Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Secure management of IoT devices lifecycle through identities, trust and distributed ledgers

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Workshops and Capacity building programme - 1st version (öffnet in neuem Fenster)

Report on the capacity building activities. Includes also first version of workshops organization and first version of capacity material (T6.2).

Project website, social network strategy and visual identity (öffnet in neuem Fenster)

Website social media in place visual identity poster leaflet and logo and ERATOSTHENES branding and accompanying report task 61

Workshops and Capacity building programme - Final version (öffnet in neuem Fenster)

Final report on workshops’ organization and the full capacity building programme and material (task 6.2).

Final Integrated Version of ERATOSTHENES (öffnet in neuem Fenster)

This deliverable includes the final technical integrated version of the framework. This is the final outcome of T5.1.

Automatic deployment language and tools for trust agents (öffnet in neuem Fenster)

This deliverable includes the T2.3 outputs, the source code for the deployment language, local deployment engine, global fleet assignment engine, auxiliary services for building, continuous update and trustworthiness assurance of the deployed agents.

Identity Recovery Mechanism (öffnet in neuem Fenster)

This deliverable includes the outcomes of T3.5 regarding the development of the identity recovery after device attack or key-loss.

Trusted Execution of TBM on IoT/Edge Devices (öffnet in neuem Fenster)

This deliverable includes the outputs from T2.4, the security middleware to ensure the deployment of TBM in TEE and a set of key security services.

Interoperability layer with legacy infrastructure (öffnet in neuem Fenster)

This deliverable includes the output of task 2.7, i.e., the source code and documents for the interoperability layer.

Trust Broker Mechanism (öffnet in neuem Fenster)

This deliverable includes the outputs from Task 2.1 regarding the development of trust broker mechanisms and algorithms to feed the Trust Manager and Broker (TMB).

First System integration and Proof of Concept (öffnet in neuem Fenster)

Report on the first system integration and the release of the Proof of Concept. This task includes the initial results of T5.1.

Updated System integration (öffnet in neuem Fenster)

This deliverable will include the updated version of the system integration after the technical adaptations and will be the revised version of D5.1.

Automated Recovery Mechanism of Trust Manager and Broker (öffnet in neuem Fenster)

This deliverable includes the outputs from Task 2.5, the source code of the recovery mechanism, documents for blue-green deployment mechanisms and the recovery triggering services.

Final Version of Decentralized Identity Management (öffnet in neuem Fenster)

This deliverable includes the final technical outcomes from WP3 tasks as an integrated version of the Decentralized Identity Management.

Intrusion detection for IoT-based context and networks (öffnet in neuem Fenster)

This deliverable includes the first version of the development of IDS as a result from Task 4.5.

Final Version of Dynamic Trust Management and Agents (öffnet in neuem Fenster)

This deliverable includes the final technical outcomes from WP2 tasks as an integrated version of the distributed Trust Manager and Agents.

Inter-ledger platform for Cyber-threat information sharing (öffnet in neuem Fenster)

This deliverable includes the initial outputs from Task 4.3 and 4.2 regarding the development of the inter-ledger platform for Cyber-threat information sharing to support the exchange of trust information and relevant security information.

Prototype of Context-aware identity and access manager (öffnet in neuem Fenster)

This deliverable includes the first outputs from T3.1 and 3.2 about the Self-Sovereign Identity (SSI) management models and mechanisms including the different components and services needed for the development of the Identity Manager.

Updated version of the identity and access manager (öffnet in neuem Fenster)

This deliverable includes the updated version of the context-aware identity and access manager based on the outputs of tasks T3.1 and T3.2.

Prototype of Advanced Data Protection Mechanism (öffnet in neuem Fenster)

This deliverable includes the initial outputs from T34 about the cryptographic protection of the identity and trust data

IoT Network Enrolment mechanism (öffnet in neuem Fenster)

This deliverable includes the outputs from Task 2.6, the source code of the enrolment mechanism and the algorithms for initial trust value computation.

