Key research themes
1. How can distributed and software-based architectures enhance secure device management against unauthorized USB activities?
This theme focuses on leveraging distributed architectures, multi-agent systems, and software-based blocking mechanisms to detect, assess, and prevent unauthorized or malicious activities through USB devices such as BadUSB attacks. It examines system designs that provide effective threat assessment, user-informed decisions, and scalable protection for personal and corporate computing environments.
2. What methodologies enable efficient management and interaction of heterogeneous, resource-constrained devices in networks such as Home Area Networks or IoT?
Research under this theme explores proxy representations, middleware frameworks, and feature-based modular software architectures that support constrained devices unable to run full middleware stacks. It also investigates semantic models and fog computing architectures to address heterogeneity, device discovery, interaction, and unified management of diverse connected devices with minimal overhead.
3. How can middleware and software platforms support dynamic, distributed applications and device management across heterogeneous and mobile devices?
This theme addresses architectures and platforms that facilitate running distributed applications spanning multiple co-located or heterogeneous devices, including mobile and embedded ones. It highlights software component models supporting dynamic reconfiguration, service orchestration in medical or pervasive environments, and system designs enabling seamless interaction, dynamic remote control, or migration of applications based on device context and proximity.