Preserving data privacy in Machine Learning pipelines with Federated Learning
The feature extraction capabilities of Machine Learning (ML) models have led to their wide adoption in a large variety of sectors: from anomaly detection for machinery, to user clustering and behavioral prediction, market trends predictions, or the analysis of text, sound, and image data.
A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.
Security and Trust in Open and Disaggregated 6G networks
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.
Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy
The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.
Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.
Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.
Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy
i3-MARKET Series - Part III: The i3-MARKET FOSS Handbook
Systems and Implemented Technologies for Data-Driven Innovation, addressing Data Spaces and Marketplaces Semantic Interoperability Needs
i3-MARKET Series - Part II: Data Economy, Models, Technologies and Solutions
Concepts and Design Innovations addressing the Digital Transformation of Data Spaces and Marketplaces
i3-MARKET Book Series - Part I: A Vision to the future of Data-Driven Economy
A Framework for Cognitive, Decentralized Container Orchestration
This perspective paper introduces a novel framework for container orchestration called CODECO.
UAV AI Remote Inspection. Unleashing the power of V-LLM?
It is widely known that we are living through a historic moment in the field of artificial intelligence (AI), capturing the attention of the entire world with spectacular results across multiple application fields, especially in text and image generation.
Flexible robots for intelligent automation of precision agriculture operations
Artificial intelligence helps coordinate precision agriculture tasks
How does resilience relate to risk
"Risk and resilience are interconnected concepts. In fact, one of our goals in SUNRISE is to integrate resilience metrics with risk metrics.
Leveraging Large Language Models for Financial Predictions
In the world of finance, where every decision can have significant ramifications, the possibility of predicting market movements is invaluable. Traditionally, analysts have relied on a combination of data analysis, market trends, and expert insights to make informed predictions.
Stack and Stick are in Stock
The CROSSCON is a research project that targets developing research ideas into practical techniques and supporting prototypes, and the level of ambition is to validate results in lab conditions that are representative of a complex IoT system (i.e., technology readiness levels TRL 4 and TRL5).
A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection
The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining.
Synthetic Images in People Detection: Balancing Effectiveness and Ethical Imperatives
In recent years, the development and refinement of artificial intelligence (AI) technologies have revolutionised various fields, including computer vision.
Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.
Fostering Agricultural Transformation through AI: An Open-Source AI Architecture Exploiting the MLOps Paradigm
As the global population is expected to reach 10 billion by 2050, the agricultural sector faces the challenge of achieving an increase of 60% in food production without using much more land.
Self-Sovereign Identity: Realising the journey from innovation to market
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.
Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.
A hierarchical AI-based control plane solution for multitechnology deterministic networks.
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.
FAME: Federated Decentralized Trusted Data Marketplace for Embedded Finance
Due to its multivariate and multipurpose use and reuse, data’s worth is dramatically increasing, leading to an era characterized by the generation of data marketplaces towards accessing, selling, sharing, and trading data and data assets.
Mixed Approach for Bike Availability Forecast
A proposal for a predictive analysis model for bike-sharing systems based on a mixed model of statistical and machine-learning approaches.The model assumes a Poisson distribution on bike station arrival and departures.
5G-PPP Software Network Working Group - Network Applications: Opening up 5G and Beyond networks
Network Applications is seen as a full-potential enabler for future vertical industries beyond current deployment. Therefore, it must be considered along with other 6G enabling technologies in the next-generation network architecture.