Start Date Event name / material name Dissemination item material type Papers / presentation title Abstract Authors
13 Nov 2019Cybersecurity for Europe 2019
  • Conference contribution
Participation in the panel 4: Good practices in data sharing for incident handlingAbstract
29 Nov 20191ST CYBER SECURITY JOINT PROJECT WORKSHOP
  • Moderation
Certification tools and standardsAbstract
10 Sep 2020Workshop on 5G Security : Current Trends, Challenges and New Enablers
  • Workshop
Organization of Workshop on 5G Security : Current Trends, Challenges and New EnablersAbstract
26 Feb 2020Mobile World Congress - oragnised as virtual event
  • Invited talk
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and BeyondAbstract
01 Jan 2020IEEE Access
  • Journal
Enabling Roaming across Heterogeneous IoT Wireless Networks: LoRaWAN meets 5G Abstract
06 Apr 2020IEEE Wireless Communications and Networking Conference (WCNC'2020)
  • Conference contribution
  • Proceeding
Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN EnvironmentAbstract
01 Jan 2020IEEE Trans. on Wireless Communications
  • Magazine
Physical Layer Authentication for Massive MIMO Systems with Hardware ImpairmentsAbstract
01 Jan 2020IEEE Network Magazine
  • Magazine
AI-driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research DirectionsAbstract
01 Jan 2020IEEE Network Magazine
  • Magazine
ZSM Security: Threat Surface and Best PracticesAbstract
17 Mar 20206G Wireless Summit - organised as virtual event
  • Conference contribution
  • Proceeding
The Role of Blockchain in 6G: Challenges, Opportunities and Research DirectionsAbstract
19 Oct 2020AIBlock - 2nd ACNS Workshop on Application Intelligence and Blockchain Security (In conjunction with ACNS 2020)
  • Conference contribution
  • Presentation
  • Proceeding
Dynamic Group Key Agreement for Resource-Constrained Devices using BlockchainsAbstract
18 Jun 2020ETSI Security Week Webinar/Security Challenges in 5G Multi-access Edge Computing
  • Presentation
  • Webinar
Security Challenges in 5G Multi-access Edge Computing Abstract
08 Mar 20205th edition of the European 5G Annual journal
  • Magazine
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond Abstract
19 Jul 202022nd International Conference on Transparent Optical Networks (ICTON 2020)
  • Conference contribution
  • Invited talk
Transport Network Slices with Security Service Level AgreementsAbstract
10 Sep 2020IEEE 5GWF20 - Workshop on 5G Security: Current Trends, Challenges and New Enablers
  • Conference contribution
  • Proceeding
Peer-to-Peer NFV Service Platform for End-to-End Network Slice Orchestration Across Multiple NFVI DomainsAbstract
01 Jul 2020IEEE Network Magazine
  • Journal
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?Abstract
10 Sep 2020IEEE 5GWF20 - Workshop on 5G Security: Current Trends, Challenges and New Enablers
  • Conference contribution
  • Proceeding
Lightweight and Space-efficient Vehicle Authentication based on Cuckoo FilterAbstract
17 Jul 2020Security orchestration and enforcement in NFV/SDN-aware UAV deployments
  • Journal
Security orchestration and enforcement in NFV/SDN-aware UAV deploymentsAbstract
27 Jun 2020Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems
  • Journal
Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT SystemsAbstract
25 Aug 2020ARES2 2020 Network Security Workshop
  • Workshop
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond NetworksAbstract
10 Sep 2020Workshop on 5G Security: Current Trends, Challenges and New Enablers
  • Workshop
Liability-Aware Security Management for 5GAbstract
25 Aug 2020IEICE Transactions on Communications
  • Journal
End-to-end SDN/NFV orchestration of multi-domain transport networks and distributed computing infrastructure for beyond-5G servicesAbstract
06 Dec 2020European Conference On Optical Communications
  • Conference contribution
