RAINBOW

2025-02-18T21:34:29+03:00

RAINBOW: AN OPEN, TRUSTED FOG COMPUTING PLATFORM FACILITATING THE DEPLOYMENT, ORCHESTRATION AND MANAGEMENT OF SCALABLE, HETEROGENEOUS AND SECURE IOT SERVICES AND CROSS-CLOUD APPS The vision of RAINBOW is to design and develop an open and trusted fog computing platform that facilitates the deployment and management of scalable, heterogeneous and secure IoT services and cross-cloud [...]

UP2030

2025-02-18T21:42:08+03:00

UP2030: Urban Planning and design ready for 2030 UP2030 aims to guide cities through the socio-technical transitions required to meet their climate neutrality ambitions. It will do so by enabling a quantum leap from a ´business as usual´, project-by-project decarbonisation approach to a vision-driven, strategy-based approach that is anchored on sound projects and renewed [...]

5GC PFCP Intrusion Detection Dataset

2025-02-28T22:28:57+03:00

5GC PFCP Intrusion Detection Dataset The advancements in the field of telecommunications have resulted in an increasing demand for robust, high-speed, and secure connections between User Equipment (UE) instances and the Data Network (DN). The implementation of the newly defined 3rd Generation Partnership Project 3GPP (3GPP) network architecture in the 5G Core (5GC) represents [...]

DNP3 Intrusion Detection Dataset

2025-02-28T22:22:16+03:00

DNP3 Intrusion Detection Dataset In the digital era of the Industrial Internet of Things (IIoT), the conventional Critical Infrastructures (CIs) are transformed into smart environments with multiple benefits, such as pervasive control, self-monitoring and self-healing. However, this evolution is characterised by several cyberthreats due to the necessary presence of insecure technologies. DNP3 is an industrial [...]

IEC 60870-5-104 Intrusion Detection Dataset

2025-03-09T15:12:16+03:00

IEC 60870-5-104 Intrusion Detection Dataset The evolution of the Industrial Internet of Things (IIoT) introduces several benefits, such as real-time monitoring, pervasive control and self-healing. However, despite the valuable services, security and privacy issues still remain given the presence of legacy and insecure communication protocols like IEC 60870-5-104. IEC 60870-5-104 is an industrial protocol widely [...]