- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- Spam and Phishing Detection
- Digital and Cyber Forensics
- Mobile Crowdsensing and Crowdsourcing
- Cybercrime and Law Enforcement Studies
- Millimeter-Wave Propagation and Modeling
- Privacy, Security, and Data Protection
- Context-Aware Activity Recognition Systems
- Recommender Systems and Techniques
- Advanced MIMO Systems Optimization
- Sustainable Supply Chain Management
- Internet Traffic Analysis and Secure E-voting
- IoT and Edge/Fog Computing
- Mobile Health and mHealth Applications
- Supply Chain and Inventory Management
- Food Supply Chain Traceability
- Cryptography and Data Security
- Digital Media Forensic Detection
- Wireless Networks and Protocols
- Recycling and Waste Management Techniques
- Caching and Content Delivery
- Indoor and Outdoor Localization Technologies
Universitat Rovira i Virgili
2013-2024
Athena Research and Innovation Center In Information Communication & Knowledge Technologies
2021-2024
University of Piraeus
2018-2021
Universidad de Málaga
2020
This work provides a systematic literature review of blockchain-based applications across multiple domains. The aim is to investigate the current state blockchain technology and its highlight how specific characteristics this disruptive can revolutionise "business-as-usual" practices. To end, theoretical underpinnings numerous research papers published in high ranked scientific journals during last decade, along with several reports from grey as means streamlining our assessment capturing...
Traceability has become a critical element in supply chain management, particularly safety-sensitive sectors like food, pharmaceuticals, etc. Upstream (manufacturers, producers, etc.) and downstream (distributors, wholesalers, members need to store handle traceability-related information for providing proof of regulatory compliance both state authorities more demanding customers. Consumers also place high expectations on food chains (FSC) with specific emphasis facets related safety....
Blockchain's evolution during the past decade is astonishing: from bitcoin to over 2.000 altcoins, and decentralised electronic payments transactions programmable by smart contracts complex tokens governed organisations. While new generation of blockchain applications still evolving, blockchain's technical characteristics are also advancing. Yet, immutability, a hitherto indisputable highly advertised property according which data cannot be edited nor deleted, remains cornerstone security....
In recent years, traceability systems have been developed as practical tools for improving supply chain (SC) transparency and visibility, especially in health safety-sensitive sectors like food pharmaceuticals. Blockchain-related SC research has received significant attention during the last several arguably blockchain is currently most promising technology providing traceability-related services networks. This paper provides a systematic literature review of various technical implementation...
Traceability has become a critical element in supply chain management, particularly safety-sensitive sectors like food, pharmaceuticals, etc. Upstream (manufacturers, producers, etc.) and downstream (distributors, wholesalers, members need to store handle traceability-related information for providing proof of regulatory compliance both state authorities more demanding customers. More specifically, European Union regulations mandate food producers trace all raw materials/ingredients used...
The widespread adoption of the new generation decentralised architectures, leveraged by blockchain and file storage (DFS) systems, enables a myriad applications opportunities. Nevertheless, their remarkable features, namely auditability, availability and, among all, immutability, do not come without cost. In this article, we examine most widely used DFS systems discuss main challenges opportunities, with special regard to immutability its impact on GDPR compliance. A description current...
Vendor-managed inventory (VMI) is a widely used collaborative management policy in which manufacturers/vendors manage the of retailers and take responsibility for making decisions related to timing extent replenishment. There exist several prerequisites successful VMI strategy implementation like information sharing, trust, systems integration long-term collaboration. However, nowadays logistics flows, complex processes, high number participants distribution channels impede adoption...
Identifying the optimal granularity level of traceable units is necessary when implementing traceability, particularly in food supply chains. In this paper we propose a generic framework for defining levels based on product's unique characteristics, chain processes and stakeholders engagement. We determine different by using smart contracts within blockchain-enabled traceability architecture. The relates to depending application information company between companies across complex networks....
Recent advances in telecommunications and database systems have allowed the scientific community to efficiently mine vast amounts of information worldwide extract new knowledge by discovering hidden patterns correlations. Nevertheless, all this shared can be used invade privacy individuals through use fusion mining techniques. Simply removing direct identifiers such as name, SSN, or phone number is not anymore sufficient prevent against these practices. In numerous cases, other fields, like...
The integration of large language models (LLMs) into various cybersecurity pipelines has become increasingly prevalent, enabling the automation numerous manual tasks and often surpassing human performance. Recognising this potential, researchers practitioners are actively investigating application LLMs to process vast volumes heterogeneous data for anomaly detection, potential bypass identification, attack mitigation, fraud prevention. Moreover, LLMs' advanced capabilities in generating...
A context-aware recommender system offers personalized recommendations of exercise routes to people according their medical condition and real-time information from the smart city. Experiments with a simulated dataset real data verified system's usefulness.
Simulation techniques based on deterministic methods such as ray tracing and launching are widely used to perform radioplanning tasks. However, the quality of simulations depends number rays angular resolution. The computational cost these in high definition prevents their use complex environment, low-definition counterparts instead. In this letter, we propose a technique collaborative filtering lessen poor-quality problems simulations. We show that our approach obtains results very similar...
Blockchain technology is rapidly gaining traction in healthcare industry as one of the most exciting technological developments. In particular, blockchain presents numerous opportunities for such reduced transaction costs, increased transparency regulatory reporting, efficient data management and records universality. context smart health, may provide distinct benefits, particularly from a context-aware perspective where personalised solutions be provided to citizens society general. this...
Human beings produce electronic waste (e-waste) at an unprecedented pace. Mobile phones and other inter-connected smart devices make a significant contribution to the generation of e-waste. Reverse logistics (RL) activities play essential role in managing mobile during their end-of-life. However, remanufacturing and/or refurbishing might prove difficult not only from operational point view but also data management privacy perspective (due privacy-related regulatory frameworks like EU General...
Smart Healthcare is a relatively new context-aware healthcare paradigm influenced by several fields of knowledge, namely medical informatics, communications and electronics, bioengineering, ethics so on. Thus, many challenging problems are related to smart but in cases they explored individually their respective and, as result, not always known the research community working more specific domains. The aim this article identify some most relevant trends lines that going affect field years...
Information overload is a phenomenon of our days due to the unprecedented penetration information and communication technologies (ICT) in daily lives. As result, people often end up with more options than they can process choose from therefore may opt for choices which do not fit best their preferences. To address these issues, recommender systems (RSs) were proposed have gained lot interest research community industry. However, privacy big concern systems. While decentralized recommenders...
Microsoft Office may be by far the most widely used suite for processing documents, spreadsheets, and presentations. Due to its popularity, it is continuously utilised carry out malicious campaigns. Threat actors, exploiting platform's dynamic features, use launch their attacks penetrate millions of hosts in This work explores modern landscape exposing means that malware authors use. We leverage a taxonomy tools weaponise documents explore modus operandi actors. Moreover, we generated...