AI Threat Analysis Models and Intrusion Detection for IoT Networks (öffnet in neuem Fenster)

This deliverable is the updated version of D4.4 and D4.5 and includes the AI models for risk assessment and intrusion detection.

Federated threat analysis models for continuous risk assessment (öffnet in neuem Fenster)

This deliverable includes the initial outcomes from Task 4.4 about the development of Federated threat analysis models for continuous assessment as the defence service for detecting different attacks and exploits inside IoT networks.

DLT-based IoT Identity Manager (öffnet in neuem Fenster)

This deliverable includes the first version of the DLT and privacy-preserving IoT Identity Manager as well as the applied models to the dP-ABC scheme.

Updated Threat Modelling Module (öffnet in neuem Fenster)

This deliverable includes the updated outputs from T2.2 about threat modelling module of TBM for dynamic end-to-end threats analysis.

H - Requirement No. 2 (öffnet in neuem Fenster)

Copies of opinions/approvals by ethics committees and/or competent authorities for the research with humans must be obtained and kept on file.

H - Requirement No. 1 (öffnet in neuem Fenster)

The beneficiary must submit a deliverable including:- The procedures and criteria that will be used to identify/recruit research participants.- The informed consent procedures including personal data processing that will be implemented for the participation of humans.- Templates of the informed consent/assent forms and information sheets (in language and terms intelligible to the participants) including personal data processing.- Details on an incidental findings policy.

NEC - Requirement No. 5 (öffnet in neuem Fenster)

The beneficiary must submit a deliverable including:- Details on the materials which will be imported to/exported from the EU.- In case activities undertaken in non-EU countries involves material import/export, copies of import/export authorisations, as required by national/EU legislation must be obtained and kept on file.

Cybersecurity Exercises and Trainings (öffnet in neuem Fenster)

This deliverable will include the preparatory activities and the plan of the cybersecurity exercise execution and training, this report will be related with T5.6.

Plan on Standardization Activities (öffnet in neuem Fenster)

Plan of Standardization activities and developed material including recommendations towards standardization bodies (related to T6.6).

Report on Standardization Activities (öffnet in neuem Fenster)

Summary of Standardization activities and developed material including recommendations towards standardization bodies (related to T6.6).

Quality Plan and Risks Registry v2 (öffnet in neuem Fenster)

D7.7 will include the updated project quality control procedures to ensure high quality standards and control mechanisms (T7.3). It will also include the updated risk registry (T7.3).

Summary of Pilot Activities (öffnet in neuem Fenster)

Report on the performed activities in each pilot, description of technical deployments and validation activities.

Report on IoT Cyber Security Certification Activities (öffnet in neuem Fenster)

Summary of IoT Cyber Security Certification Activities (related to T6.5).

Summary of Cybersecurity Exercises and Trainings (öffnet in neuem Fenster)

Report on the performed Cybersecurity Exercises and Trainings in each pilot, description of the results.

Interim Report of Piloting Activities and Impact Assessment (öffnet in neuem Fenster)

Report on the first outcomes of the piloting activities. This deliverable will also and will provide a PIA/DPIA evaluation based on the GDPR.

Plan on Contribution to IoT Cyber Security Certification Activities (öffnet in neuem Fenster)

Plan of IoT Cyber Security Certification Activities (related to T6.5).

Research Agenda, IoT threat landscape and security challenges (öffnet in neuem Fenster)

This deliverable includes the outputs from T11 and consolidates the research agenda current stateoftheart and IoT threat landscapechallenges

Pilot 1 - PoC Evaluation (öffnet in neuem Fenster)

Report on the validation of the PoC and recommendations for technical improvements (related to T5.3).

