Skip to main content
All Posts By

Anna Marton, Safepay Systems

Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC) – Call for Papers News

Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC) – Call for Papers

Together with the Horizon Europe project TELEMETRY , we are organizing the Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC), to be held on 16 June 2025 in Cork, Ireland. The workshop will be co-located with th 11th IEEE International Conference on Smart Computing (SmartComp 2025). For…
Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors. Publications

Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors.

Journal: Sensors Authors: Gelenbe E. Abstract: Edge computing systems must offer low latency at low cost and low power consumption for sensors and other applications, including the IoT, smart vehicles, smart homes, and 6G. Thus, substantial research has been conducted to identify optimum task allocation schemes in this context using…
Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal. Publications

Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal.

Journal: IEEE Internet of Things Journal Authors: Gelenbe E, Nasereddin M. Abstract: Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of Service (QoS) requirements, including cyberattack protection, low delays and minimal packet loss, to offer secure real-time data exchange for human and vehicle safety…
Deliverable D3.1 Unified component testing methodology Deliverables

Deliverable D3.1 Unified component testing methodology

D3.1 presents a unified component testing methodology that integrates various automated security testing approaches tailored for IoT devices, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST) and the validation of security patches. The methodology described here is intended to form the conceptual…
The Evolution and Future of IoT: A Strategic Cybersecurity Outlook Insights

The Evolution and Future of IoT: A Strategic Cybersecurity Outlook

Paul Gedeon, Red Alert Labs The Internet of Things (IoT) has become a cornerstone of modern life, connecting devices across industries, homes, and entire cities. As we head towards an era of unprecedented connectivity, where trillions of devices will interact autonomously, the demand for secure, resilient IoT systems has never…
Security related findings in the Eseye 2024 State of IoT Adoption Report News

Security related findings in the Eseye 2024 State of IoT Adoption Report

What do we learn about respondents’ sentiments on IoT security from Eseye’s fourth annual report? Security is the number one challenge, with 50% of the businesses surveyed having been subject to an IoT security breach in the past 12 months. As Eseye says: “Security is non-negotiable”! This is exactly what…