Skip to main content
All Posts By

Anna Marton, Safepay Systems

Gelenbe E, Abdelrahman O. 2025. Signalling Storms and Taylor’s Law. Way to 6G Workshop @ MASCOTS 2025. Publications

Gelenbe E, Abdelrahman O. 2025. Signalling Storms and Taylor’s Law. Way to 6G Workshop @ MASCOTS 2025.

Conference: Way to 6G Workshop co-located with the IEEE Computer Society 33rd International Symposium on the Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2025), 21-23. October 2025, Sorbonne University, Paris, FR Authors: Gelenbe E, Abdelrahman O. Abstract: Signalling storms have occurred in several generations of mobile networks…
Bergquist J, Gelenbe E, Nasereddin M, Sigman K. 2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation. Publications

Bergquist J, Gelenbe E, Nasereddin M, Sigman K. 2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation.

Journal: Performance Evaluation, Volume 170,  November 2025, 102512 Authors: Bergquist J, Gelenbe E, Nasereddin M, Sigman K. Abstract: The Massive Access Problem arises due to devices that forward packets simultaneously to servers in rapid succession, or by malevolent software in devices that flood network nodes with high-intensity traffic. To protect…
Deliverable D6.1 Integrated IoT supply chain architecture Deliverables

Deliverable D6.1 Integrated IoT supply chain architecture

D6.1 is a demonstrator, it is the implemented DOSS architecture. The DOSS modules have been prepared, and their communication interfaces have been implemented. They are ready for thorough integration and security testing and for being validated by the three pilots. This document complements the DOSS integrated architecture demonstrator with introducing…
Why the Cyber Resilience Act (CRA) matters for IoT manufacturers Insights

Why the Cyber Resilience Act (CRA) matters for IoT manufacturers

Dinesh Sharma, asvin GmbH The Importance of  the CRA The EU’s Cyber Resilience Act (CRA) sets strict cybersecurity requirements for all connected products, including IoT devices. For manufacturers, CRA compliance is essential to ensure secure, trustworthy, and market-ready products. From 2027 onward, only devices meeting these standards will be allowed…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. LocVul: Line-Level Vulnerability Localization based on a Sequence-to-Sequence Approach. Information and Software Technology 2025 Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. LocVul: Line-Level Vulnerability Localization based on a Sequence-to-Sequence Approach. Information and Software Technology 2025

Journal: Information and Software Technology, Volume 19, January 2026 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Context: The development of secure software systems depends on early and accurate vulnerability identification. Manual inspection is a time-consuming process that requires specialized knowledge. Therefore, as software complexity grows,…
36th Annual Conference of Academia Europaea “Building Bridges 2025” News

36th Annual Conference of Academia Europaea “Building Bridges 2025”

On 15. October 2025, Professor Erol Gelenbe, Institute of Theoretical and Applied Informatics, Polish Academy of Sciences - IITiS PAN, presented his research in the H2020 IoTAC and Horizon Europe DOSS, during the 𝟑𝟔𝐭𝐡 𝐀𝐧𝐧𝐮𝐚𝐥 𝐂𝐨𝐧𝐟𝐞𝐫𝐞𝐧𝐜𝐞 𝐨𝐟 𝐀𝐜𝐚𝐝𝐞𝐦𝐢𝐚 𝐄𝐮𝐫𝐨𝐩𝐚𝐞𝐚 “𝐁𝐮𝐢𝐥𝐝𝐢𝐧𝐠 𝐁𝐫𝐢𝐝𝐠𝐞𝐬 𝟐𝟎𝟐𝟓” at the Academia Europaea Barcelona Knowledge HUB. In…
October is Cybersecurity Awareness Month News

October is Cybersecurity Awareness Month

𝐎𝐜𝐭𝐨𝐛𝐞𝐫 𝐢𝐬 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 — 𝐚𝐭 𝐃𝐎𝐒𝐒, 𝐰𝐞 𝐚𝐫𝐞 𝐰𝐨𝐫𝐤𝐢𝐧𝐠 𝐭𝐨 𝐢𝐦𝐩𝐫𝐨𝐯𝐞 𝐭𝐡𝐞 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐫𝐞𝐥𝐢𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐨𝐟 𝐈𝐨𝐓 𝐨𝐩𝐞𝐫𝐚𝐭𝐢𝐨𝐧𝐬, 𝐚𝐧𝐝 𝐧𝐨𝐭 𝐨𝐧𝐥𝐲 𝐢𝐧 𝐎𝐜𝐭𝐨𝐛𝐞𝐫! The DOSS project is developing a framework to monitor and validate IoT Supply Chains, by establishing a “Supply Trust Chain”, verifying all hardware and software…