution
  • Invited talk
Transport Network Slices with Security Service Level AgreementsAbstract
10 Sep 2020IEEE 5GWF20 - Workshop on 5G Security: Current Trends, Challenges and New Enablers
  • Conference contribution
  • Proceeding
Peer-to-Peer NFV Service Platform for End-to-End Network Slice Orchestration Across Multiple NFVI DomainsAbstract
01 Jul 2020IEEE Network Magazine
  • Journal
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?Abstract
10 Sep 2020IEEE 5GWF20 - Workshop on 5G Security: Current Trends, Challenges and New Enablers
  • Conference contribution
  • Proceeding
Lightweight and Space-efficient Vehicle Authentication based on Cuckoo FilterAbstract
17 Jul 2020Security orchestration and enforcement in NFV/SDN-aware UAV deployments
  • Journal
Security orchestration and enforcement in NFV/SDN-aware UAV deploymentsAbstract
27 Jun 2020Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems
  • Journal
Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT SystemsAbstract
25 Aug 2020ARES2 2020 Network Security Workshop
  • Workshop
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond NetworksAbstract
10 Sep 2020Workshop on 5G Security: Current Trends, Challenges and New Enablers
  • Workshop
Liability-Aware Security Management for 5GAbstract
25 Aug 2020IEICE Transactions on Communications
  • Journal
End-to-end SDN/NFV orchestration of multi-domain transport networks and distributed computing infrastructure for beyond-5G servicesAbstract
06 Dec 2020European Conference On Optical Communications
  • Conference contribution
Managing Network Slicing Resources Using Blockchain in a Multi-Domain Software Defined Optical Network ScenarioAbstract
18 Aug 2020IEEE Engineering Management Review
  • Journal
The Fight against the COVID-19 Pandemic with 5G TechnologiesAbstract
13 Sep 2020IEEE Access
  • Journal
Safeguarding MTC at the Physical Layer: Potentials and ChallengesAbstract
07 Dec 2020IEEE GlobeCom 2020
  • Proceeding
Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoTAbstract
14 Sep 2020IEEE Internet of Things Journal
  • Journal
Performance Analysis of Local 5G Operator Architectures for Industrial InternetAbstract
10 Sep 2020IEEE 3rd 5G World Forum (5GWF)
  • Conference contribution
  • Proceeding
Enforcing GDPR regulation to vehicular 5G communications using edge virtual counterpartsAbstract
25 Aug 2020Workshop on 5G Networks Security (5G-NS 2020) - 15th International Conference on Availability, Reliability and Security
  • Conference contribution
  • Proceeding
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond NetworksAbstract
29 Sep 2020Elsevier Journal of Network and Computer Applications
  • Journal
Survey on Blockchain based Smart Contracts: Applications, Opportunities and ChallengesAbstract
10 Nov 2020IEEE Conference on Network Function Virtualization and Software Defined Networks
  • Conference contribution
  • Proceeding
Applying Security Service Level Agreements in V2X Network SlicesAbstract
06 Dec 2020European Conference On Optical Communications
  • Tutorial
Controlling and Monitoring Optical Network Equipment in Optical SDN NetworksAbstract
11 Sep 2020NGIoT Workshop on "IoT and Edge Computing: Future directions for Europe"
  • Conference contribution
  • Workshop
IoT, Edge computing and AI technologies and its future impact on the next generation of IoT nodesAbstract
03 Jul 20202nd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures (SecSoft 2020)
  • Keynote
Dynamic Security Management on IoT through Network SoftwarizationAbstract
28 Oct 2020IEEE TEMS R9 - Foro Industrial Latinoamericano virtualization for IoT in 5G
  • Invited talk
Security and virtualization in IoT and 5GAbstract
28 Oct 2020The 6th International Conference on Mobile, Secure and Programmable Networking (MSPN2020)
  • Keynote
What Happens Next? Going Beyond Security via Liability in Future NetworksAbstract
14 Oct 2020Webinar "5G Experimentation Facilities and Vertical Trials: Current Status and Future Perspectives"
  • Presentation
Intelligent Security and Pervasive Trust for 5G and BeyondAbstract
02 Oct 2020IEEE Communications Society Europe, Middle East and Africa Region
  • Invited talk
Get Smart – The Challenges in Data-Driven Network ManagementAbstract
12 Oct 2020 Layer123 World Congress 2020
  • Keynote
Data aggregation and network digital twinsAbstract
24 Nov 2020ETSI Research - Boosting the Impact of Research & Innovation through Standardization
  • Invited talk
