Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

Intelligent Trust and Security Orchestration for 6G Distributed Cloud Environments

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Primary report on orchestration framework for secure and trustworthy 6G networks (opens in new window)

presents the investigation, design work and first implementation of the components delivered by WP5.

Use-case requirements and threat surface analysis (opens in new window)

This deliverable documents the requirements elicited by task T2.1. They will be described in a formal and structured format and will include also formalized fulfilment metrics. This document also conducts a threat analysis on the use-case to elicit trust key performance indicators.

Initial architecture of iTrust6G platform (opens in new window)

contains the initial design and architecture of iTrust6G. It will be the base deliverable for further technical works in project and will frame the architecture of the system.

Dissemination and Exploitation Plans (opens in new window)

provides project plan on dissemination actions, the individual and joint exploitation activities, and the standardization contribution plan.

Policy modelling, enactment and explainability for trustworthy 6G networks (opens in new window)

exposes the scientifical and technical foundation of the intent-based policy framework for trust management.

Webpage of the project (opens in new window)

will provide the website of the project in a public domain and online available.

Data management plan (opens in new window)

will provide the status and strategy of the project regarding the data management and GDPR and ways to maximise access to and re-use of research data generated by actions with special emphasis in publishing Open Access (OA). This deliverable will evolve during the lifetime of the project.

Publications

Integrity Management in Softwarized Networks (opens in new window)

Author(s): Enrico Bravi, Antonio Lioy, Diana Gratiela Berbecaru
Published in: NOMS 2024-2024 IEEE Network Operations and Management Symposium, 2024
Publisher: IEEE
DOI: 10.1109/NOMS59830.2024.10574994

Metrics Gathering for AI-based Trust Assessment (Best paper Award)

Author(s): Lorenzo Ferro, Flavio Ciravegna, Francesco Zaritto, Antonio Lioy, and Luis Landeiro Ribeiro.
Published in: 2025
Publisher: ICCNS-2025 - The 3rd International Conference on Intelligent Computing, Communication, Networking and Services

Towards A Capability Model of Kubernetes Runtime Security Enforcement Mechanisms (opens in new window)

Author(s): Francesco Settanni, Giuseppe Lisena, Cataldo Basile
Published in: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025
Publisher: ARES 2025 - International Conference on Availability, Reliability and Security
DOI: 10.1007/978-3-032-00630-1_15

Towards Secure 5G/6G Networks: Comparing Multimodal Fusion Methods for Attack Detection (opens in new window)

Author(s): Loukas Ilias, George Doukas, Christos Ntanos, Dimitris Askounis
Published in: IEEE Networking Letters, 2025, ISSN 2576-3156
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/LNET.2025.3616521

Adversarial Machine Learning in Electrical Energy and Power System: a Survey

Author(s): Sotiris Pelekis, Thanos Koutroubas, Afroditi Blika, Evangelos Karakolis, Christos Ntanos, and Dimitris Askounis
Published in: 2025
Publisher: 23rd International Conference on e-Society 2025

Trustworthy Artificial Intelligence in the Energy Sector: Landscape Analysis and Evaluation Framework (opens in new window)

Author(s): Sotiris Pelekis, Evangelos Karakolis, George Lampropoulos, Spiros Mouzakitis, Ourania Markaki, Christos Ntanos, Dimitris Askounis
Published in: 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC), 2024
Publisher: IEEE
DOI: 10.1109/ICE/ITMC61926.2024.10794222

'Evolution of Policy Verification and Control for 6G Secure Service Orchestration in Telco Clouds

Author(s): Souvik Paul, Sheeba Backia Mary Baskaran, Andreas Kunz, and Apostolis Salkintzis.
Published in: 2025
Publisher: 2025 EuCNC & 6G Summit - NET

Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach (opens in new window)

Author(s): Francesco Settanni, Alessandro Zamponi, Cataldo Basile
Published in: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
Publisher: IEEE
DOI: 10.1109/CSR61664.2024.10679397

Privacy-Preserving Intrusion Detection in IoT via Federated Learning

Author(s): Stefanos Palmos, Andrea Michaelidou, Sotiris Pelekis, Vangelis Lamprou, Christos Ntanos, and Dimitris Askounis
Published in: 2025
Publisher: Cyber Research Conference Ireland 2025

Evolution of Policy Verification and Control for 6G Secure Service Orchestration in Telco Clouds (opens in new window)

Author(s): Souvik Paul, Sheeba Backia Mary Baskaran, Andreas Kunz, Apostolis Salkintzis
Published in: 2025 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2025
Publisher: IEEE
DOI: 10.1109/EUCNC/6GSUMMIT63408.2025.11036971

DEBAC: Dynamic Explainable Behavior-Based Access Control (opens in new window)

Author(s): Lucía Cabanillas Rodríguez, Juan Manuel Montes-Lopez, Diego R. López, Pablo Serrano
Published in: 2025 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2025
Publisher: IEEE
DOI: 10.1109/EUCNC/6GSUMMIT63408.2025.11037037

