Sotiris Skaperas
YOU?
Author Swipe
View article: Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments
Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments Open
Kubernetes (K8s) serves as a mature orchestration system for the seamless deployment and management ofcontainerized applications spanning across cloud and edge environments. Since high-performance connectivity and minimalresource utilizati…
View article: An Open-Source Experimentation Framework for the Edge Cloud Continuum
An Open-Source Experimentation Framework for the Edge Cloud Continuum Open
The CODECO Experimentation Framework is an open-source solution designed for the rapid experimentation of Kubernetes-based edge cloud deployments. It adopts a microservice-based architecture and introduces innovative abstractions for (i) t…
View article: An Open-Source Experimentation Framework for the Edge Cloud Continuum
An Open-Source Experimentation Framework for the Edge Cloud Continuum Open
The CODECO Experimentation Framework is an open-source solution designed for the rapid experimentation of Kubernetes-based edge cloud deployments. It adopts a microservice-based architecture and introduces innovative abstractions for (i) t…
View article: ClusterSlice: A Zero-touch Deployment Platform for the Edge Cloud Continuum
ClusterSlice: A Zero-touch Deployment Platform for the Edge Cloud Continuum Open
We demonstrate ClusterSlice, an open-source solution for automated Kubernetes-center deployments for the edge continuum. ClusterSlice is an infrastructure-as-a-service, platform-as-a-service, and application-as-a-service solution, supporti…
View article: A Pragmatical Approach to Anomaly Detection Evaluation in Edge Cloud Systems
A Pragmatical Approach to Anomaly Detection Evaluation in Edge Cloud Systems Open
Anomaly detection (AD) has been recently employed in the context of edge cloud computing, e.g., for intrusion detection and identification of performance issues. However, state-of-the-art anomaly detection procedures do not systematically …
View article: Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments
Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments Open
Kubernetes (K8s) serves as a mature orchestration system for the seamless deployment and management of containerized applications spanning across cloud and edge environments. Since high-performance connectivity and minimal resource utiliza…
View article: A Link-Quality Anomaly Detection Framework for Software-Defined Wireless Mesh Networks
A Link-Quality Anomaly Detection Framework for Software-Defined Wireless Mesh Networks Open
<p>Software-defined wireless mesh networks are being increasingly deployed in diverse settings, such as smart cities and public Wi-Fi access infrastructures. The signal propagation and interference issues that typically characterize …
View article: Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation
Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation Open
International audience
View article: Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks
Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks Open
The Internet of Things (IoT) is a key technology for smart community networks, such as smart-city environments, and its evolution calls for stringent performance requirements (e.g., low delay) to support efficient communication among a wid…
View article: Smart Channel State Information Pre-processing for Joint Authentication and Symmetric Key Distillation
Smart Channel State Information Pre-processing for Joint Authentication and Symmetric Key Distillation Open
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, d…
View article: Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation Open
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, de…
View article: Smart Channel State Information Pre-processing for Joint Authentication and Symmetric Key Distillation
Smart Channel State Information Pre-processing for Joint Authentication and Symmetric Key Distillation Open
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, d…
View article: Joint Localization-based Node Authentication and Secret Key Generation
Joint Localization-based Node Authentication and Secret Key Generation Open
In this paper, we devise preprocessing schemes to disentangle channel state information (CSI) into predictable and unpredictable components to simultaneously provide two cornerstone security operations. The predictable components are used …
View article: Experimental Results of the REWIRE FED4FIRE+ Open Call (OC) 9 Project
Experimental Results of the REWIRE FED4FIRE+ Open Call (OC) 9 Project Open
This repository contains the detailed experimental results of the REWIRE "Experimenting with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City Environments" project. This work has received funding from the EU's Horizon 2020 research…
View article: Experimental Results of the REWIRE FED4FIRE+ Open Call (OC) 9 Project
Experimental Results of the REWIRE FED4FIRE+ Open Call (OC) 9 Project Open
This repository contains the detailed experimental results of the REWIRE "Experimenting with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City Environments" project. This work has received funding from the EU's Horizon 2020 research…
View article: Scheduling of Heterogeneous Services by Resolving Conflicts
Scheduling of Heterogeneous Services by Resolving Conflicts Open
Fifth generation (5G) new radio introduced flexible numerology to accommodate heterogeneous services. However, optimizing the scheduling of heterogeneous services with differing delay and throughput requirements over 5G new radio is a chal…
View article: On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys Open
This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approache…
View article: Scheduling Optimization of Heterogeneous Services by Resolving Conflicts
Scheduling Optimization of Heterogeneous Services by Resolving Conflicts Open
Fifth generation (5G) new radio introduced flexible numerology to provide the necessary flexibility for accommodating heterogeneous services. However, optimizing the scheduling of heterogeneous services with differing delay and throughput …
View article: Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks
Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks Open
Software-defined networking (SDN) is a promising technology to overcome many challenges in wireless sensor networks (WSN), particularly with respect to flexibility and reuse. Conversely, the centralization and the planes' separation turn S…
View article: Denial of Service Attacks Detection in Software-Defined Wireless Sensor\n Networks
Denial of Service Attacks Detection in Software-Defined Wireless Sensor\n Networks Open
Software-defined networking (SDN) is a promising technology to overcome many\nchallenges in wireless sensor networks (WSN), particularly with respect to\nflexibility and reuse. Conversely, the centralization and the planes'\nseparation tur…
View article: Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis
Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis Open
Video content is responsible for more than 70% of the global IP traffic. Consequently, it is important for content delivery infrastructures to rapidly detect and respond to changes in content popularity dynamics. In this paper, we propose …
View article: Real-Time Algorithms for the Detection of Changes in the Variance of Video Content Popularity
Real-Time Algorithms for the Detection of Changes in the Variance of Video Content Popularity Open
As video content is responsible for more than 70% of the global IP traffic, related resource allocation approaches, e.g., using content caching, become increasingly important. In this context, to avoid under-provisioning, it is important t…
View article: Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis
Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis Open
Video content is responsible for more than 70% of the global IP traffic. Consequently, it is important for content delivery infrastructures to rapidly detect and respond to changes in content popularity dynamics. In this paper, we p…
View article: Change Point Detection and Estimation of the Two-Sided Jumps of Asset Returns Using a Modified Kalman Filter
Change Point Detection and Estimation of the Two-Sided Jumps of Asset Returns Using a Modified Kalman Filter Open
In the first part of the paper, the positive and negative jumps of NASDAQ daily (log-) returns and three of its stocks are estimated based on the methodology presented by Theodosiadou et al. 2016, where jumps are assumed to be hidden rando…