Design of Physical Unclonable Functions for IdM (öffnet in neuem Fenster)

This deliverable includes the early outcomes of T36 about the design of PUFs and their integration for secure key generation and authentication

Secure deployment and registration of IoT devices (öffnet in neuem Fenster)

This deliverable includes the design and development of the mechanisms of the framework related with the secure deployment of IoT devices and its registration in the directory. This is the initial outcome of T4.6.

Data Management Plan v1 (öffnet in neuem Fenster)

DMP initial version M3 including data definitions management procedures GDPR policies T74

Data Management Plan - Final (öffnet in neuem Fenster)

Updated data management plan, reporting data management activities, actions and FAIR data management (T7.4).

Preliminary ERATOSTHENES Architecture (öffnet in neuem Fenster)

This deliverable describes the first highlevel release of the ERATOSTHENES architecture Output from Task 14

ERATOSTHENES Blueprint - Final Architecture (öffnet in neuem Fenster)

D1.4 outlines the overall solution, including its components and interfaces. Further focus is on the required components to realize the novel approaches of the solution.

Summary of Pilots Management and Social Impact Assessment (öffnet in neuem Fenster)

Management report on the piloting and validation activities. This deliverable will also include the security and privacy-aware Impact Assessment as well as the Social Impact Assessment.

Capacity Building Programme and Planning (öffnet in neuem Fenster)

Report on the planning and organisation of the capacity building programme capacity assessment strategy and implementation and monitoring and evaluation plan T62

Dissemination and Communication plan (öffnet in neuem Fenster)

Report on the ERATOSTHENES dissemination and communication strategy stakeholders and target groups identification AB formation and activities foreseen T613

Quality Plan and Risks Registry v1 (öffnet in neuem Fenster)

D72 will include the project quality control procedures to be followed as well as all templates to ensure high quality standards and control mechanisms T73 It will also include the project risk registry that will be updated on M25 T73

Project Management Handbook (öffnet in neuem Fenster)

D71will include all necessary project management procedures reporting approvals risks etc T71 and a preliminary structuring of ethics legal and IPRs T71 T72

Final dissemination activities report (öffnet in neuem Fenster)

Final report on the ERATOSTHENES dissemination and Communication Activities (all tasks).

Veröffentlichungen

A privacy-preserving attribute-based framework for IoT identity lifecycle management (öffnet in neuem Fenster)

Autoren: Jesus Garcia-Rodriguez, Antonio Skarmeta
Veröffentlicht in: Computer Networks, Ausgabe Volume 236, 2023
Herausgeber: ELSEVIER
DOI: 10.1016/j.comnet.2023.110039

Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks (öffnet in neuem Fenster)

Autoren: José Manuel Bernabé Murcia, Eduardo Cánovas, Jesús García-Rodríguez, Alejandro M. Zarca, Antonio Skarmeta
Veröffentlicht in: Future Generation Computer Systems, Ausgabe 162, 2024, Seite(n) 107479, ISSN 0167-739X
Herausgeber: Elsevier BV
DOI: 10.1016/j.future.2024.08.003

To pass or not to pass: Privacy-preserving physical access control (öffnet in neuem Fenster)

Autoren: Jesus Garcia-Rodriguez, Stephan Krenn, Daniel Slamanig
Veröffentlicht in: Computers & Security, Ausgabe Volume 136, 2024
Herausgeber: ELSEVIER
DOI: 10.1016/j.cose.2023.103566

Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques (öffnet in neuem Fenster)

Autoren: Jesús García-Rodríguez, Stephan Krenn, Jorge Bernal Bernabe, Antonio Skarmeta
Veröffentlicht in: Computer Networks, Ausgabe 248, 2024, Seite(n) 110498, ISSN 1389-1286
Herausgeber: Elsevier BV
DOI: 10.1016/j.comnet.2024.110498

Run-time threat models for systematic and continuous risk assessment (öffnet in neuem Fenster)