How research projects impact security standards: the example of INSPIRE-5GplusAbstract
16 Nov 2020ICCC 2020
  • Conference contribution
  • Presentation
Trust Model for Verticals Over 5G Abstract
28 Oct 2020The 6th International Conference on Mobile, Secure and Programmable Networking (MSPN2020)
  • Keynote
"Cyber Threat Intelligence: the fuel for secure networking"Abstract
18 Nov 2020The 2020 IEEE 92nd Vehicular Technology Conference: VTC2020-Fall
  • Conference contribution
  • Tutorial
IEEE VTC2020-Fall Tutorial on Aerial Communications and Networks (joint tutorial - Dr. Gür will give the security part of the tutorial.)Abstract
09 Nov 2020IEEE CloudNet 2020 - IEEE International Conference on Cloud Networking
  • Invited talk
Some Musings on the Connection of Cloud Networking, the Edge and 5GAbstract
22 Oct 2020 Intelligent Security Architecture for 5G and Beyond Networks November
  • White paper
White Paper: Intelligent Security Architecture for 5G and Beyond Networks NovemberAbstract
29 Nov 2020IEEE Access
  • Journal
Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutionsAbstract
06 Jun 2021Optical Networking and Communication Conference (OFC'21)
  • Conference contribution
  • Proceeding
End-to-End Network Slice Stitching using Blockchain-based Peer-to-Peer Network Slice Managers and Transport SDN ControllersAbstract
28 Jun 2021IEEE 7th International Conference on Network Softwarization (NetSoft)
  • Conference contribution
  • Proceeding
How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?Abstract
07 Feb 2021IEEE Access/Verticals in 5G MEC - use cases and security challenges
  • Journal
Verticals in 5G MEC-Use Cases and Security ChallengesAbstract
23 Dec 2020Paper on IEEE Transactions on Mobile Computing
  • Journal
QoS and Resource-aware Security Orchestration and Life Cycle ManagementAbstract
01 Jan 2021Paper on Journal of Network and Computer Applications
  • Journal
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial IntelligenceAbstract
22 Mar 2021IEEE/OSA JOCN
  • Journal
Experimental Evaluation of Control and Monitoring Protocols for Optical SDN Networks and Equipment [Invited Tutorial]Abstract
06 Apr 2021Paper on Journal of ICT Standardization
  • Journal
A model-based approach to multi-domain monitoring data aggregationAbstract
08 Jun 2021EuCNC and 6G Summit 2021
  • Poster session
AI-Enabled Slice Protection Exploiting Moving Target Defense in 6G NetworksAbstract
08 Jun 2021EuCNC & 6G Summit 2021
  • Conference contribution
  • Proceeding
6G Security Challenges and Potential SolutionsAbstract
08 Jun 2021EuCNC & 6G Summit 2021
  • Conference contribution
  • Proceeding
AI and 6G Security: Opportunities and ChallengesAbstract
08 Jun 2021EuCNC & 6G Summit 2021
  • Poster
SFSBroker: Secure and Federated Network Slice Broker for 5G and BeyondAbstract
13 Apr 2021LAYER123 EUROPE: 360° Network Automation Congress
  • Keynote
Data flow aggregation for smarter network securityAbstract
03 Mar 2021The 1st SLICES workshop - Next Generation ICT Research Infrastructures
  • Workshop
Twinning Networks: On the Use and Challenges of Network Digital TwinsAbstract
07 Sep 2021IEEE International Mediterranean Conference on Communications and Networking 2021
  • Conference contribution
  • Proceeding
Reinforcement Learning-based Misbehaviour Detection in V2X ScenariosAbstract
10 May 2021IEEE Open Journal of the Communications Society
  • Journal
The Roadmap to 6G Security and PrivacyAbstract
13 Sep 20212021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
  • Conference contribution
  • Proceeding
How DoS Attacks Can Be Mounted on Network Slice Broker and Can They Be Mitigated Using Blockchain?Abstract
01 Jul 20215G 5G verticals : from Theory to Practice and Beyond, IEEE Communications Magazine
  • Magazine
A KPI-enabled NFV MANO Architecture for Network Slicing with QoSAbstract
29 Oct 20212021 International Conference on Networking and Network Applications (NaNA 2021)
  • Conference contribution
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV SystemsAbstract
01 Jan 2022IET Computers & Digital Techniques
  • Journal
Who is wearing me? TinyDL-based user recognition in constrained personal devicesAbstract
16 May 2022IEEE International Conference on Communications 2022 (IEEE ICC '22)
  • Conference contribution
  • Proceeding
Reinforcement Learning Based Misbehaviour Detection in Vehicular NetworksAbstract
01 Jul 2022SecSoft Cyber-Security Workshop 2022
  • Workshop
