Monday, July 10, 2023, 14:00
- 16:00
Building 5, Level 5, Room 5209
Contact Person
Power systems constitute a pillar of the critical infrastructure, and, as a result, their cybersecurity is paramount. Traditional power system architectures are moving from their original centralized nature to a distributed paradigm. This transition has been propelled by the rapid penetration of distributed energy resources (DERs) such as rooftop solar panels, battery storage, etc. However, with the introduction of new DER devices, the threat surface of power systems is inadvertently expanding.
Prof. Yasser Shoukry, University of California, Irvine, USA
Monday, November 28, 2022, 10:00
- 10:45
Building 2, 5220
Contact Person


 Deep Neural Networks (DNNs) are increasingly being used to control physical/mechani

Prof. Panagiotis Katsaros, Aristotle University of Thessaloniki
Sunday, November 27, 2022, 14:30
- 15:15
Building 2, 5220
Contact Person


Cyber-physical system design involves heterogeneous components for sensing, control, actu

Prof. Mohammad Alfaruque, University of California, Irvine, USA.
Sunday, November 27, 2022, 13:45
- 14:30
Building 2, 5220
Contact Person


Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon,

Prof. Ahmed Eltawil, Prof. Charalambos Konstantinou, Prof. Khaled Nabil Salama
Sunday, November 27, 2022, 08:00
- 17:00
Building 2, Level 5, Room 5220
The workshop aims to bring together experts to present their latest research efforts related to Embedded and Cyber Connected Systems architectures and platforms that can scale efficiently, as well as operate securely and resiliently to provide the necessary resources demanded by current and future network applications.
Valerio Schiavoni, Scientific Coordinator and Lecturer, Centre of Competence for Complex Systems and Big Data, University of Neuchâtel
Thursday, November 11, 2021, 12:00
- 13:00
Building 9, Level 3, Room 3223,
Available as dedicated hardware components into several mobile and server-grade processors, and recently included in infrastructure-as-a-service commercial offerings by several cloud providers, TEEs allow applications with high privacy and confidentiality demands to be deployed and executed over untrusted environments, shielding data and code from compromised systems or powerful attackers. After an  introduction to basic concepts for TEEs, I will survey some of our most recent contributions exploiting TEEs, including as defensive tools in the context of Federated Learning, as support to build secure cache systems for edge networks, as protection mechanisms in a med-tech/e-health context,  shielding novel environments (ie, WebAssembly), and more. Finally, I will highlight some of the lessons learned and offer open perspectives, hopefully useful and inspirational to future researchers and practitioners entering this exciting area of research.