Managing Network Slicing Resources Using Blockchain in a Multi-Domain Software Defined Optical Network ScenarioAbstract
18 Aug 2020IEEE Engineering Management Review
  • Journal
The Fight against the COVID-19 Pandemic with 5G TechnologiesAbstract
13 Sep 2020IEEE Access
  • Journal
Safeguarding MTC at the Physical Layer: Potentials and ChallengesAbstract
07 Dec 2020IEEE GlobeCom 2020
  • Proceeding
Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoTAbstract
14 Sep 2020IEEE Internet of Things Journal
  • Journal
Performance Analysis of Local 5G Operator Architectures for Industrial InternetAbstract
10 Sep 2020IEEE 3rd 5G World Forum (5GWF)
  • Conference contribution
  • Proceeding
Enforcing GDPR regulation to vehicular 5G communications using edge virtual counterpartsAbstract
25 Aug 2020Workshop on 5G Networks Security (5G-NS 2020) - 15th International Conference on Availability, Reliability and Security
  • Conference contribution
  • Proceeding
INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond NetworksAbstract
29 Sep 2020Elsevier Journal of Network and Computer Applications
  • Journal
Survey on Blockchain based Smart Contracts: Applications, Opportunities and ChallengesAbstract
10 Nov 2020IEEE Conference on Network Function Virtualization and Software Defined Networks
  • Conference contribution
  • Proceeding
Applying Security Service Level Agreements in V2X Network SlicesAbstract
06 Dec 2020European Conference On Optical Communications
  • Tutorial
Controlling and Monitoring Optical Network Equipment in Optical SDN NetworksAbstract
11 Sep 2020NGIoT Workshop on "IoT and Edge Computing: Future directions for Europe"
  • Conference contribution
  • Workshop
IoT, Edge computing and AI technologies and its future impact on the next generation of IoT nodesAbstract
03 Jul 20202nd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures (SecSoft 2020)
  • Keynote
Dynamic Security Management on IoT through Network SoftwarizationAbstract
28 Oct 2020IEEE TEMS R9 - Foro Industrial Latinoamericano virtualization for IoT in 5G
  • Invited talk
Security and virtualization in IoT and 5GAbstract
28 Oct 2020The 6th International Conference on Mobile, Secure and Programmable Networking (MSPN2020)
  • Keynote
What Happens Next? Going Beyond Security via Liability in Future NetworksAbstract
14 Oct 2020Webinar "5G Experimentation Facilities and Vertical Trials: Current Status and Future Perspectives"
  • Presentation
Intelligent Security and Pervasive Trust for 5G and BeyondAbstract
02 Oct 2020IEEE Communications Society Europe, Middle East and Africa Region
  • Invited talk
Get Smart – The Challenges in Data-Driven Network ManagementAbstract
12 Oct 2020 Layer123 World Congress 2020
  • Keynote
Data aggregation and network digital twinsAbstract
24 Nov 2020ETSI Research - Boosting the Impact of Research & Innovation through Standardization
  • Invited talk
How research projects impact security standards: the example of INSPIRE-5GplusAbstract
16 Nov 2020ICCC 2020
  • Conference contribution
  • Presentation
Trust Model for Verticals Over 5G Abstract
28 Oct 2020The 6th International Conference on Mobile, Secure and Programmable Networking (MSPN2020)
  • Keynote
"Cyber Threat Intelligence: the fuel for secure networking"Abstract
18 Nov 2020The 2020 IEEE 92nd Vehicular Technology Conference: VTC2020-Fall
  • Conference contribution
  • Tutorial
IEEE VTC2020-Fall Tutorial on Aerial Communications and Networks (joint tutorial - Dr. Gür will give the security part of the tutorial.)Abstract
09 Nov 2020IEEE CloudNet 2020 - IEEE International Conference on Cloud Networking
  • Invited talk
Some Musings on the Connection of Cloud Networking, the Edge and 5GAbstract
22 Oct 2020 Intelligent Security Architecture for 5G and Beyond Networks November
  • White paper
White Paper: Intelligent Security Architecture for 5G and Beyond Networks NovemberAbstract
29 Nov 2020IEEE Access
  • Journal
Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutionsAbstract
06 Jun 2021Optical Networking and Communication Conference (OFC'21)
  • Conference contribution
  • Proceeding
End-to-End Network Slice Stitching using Blockchain-based Peer-to-Peer Network Slice Managers and Transport SDN ControllersAbstract
28 Jun 2021IEEE 7th International Conference on Network Softwarization (NetSoft)
  • Conference contribution
  • Proceeding
How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?Abstract
07 Feb 2021IEEE Access/Verticals in 5G MEC - use cases and security challenges
  • Journal
Verticals in 5G MEC-Use Cases and Security ChallengesAbstract
23 Dec 2020Paper on IEEE Transactions on Mobile Computing
  • Journal
QoS and Resource-aware Security Orchestration and Life Cycle ManagementAbstract
01 Jan 2021Paper on Journal of Network and Computer Applications
  • Journal
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial IntelligenceAbstract
22 Mar 2021IEEE/OSA JOCN
  • Journal
Experimental Evaluation of Control and Monitoring Protocols for Optical SDN Networks and Equipment [Invited Tutorial]Abstract
06 Apr 2021Paper on Journal of ICT Standardization
  • Journal
A model-based approach to multi-domain monitoring data aggregationAbstract
08 Jun 2021EuCNC and 6G Summit 2021
  • Poster session
AI-Enabled Slice Protection Exploiting Moving Target Defense in 6G NetworksAbstract
08 Jun 2021EuCNC & 6G Summit 2021
  • Conference contribution
  • Proceeding
6G Security Challenges and Potential SolutionsAbstract
08 Jun 2021EuCNC & 6G Summit 2021
  • Conference contribution
  • Proceeding
AI and 6G Security: Opportunities and ChallengesAbstract
08 Jun 2021EuCNC & 6G Summit 2021
  • Poster
SFSBroker: Secure and Federated Network Slice Broker for 5G and BeyondAbstract
13 Apr 2021LAYER123 EUROPE: 360° Network Automation Congress
  • Keynote
Data flow aggregation for smarter network securityAbstract
03 Mar 2021The 1st SLICES workshop - Next Generation ICT Research Infrastructures
  • Workshop
Twinning Networks: On the Use and Challenges of Network Digital TwinsAbstract
07 Sep 2021IEEE International Mediterranean Conference on Communications and Networking 2021
  • Conference contribution
  • Proceeding
Reinforcement Learning-based Misbehaviour Detection in V2X ScenariosAbstract
10 May 2021IEEE Open Journal of the Communications Society
  • Journal
The Roadmap to 6G Security and PrivacyAbstract
13 Sep 20212021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
  • Conference contribution
  • Proceeding
How DoS Attacks Can Be Mounted on Network Slice Broker and Can They Be Mitigated Using Blockchain?Abstract
01 Jul 20215G 5G verticals : from Theory to Practice and Beyond, IEEE Communications Magazine
  • Magazine
A KPI-enabled NFV MANO Architecture for Network Slicing with QoSAbstract
29 Oct 20212021 International Conference on Networking and Network Applications (NaNA 2021)
  • Conference contribution
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV SystemsAbstract
01 Jan 2022IET Computers & Digital Techniques
  • Journal
Who is wearing me? TinyDL-based user recognition in constrained personal devicesAbstract
16 May 2022IEEE International Conference on Communications 2022 (IEEE ICC '22)
  • Conference contribution
  • Proceeding
Reinforcement Learning Based Misbehaviour Detection in Vehicular NetworksAbstract
01 Jul 2022SecSoft Cyber-Security Workshop 2022
  • Workshop
4th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures (SecSoft)Abstract
13 Apr 2022White Paper on Evolution of 5G Cyber Threats and Security Solutions
  • White paper
Evolution of 5G Cyber Threats and Security SolutionsAbstract
27 Jun 2022IEEE International Conference on Network Softwarization 2022 (IEEE NetSoft 22)
  • Conference contribution
  • Proceeding
Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection PerformanceAbstract
30 May 2022International Wireless Communications and Mobile Computing Conference (IWCMC 2022)
  • Conference contribution
Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVsAbstract
01 Jun 2022IEEE Network Magazine
  • Magazine
AI-based Autonomic & Scalable Security Management Architecture for Secure Network Slicing in B5GAbstract
01 Jul 20224rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures (SecSoft 2022)
  • Conference contribution
  • Proceeding
Model-Driven Network Monitoring Using NetFlow Applied to Threat DetectionAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022
  • Conference contribution
  • Proceeding
Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical ScenariosAbstract
01 Sep 2022ACM digital journal Digital Threats: Research and Practice (DTRAP)
  • Journal
The Role of Machine Learning in CybersecurityAbstract
19 Jun 2022The 2022 IEEE 95th Vehicular Technology Conference: VTC2022-Spring
  • Tutorial
AI/ML-based Solutions for Automating Security in Future 6G NetworksAbstract
19 Jul 2022Management and Enforcement of Secured E2E Network Slices across Transport Domains
  • Journal
Management and Enforcement of Secured E2E Network Slices across Transport DomainsAbstract
13 Oct 20212021 IEEE 4th 5G World Forum (5GWF)
  • Proceeding
Enhancing trust and liability assisted mechanisms for ZSM 5G architecturesAbstract
21 Aug 20229th International Conference on Future Internet of Things and Cloud (FiCloud 2022)
  • Conference contribution
  • Presentation
  • Proceeding
Security Constraints for Placement of Latency Sensitive 5G MEC ApplicationsAbstract
01 Aug 2022IEEE Internet of Things Journal
  • Journal
Deep Ensemble Learning based GPS Spoofing Detection for Cellular-Connected UAVsAbstract
04 Dec 2022IEEE Global Communications Conference 2022 (Globecom '22)
  • Conference contribution
Misbehavior Detection in Vehicular Networks: An Ensemble Learning ApproachAbstract
12 Oct 20222022 IEEE 5th Future Networks World Forum (FNWF22) - S6. Symposium on Security for 5G and Future Networks
  • Conference contribution
  • Proceeding
ETSI ZSM Driven Security Management in Future NetworksAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022)
  • Workshop
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022) collocated with 1st International Conference on 6G Networking (6GNet 2022)Abstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022)
  • Conference contribution
The Impact of Manufacturer Usage Description (MUD) on IoT SecurityAbstract
04 Dec 2022IEEE Global Communications Conference 2022 (Globecom '22)
  • Conference contribution
A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined NetworksAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022 (WALT5G+ 2022)
  • Workshop
eSIM adoption : Essential challenges on Responsibilities RepartitionAbstract
08 Jul 20222nd Workshop on Accountability, Liability and Trust for 5G and Beyond 2022
  • Workshop
Modeling the accountability and liability aspects of a 5G multi-domain on-demand security services: an unexpected journeyAbstract
27 Jun 2022NetSoft 2022
  • Presentation
  • Proceeding
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuumAbstract
31 Oct 2022 18th International Conference on Network and Service Management - CSNM 2022
  • Conference contribution
Graph Based Liability Analysis for the Microservice ArchitectureAbstract
05 Oct 2022ETSI Security Conference
  • Presentation
INSPIRE-5Gplus: Vision onSecurityBeyond 5GAbstract
23 Aug 20225th International Workshop on Emerging Network Security (ENS 2022)
  • Conference contribution
  • Proceeding
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End ServiceAbstract
18 Oct 2022Electronics / Security Context migration in MEC: challenges and use cases
  • Journal
Security Context migration in MEC: challenges and use casesAbstract
02 Nov 2022White Paper: Intelligent Security Architecture for 5G and Beyond Networks v2.0
  • White paper
Intelligent Security Architecture for 5G and Beyond Networks v2.0Abstract