A Formal Model of Security Capabilities towards Vendor-Agnostic Channel Protection

Author(s): Davide Colaiacomo and Cataldo Basile
Published in: 2025
Publisher: 2025 IEEE 25th International Conference on Communication Technology

Application Integrity Verification in Confidential Computing Scenario

Author(s): Enrico Bravi, Silvia Sisinni, and Antonio Lioy
Published in: 2025
Publisher: TrustAI CyberSec 2025

SNS JU - Towards 6G Architecture: Key Concepts, Challenges, and Building Blocks (May 2025)

Author(s): Matthew Baker, Baris Goztepe, Pietro Cassarà, Marja Matinmikko-Blue, and Deepak Kataria
Published in: 2025
Publisher: SNS JU - Architecture WG

Sustainability in SNS JU Projects – Targets, Methodologies, Trade-offs and Implementation Considerations Towards 6G Systems (June 2025)

Author(s): Ali Rezaki (Lead Author/Nokia) Konstantinos Trichias (6G-IA) Agapi Mesodiakaki (Aristotle University of Thessaloniki) Anastasius Gavras (Eurescom) Anna Aseeva Gilberto Berardinelli (Aalborg University) Hassan Osman Jesús Gutiérrez Terán (IHP Solutions) Ka
Published in: 2025
Publisher: SNS JU - Sustainability TF

Innovative Approaches for 6G Security: Challenges, Solutions, and Impact (opens in new window)

Author(s): Prez Palma, Noelia; Skarmeta Gmez, Antonio; Bisson, Pascal
Published in: 2025
Publisher: Zenodo
DOI: 10.5281/zenodo.14619619

6G IA Security WG: 6G Security and Trust: Insights from European SNS Projects

Author(s): Mikko Uusitalo (Nokia Bell Labs) Carlos J. Bernardos (Universidad Carlos III de Madrid)
Published in: 2025
Publisher: 6GIA - Security WG

Extending Orchestration for Privacy Preservation in Beyond 5G and 6G Networks

Author(s): M. Asad, M. Compastie, M. S. Siddiqui, V. Daza
Published in: 2024
Publisher: IEEE

iTrust6G: Zero-Trust Security for 6G Networks

Author(s): M. Ghoraishi, M. S. Siddiqui, M. Compastie, S. Mhiri, C. Ntanos, M. Kontoulis, D. Lopez, A. Lioy, E. K. Markakis, S. Backia Mary Baskaran
Published in: 2024
Publisher: IEEE

On the trustworthiness of federated learning models for 5G network intrusion detection under heterogeneous data (opens in new window)

Author(s): Vangelis Lamprou, George Doukas, Christos Ntanos, Dimitris Askounis
Published in: Computer Networks, Issue 271, 2025, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.1016/J.COMNET.2025.111598

Convolutional Autoencoders Coupled With Hypernetworks for Recognizing Attacks in 5G Networks and Beyond (opens in new window)

Author(s): Loukas Ilias, Stefanos Palmos, George Doukas, Afroditi Blika, George Kiokes, Christos Ntanos, Dimitris Askounis
Published in: IEEE Open Journal of the Communications Society, Issue 6, 2025, ISSN 2644-125X
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/OJCOMS.2025.3612124

Adversarial machine learning: a review of methods, tools, and critical industry sectors (opens in new window)

Author(s): Sotiris Pelekis, Thanos Koutroubas, Afroditi Blika, Anastasis Berdelis, Evangelos Karakolis, Christos Ntanos, Evangelos Spiliotis, Dimitris Askounis
Published in: Artificial Intelligence Review, Issue 58, 2025, ISSN 1573-7462
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/S10462-025-11147-4

Federated Learning For Enhanced Cybersecurity And Trustworthiness In 5G and 6G Networks: A Comprehensive Survey (opens in new window)

Author(s): Afroditi Blika, Stefanos Palmos, George Doukas, Vangelis Lamprou, Sotiris Pelekis, Michael Kontoulis, Christos Ntanos, Dimitris Askounis
Published in: IEEE Open Journal of the Communications Society, 2024, ISSN 2644-125X
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/OJCOMS.2024.3449563

Privacy-Preserving Container Attestation (opens in new window)

Author(s): Lorenzo Ferro, Enrico Bravi, Silvia Sisinni, Antonio Lioy
Published in: Journal of Network and Systems Management, Issue 34, 2025, ISSN 1064-7570
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/S10922-025-09982-5

Extending Kubernetes for Pods Integrity Verification (opens in new window)

Author(s): Francesco Zaritto, Enrico Bravi, Silvia Sisinni, Antonio Lioy
Published in: Journal of Network and Systems Management, Issue 34, 2025, ISSN 1064-7570
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/S10922-025-09988-Z

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0