Skip to main content
All Posts By

Anna Marton, Safepay Systems

Földvári A, Pataricza A. 2025. Model-driven, logic-supported exploratory dependability analysis. VERDI 2025. Publications

Földvári A, Pataricza A. 2025. Model-driven, logic-supported exploratory dependability analysis. VERDI 2025.

Conference: 3rd International Workshop on Verification & Validation of Dependable Cyber-Physical Systems (VERDI 2025), co-located with the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2025), 23. June 2025, Naples, Italy Authors: Földvári A, Pataricza A. Abstract: Analyzing empirical dependability data now exceeds domain experts’ capabilities without adequate…
2nd Special Session on Secure and Cognitive Continuum (SECON 2025) – Call for Papers News

2nd Special Session on Secure and Cognitive Continuum (SECON 2025) – Call for Papers

The 2nd Special Session on Secure and Cognitive Continuum (SECON 2025), will be held on 16-18. December 2025 in Sapporo, Japan, co-located with the 9th International Conference on Mobile Internet Security (MobiSec 2025). Special Session submission details   This Special Session is supported by the EU projects: EMPYREAN, CERTIFY,  DOSS…
Cybersecurity compliance: the RED Delegated Act and the CRA Insights

Cybersecurity compliance: the RED Delegated Act and the CRA

By Anna Marton, Safepay Systems As the EU tightens cybersecurity rules for digital products, an important deadline is approaching for manufacturers of connected devices. The RED Delegated Act (RED-DA) targets wireless equipment with specific cybersecurity requirements starting in August 2025, and from 2027 onward, the Cyber Resilience Act (CRA) will…
Apostolidis G, Siavvas M, Kalouptsoglou I, Tsoukalas D, Chatzigeorgiou A, Ampatzoglou A, Kehagias D, Tzovaras D. On the capacity of Technical Debt to indicate security issues in open-source software products. 2025. QUATIC 2025. Publications

Apostolidis G, Siavvas M, Kalouptsoglou I, Tsoukalas D, Chatzigeorgiou A, Ampatzoglou A, Kehagias D, Tzovaras D. On the capacity of Technical Debt to indicate security issues in open-source software products. 2025. QUATIC 2025.

Conference: 18th International Conference on the Quality of Information and Communications Technology (QUATIC 2025) Authors: Apostolidis G, Siavvas M, Kalouptsoglou I, Tsoukalas D, Chatzigeorgiou A, Ampatzoglou A, Kehagias D, Tzovaras D. Abstract: Technical Debt (TD) arises from insufficient design and poor coding practices, affecting important software quality attributes. As systems…
Apostolidis G, Kalouptsoglou I, Siavvas M, Kehagias D, Tzovaras D. 2025. AI-Enhanced Static Analysis: Reducing False Alarms Using Large Language Models. LIFESEC 2025. Publications

Apostolidis G, Kalouptsoglou I, Siavvas M, Kehagias D, Tzovaras D. 2025. AI-Enhanced Static Analysis: Reducing False Alarms Using Large Language Models. LIFESEC 2025.

Conference: Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC2025) at the 11th International Conference on Smart Computing (SMARTCOMP2025) , 16. June 2025, Cork, Ireland Authors: Apostolidis G, Kalouptsoglou I, Siavvas M, Kehagias D, Tzovaras D. Abstract: In modern software systems, early and accurate vulnerability detection is crucial.…
Innovation in Action: Strategies for Exploiting Horizon Europe Results News

Innovation in Action: Strategies for Exploiting Horizon Europe Results

Join us for the online workshop "Innovation in Action: Strategies for Exploiting Horizon Europe Results" on June 23, 2025, 10:00-13:00 CEST!   We’re excited to invite you to a collaborative workshop organized by four Horizon Europe research projects — TELEMETRY, DOSS, COBALT, and EMERALD — all focused-on driving innovation from…
Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1. Insights

Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1.

Within the DOSS IoT Supply Trust Chain (STC) Concept, we apply a digital twin framework, called the Digital Cybersecurity Twin (DCT). The DCT enables us to perform the automated vulnerability scanning and penetration testing of an IoT system in a virtualized environment, on a digital twin. This way, we can…