Autoren: Stef Verreydt, Dimitri Van Landuyt, Wouter Joosen
Veröffentlicht in: Software and Systems Modeling, 2025, ISSN 1619-1366
Herausgeber: Springer Verlag
DOI: 10.1007/s10270-024-01242-5

Trust Score Prediction and Management in IoT Ecosystems Using Markov Chains and MADM Techniques (öffnet in neuem Fenster)

Autoren: Michail Bampatsikos, Ilias Politis, Thodoris Ioannidis, Christos Xenakis
Veröffentlicht in: IEEE Transactions on Consumer Electronics, 2025, Seite(n) 1-1, ISSN 0098-3063
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tce.2025.3531045

Towards Understanding Trust in Self-adaptive Systems (öffnet in neuem Fenster)

Autoren: Dimitri Van Landuyt, David Halasz, Stef Verreydt, Danny Weyns
Veröffentlicht in: 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2024), 2024
Herausgeber: SEAMS
DOI: 10.1145/3643915.3644100

Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats

Autoren: Dmytro Shvets*, Edona Fasllija, Jakob Heher, Stefan More
Veröffentlicht in: Institute of Information Security (7050)Secure Information and Communication Technologies SIC (98642), 2024
Herausgeber: TU GRAZ

Trusted and secure self-sovereign identity framework (öffnet in neuem Fenster)

Autoren: Vaios Bolgouras, Anna Angelogianni, Ilias Politis and Christos Xenakis
Veröffentlicht in: IWAPS 2022 - BLOCKCHAIN SECURITY APPLICATIONS, Ausgabe Article 101, 2022
Herausgeber: ACM
DOI: 10.1145/3538969.3544436

Human empowerment in self-adaptive socio-technical systems (öffnet in neuem Fenster)

Autoren: Nicolas Boltz, Sinem Getir Yaman, Paola Inverardi, Rogério de Lemos, Dimitri Van Landuyt, Andrea Zisman
Veröffentlicht in: 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2024), 2024
Herausgeber: SEAMS
DOI: 10.1145/3643915.3644101

Raft Protocol for Fault Tolerance and Self-Recovery in Federated Learning (öffnet in neuem Fenster)

Autoren: Rustem Dautov, Erik Johannes Husom
Veröffentlicht in: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2024, Seite(n) 110-121
Herausgeber: ACM
DOI: 10.1145/3643915.3644093

An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management (öffnet in neuem Fenster)

Autoren: Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Sokratis Vavilis, Antonio Skarmeta, Jesús García, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Omana Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis
Veröffentlicht in: IWAPS 2023 3rd International Workshop on Advances on Privacy Preserving Technologies and Solutions, 2023
Herausgeber: ACM
DOI: 10.1145/3600160.3605083

Human empowerment in self-adaptive socio-technical systems (öffnet in neuem Fenster)

Autoren: Nicolas Boltz, Sinem Getir Yaman, Paola Inverardi, Rogério De Lemos, Dimitri Van Landuyt, Andrea Zisman
Veröffentlicht in: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2024, Seite(n) 200-206
Herausgeber: ACM
DOI: 10.1145/3643915.3644082

Context-Aware Digital Twins to Support Software Management at the Edge (öffnet in neuem Fenster)

Autoren: Rustem Dautov & Hui Song (SINTEF)
Veröffentlicht in: Research Challenges in Information Science: Information Science and the Connected World, Ausgabe Lecture Notes in Business Information Processing, vol 476., 2023, ISBN 978-3-031-33079-7
Herausgeber: SPRINGER
DOI: 10.1007/978-3-031-33080-3_15

Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems (öffnet in neuem Fenster)

Autoren: Stefan More, Jakob Heher, Edona Fasllija, Maximilian Mathie
Veröffentlicht in: Proceedings of the 19th International Conference on Availability, Reliability and Security, 2025, Seite(n) 1-11
Herausgeber: ACM
DOI: 10.1145/3664476.3669934