4th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures (SecSoft)Abstract
13 Apr 2022White Paper on Evolution of 5G Cyber Threats and Security Solutions
  • White paper
Evolution of 5G Cyber Threats and Security SolutionsAbstract
27 Jun 2022IEEE International Conference on Network Softwarization 2022 (IEEE NetSoft 22)
  • Conference contribution
  • Proceeding
Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection PerformanceAbstract
30 May 2022International Wireless Communications and Mobile Computing Conference (IWCMC 2022)
  • Conference contribution
Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVsAbstract
01 Jun 2022IEEE Network Magazine
  • Magazine
AI-based Autonomic & Scalable Security Management Architecture for Secure Network Slicing in B5GAbstract
01 Jul 20224rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures (SecSoft 2022)
  • Conference contribution
  • Proceeding
Model-Driven Network Monitoring Using NetFlow Applied to Threat DetectionAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022
  • Conference contribution
  • Proceeding
Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical ScenariosAbstract
01 Sep 2022ACM digital journal Digital Threats: Research and Practice (DTRAP)
  • Journal
The Role of Machine Learning in CybersecurityAbstract
19 Jun 2022The 2022 IEEE 95th Vehicular Technology Conference: VTC2022-Spring
  • Tutorial
AI/ML-based Solutions for Automating Security in Future 6G NetworksAbstract
19 Jul 2022Management and Enforcement of Secured E2E Network Slices across Transport Domains
  • Journal
Management and Enforcement of Secured E2E Network Slices across Transport DomainsAbstract
13 Oct 20212021 IEEE 4th 5G World Forum (5GWF)
  • Proceeding
Enhancing trust and liability assisted mechanisms for ZSM 5G architecturesAbstract
21 Aug 20229th International Conference on Future Internet of Things and Cloud (FiCloud 2022)
  • Conference contribution
  • Presentation
  • Proceeding
Security Constraints for Placement of Latency Sensitive 5G MEC ApplicationsAbstract
01 Aug 2022IEEE Internet of Things Journal
  • Journal
Deep Ensemble Learning based GPS Spoofing Detection for Cellular-Connected UAVsAbstract
04 Dec 2022IEEE Global Communications Conference 2022 (Globecom '22)
  • Conference contribution
Misbehavior Detection in Vehicular Networks: An Ensemble Learning ApproachAbstract
12 Oct 20222022 IEEE 5th Future Networks World Forum (FNWF22) - S6. Symposium on Security for 5G and Future Networks
  • Conference contribution
  • Proceeding
ETSI ZSM Driven Security Management in Future NetworksAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022)
  • Workshop
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022) collocated with 1st International Conference on 6G Networking (6GNet 2022)Abstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022)
  • Conference contribution
The Impact of Manufacturer Usage Description (MUD) on IoT SecurityAbstract
04 Dec 2022IEEE Global Communications Conference 2022 (Globecom '22)
  • Conference contribution
A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined NetworksAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022)
  • Workshop
eSIM adoption : Essential challenges on Responsibilities RepartitionAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022
  • Workshop
Modeling the accountability and liability aspects of a 5G multi-domain on-demand security services: an unexpected journeyAbstract
27 Jun 2022NetSoft 2022
  • Presentation
  • Proceeding
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuumAbstract
31 Oct 2022 18th International Conference on Network and Service Management - CSNM 2022
  • Conference contribution
Graph Based Liability Analysis for the Microservice ArchitectureAbstract
05 Oct 2022ETSI Security Conference
  • Presentation
INSPIRE-5Gplus: Vision onSecurityBeyond 5GAbstract
23 Aug 20225th International Workshop on Emerging Network Security (ENS 2022)
  • Conference contribution
  • Proceeding
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End ServiceAbstract
18 Oct 2022Electronics / Security Context migration in MEC: challenges and use cases
  • Journal
Security Context migration in MEC: challenges and use casesAbstract
02 Nov 2022White Paper: Intelligent Security Architecture for 5G and Beyond Networks v2.0
  • White paper
Intelligent Security Architecture for 5G and Beyond Networks v2.0Abstract
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt