Skip to main content
All Posts By

Anna Marton, Safepay Systems

Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025. Publications

Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025.

Journal: IEEE Network Magazine Authors: Luo T, Wang J, Yan Z, Gelenbe E. Abstract: The process of quantifying trust considers the factors that affect it, which can be applied to identify malicious behavior, reduce uncertainty, and facilitate decision-making. Traditional trust evaluation methods based on statistics and reasoning, rely heavily on domain…
IoT Day Online Webinar & Roundtable “Latest research results in IoT supply chain security to ensure compliance with the CRA” – 9. April 2025 News

IoT Day Online Webinar & Roundtable “Latest research results in IoT supply chain security to ensure compliance with the CRA” – 9. April 2025

  We are pleased to announce that we carry on the tradition of the Global IoT Day Roundtable with our upcoming event on 9. April 2025. This year’s topic is: "Latest research results in IoT supply chain security to ensure compliance with the CRA". In this 2-hour free webinar we…
My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe Insights

My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe

By Roland Atoui, Red Alert Labs Sitting in the meeting room in Brussels, surrounded by some of the most influential cybersecurity experts and policymakers in Europe, I couldn’t help but feel the weight of the moment. The Cyber Resilience Act (CRA) is no longer a draft on paper - it’s…
Deliverable D2.3 Specification of the Device Security Passport Deliverables

Deliverable D2.3 Specification of the Device Security Passport

D2.3 defines the format of the Device Security Passport, which is one of the central pieces of the DOSS architecture. Based on OSCAL, this digital document merges in a readable and actionable format relevant security related device descriptors like the MUD file, the SBOM, HBOM, VEX, and also includes additional…
Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. 2025. A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification. Applied Sciences 2025. Publications

Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. 2025. A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification. Applied Sciences 2025.

Journal: Applied Sciences Authors: Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. Abstract: As Information and Communication Technology (ICT) systems become increasingly complex, the need for adaptable and efficient security certification frameworks grows. This paper introduces a flexible security evaluation methodology designed to serve as the…