A Holistic Approach For Iot Networks' Identity And Trust Management - The ERATOSTHENES Project (öffnet in neuem Fenster)

Autoren: K. Loupos, C. Kalogirou, H. Niavis, A. F. Skarmeta, E. Torroglosa-Garcia, A. Palomares, H. Song, P.E. Brun, F. Giampaolo, D. V. Landuyt, S. Michiels, B. Podgorelec, C. Xenakis, M. Bampatsikos, K. Krilakis
Veröffentlicht in: Lecture Notes in Computer Science book series (LNCS,volume 13533), 2022
Herausgeber: Springer
DOI: 10.1007/978-3-031-20936-9_27

Latency-Aware Node Selection in Federated Learning (öffnet in neuem Fenster)

Autoren: Rustem Dautov, Erik Johannes Husom
Veröffentlicht in: 2024 IFIP Networking Conference (IFIP Networking), 2024, Seite(n) 598-600
Herausgeber: IEEE
DOI: 10.23919/ifipnetworking62109.2024.10619860

BISON: Blind Identification with Stateless scOped pseudoNyms (öffnet in neuem Fenster)

Autoren: Jakob Heher, Stefan More, Lena Heimberger
Veröffentlicht in: Cornell University, 2024
Herausgeber: ARXIV
DOI: 10.48550/arxiv.2406.01518

Consenseiot: A Consensus Algorithm For Secure And Scalable Blockchain In The Iot Context (öffnet in neuem Fenster)

Autoren: Konstantinos Loupos, Harris Niavis
Veröffentlicht in: ICPS Proceedings - ARES '22, 2022, ISBN 9781450396707
Herausgeber: ACM
DOI: 10.1145/3538969.3543811

Lifecycle management of IoT devices via digital identities management and distributed ledgers solutions

Autoren: Konstantinos Loupos, Harris Niavis, Konstantinos Dafloukas, Sokratis Vavilis, Fotis Michalopoulos, Antonio Skarmeta, Jesús García, Hui Song, Rosella Omana Mancilla, Dimitri Van Landuyt, Stefan More, Konstantinos Krilakis, Angel Palomares, Rustem Dautov, Francesca Costantino, Sam Michiels, Christos Xenakis
Veröffentlicht in: Embedded World Conference 2024, 2024
Herausgeber: Embedded World

NIS2 Towards Achieving Cyber Resilience

Autoren: Christos Xenakis
Veröffentlicht in: 8th Insurtech Conference, 2024
Herausgeber: BOUSIAS Events

Raft Protocol for Fault Tolerance and Self-Recovery in Federated Learning (öffnet in neuem Fenster)

Autoren: Rustem Dautov, Erik Johannes Husom
Veröffentlicht in: 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2024), Ausgabe ACSIS, Vol. 36, 2024, Seite(n) 43–50, ISSN 2300-5963
Herausgeber: annals-csis
DOI: 10.1145/3643915.3644093

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT (öffnet in neuem Fenster)

Autoren: Michail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis
Veröffentlicht in: IWAPS 2023 3rd International Workshop on Advances on Privacy Preserving Technologies and Solutions, Ausgabe August 2023, Article No: 94, 2023, Seite(n) 1-8
Herausgeber: ACM
DOI: 10.1145/3600160.3605074

Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes (öffnet in neuem Fenster)

Autoren: Stefan More
Veröffentlicht in: SECPID: Workshop on Security, Privacy, and Identity Management in the Cloud, Ausgabe August 2023, Article No: 124, 2023
Herausgeber: ACM
DOI: 10.1145/3600160.3605046

Final Integrated Solution and Validation Results of the ERATOSTHENES Holistic IoT Devices Security and Privacy Respecting Architecture

Autoren: Konstantinos Loupos, Sokratis Vavilis, Harris Niavis, Fotis Michalopoulos, Konstantinos Dafloukas, Antonio Skarmeta, Jesús García, Angel Palomares, Hui Song, Rustem Dautov, Rosella Mancilla, Francesca Giampaolo, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Konstantinos Krilakis
Veröffentlicht in: Embedded World 2025, 2024
Herausgeber: ELSEVIER

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic (öffnet in neuem Fenster)

Autoren: Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis
Veröffentlicht in: IWAPS 2023 3rd International Workshop on Advances on Privacy Preserving Technologies and Solutions, Ausgabe August 2023, Article No: 100, 2023, Seite(n) 1-8
Herausgeber: ACM
DOI: 10.1145/3600160.3605086

Label-Efficient and Robust Learning from Multiple Experts (öffnet in neuem Fenster)

Autoren: Bojan Kolosnjaji, Apostolis Zarras
Veröffentlicht in: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2023
Herausgeber: IEEE
DOI: 10.1109/icassp49357.2023.10094583

Towards Community-Driven Generative AI (öffnet in neuem Fenster)

Autoren: Rustem Dautov, Erik Johannes Husom, Sagar Sen, Hui Song
Veröffentlicht in: 18th Conference on Computer Science and Intelligence Systems (FedCSIS 2023), Ausgabe ACSIS, Vol. 36, 2023, Seite(n) 43–50
Herausgeber: ACSIS
DOI: 10.15439/2023f5494

Trust and Privacy in a Heterogeneous World (öffnet in neuem Fenster)

Autoren: Stefan More
Veröffentlicht in: 2023
Herausgeber: TU Graz
DOI: 10.3217/p65m8-j3q66

Towards a Model-Based Serverless Platform for the Cloud-Edge-IoT Continuum (öffnet in neuem Fenster)

Autoren: Nicolas Ferry; Rustem Dautov; Hui Song
Veröffentlicht in: CCGrid 2022 - 22nd IEEE/ACM International Symposium on Cluster Computing and the Grid : Workshop on Cloud-to-Things continuum: towards the convergence of IoT, Edge and Cloud Computing, Ausgabe 1, 2022, Seite(n) pp. 851-858
Herausgeber: INRIA
DOI: 10.1109/ccgrid54584.2022.00101

Credential Issuance Transparency: A Privacy-Preserving Audit Log of Credential Issuance (öffnet in neuem Fenster)

Autoren: Edona Fasllija, Jakob Heher, Stefan More
Veröffentlicht in: Lecture Notes in Computer Science, Network and System Security, 2025, Seite(n) 107-126
Herausgeber: Springer Nature Singapore
DOI: 10.1007/978-981-96-3531-3_6

A Verifiable Data Registry for Secure and Scalable Decentralised Identity Management in the IoT Context (öffnet in neuem Fenster)

Autoren: Fotis Michalopoulos, George Misiakoulis, Sokratis Vavilis, Harris Niavis, Konstantinos Loupos
Veröffentlicht in: Lecture Notes in Networks and Systems, Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International Conference, 2025, Seite(n) 271-280
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76459-2_25

Integrating a Hybrid Lightweight Consensus Algorithm in HyperLedger Fabric (öffnet in neuem Fenster)

Autoren: Fotis Michalopoulos, Sokratis Vavilis, Harris Niavis, Konstantinos Loupos
Veröffentlicht in: Communications in Computer and Information Science, Global Internet of Things and Edge Computing Summit, 2025, Seite(n) 188-203
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-78572-6_12

Identity and Trust Architecture for Device Lifecycle Management (öffnet in neuem Fenster)

Autoren: Agustín Marín Frutos, Jesús García Rodríguez, Antonio Skarmeta, Konstantinos Loupos, Sokratis Vavilis
Veröffentlicht in: Communications in Computer and Information Science, Global Internet of Things and Edge Computing Summit, 2025, Seite(n) 63-72
Herausgeber: Springer Nature Switzerland
DOI: 10.1007/978-3-031-78572-6_4

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0