Search Results - "de Mendonça, Fábio Lúcio Lopes"
-
1
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review
Published in Data (Basel) (01-01-2024)“…Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security…”
Get full text
Journal Article -
2
Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning
Published in Sensors (Basel, Switzerland) (11-07-2023)“…The Internet of Things (IoT) introduces significant security vulnerabilities, raising concerns about cyber-attacks. Attackers exploit these vulnerabilities to…”
Get full text
Journal Article -
3
EvacuAI: An Analysis of Escape Routes in Indoor Environments with the Aid of Reinforcement Learning
Published in Sensors (Basel, Switzerland) (01-11-2023)“…There is only a very short reaction time for people to find the best way out of a building in a fire outbreak. Software applications can be used to assist the…”
Get full text
Journal Article -
4
Data Security and Trading Framework for Smart Grids in Neighborhood Area Networks
Published in Sensors (Basel, Switzerland) (29-02-2020)“…Due to the drastic increase of electricity prosumers, i.e., energy consumers that are also producers, smart grids have become a key solution for electricity…”
Get full text
Journal Article -
5
Stego-STFAN: A Novel Neural Network for Video Steganography
Published in Computers (Basel) (01-07-2024)“…This article presents an innovative approach to video steganography called Stego-STFAN, as by using a cheap model process to use the temporal and spatial…”
Get full text
Journal Article -
6
Tensor-Based Framework With Model Order Selection and High Accuracy Factor Decomposition for Time-Delay Estimation in Dynamic Multipath Scenarios
Published in IEEE access (2020)“…Global Navigation Satellite Systems (GNSS) are crucial for applications that demand very accurate positioning. Tensor-based time-delay estimation methods, such…”
Get full text
Journal Article -
7
Toward an emotion efficient architecture based on the sound spectrum from the voice of Portuguese speakers
Published in Neural computing & applications (01-11-2024)“…One of the main challenges in the process of recognizing emotion through the voice are related to the specific characteristics of an individual’s sound…”
Get full text
Journal Article -
8
Development and Evaluation of an Intelligence and Learning System in Jurisprudence Text Mining in the Field of Competition Defense
Published in Applied sciences (01-12-2021)“…A jurisprudence search system is a solution that makes available to its users a set of decisions made by public bodies on the recurring understanding as a way…”
Get full text
Journal Article -
9
File Exchange in a Private Cloud Supported by a Trust Model
Published in 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (01-10-2012)“…Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several…”
Get full text
Conference Proceeding -
10
DCIDS—Distributed Container IDS
Published in Applied sciences (01-08-2023)“…Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as…”
Get full text
Journal Article -
11
Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
Published in Applied sciences (01-02-2022)“…Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping…”
Get full text
Journal Article -
12
Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension
Published in IEEE access (2020)“…Instant Messaging (IM) provides near-real-time communication between users, which has shown to be a valuable tool for internal communication in companies and…”
Get full text
Journal Article -
13
Tensor-based time-delay estimation for second and third generation global positioning system
Published in Digital signal processing (01-09-2019)“…Global Navigation Satellite Systems (GNSS), such as GPS, Galileo, GLONASS, and BeiDou, are vital for safety-critical applications such as civilian aviation and…”
Get full text
Journal Article -
14
Exploratory Overview on Breaking CAPTCHAs Using the Theory of the Consolidated Meta-Analytic Approach
Published in 2020 15th Iberian Conference on Information Systems and Technologies (CISTI) (01-06-2020)“…This study sought to provide an integrating model of the main contributions of the literature on CAPTCHAs with an impact in this field. With the expansion of…”
Get full text
Conference Proceeding -
15
DoS Attack Prevention on IPS SDN Networks
Published in 2019 Workshop on Communication Networks and Power Systems (WCNPS) (01-10-2019)“…The proposed solution addresses a security implementation for denial of service (DoS) attacks on software-defined networks (SDN) for which a combination of two…”
Get full text
Conference Proceeding -
16
Taxonomy of data quality problems in multidimensional Data Warehouse models
Published in 2013 8th Iberian Conference on Information Systems and Technologies (CISTI) (01-06-2013)“…The impact of poor data quality on the process of decision making, organizational trust and customer satisfaction is well known. In today's organizations, Data…”
Get full text
Conference Proceeding -
17
Public governance: the influence of corporate governance in strengthening AGU'S strategic management/Governanca publica: a influencia da governanca corporative no fortalecimento da gestao estrategica da AGU/Gobierno publico: la influencia del gobierno corporativo en el fortalecimiento de la gestion estrategica de la AGU
Published in GeSec : Revista de Gestão e Secretariado (01-08-2024)“…This article analyzed the governance capacity of the Office of the Attorney General of the Union (AGU) based on the public governance index (iGovPub) from the…”
Get full text
Journal Article -
18
Intrusion Detection in Container Orchestration Clusters : A framework proposal based on real-time system call analysis with machine learning for anomaly detection
Published in 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) (22-06-2022)“…Despite the benefits containerization brings, threats and risks of attacks against containerized technology have grown in equal proportion to its adoption…”
Get full text
Conference Proceeding -
19
Cyber Threat Modeling Framework
Published in 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) (22-06-2022)“…The Cyberspace has reshaped the boundaries of the dispute fields used by organizations and governments. Organizational security doctrines and strategies have…”
Get full text
Conference Proceeding -
20
Biotouch: a framework based on behavioral biometrics and location for continuous authentication on mobile banking applications
Published in 2020 15th Iberian Conference on Information Systems and Technologies (CISTI) (01-06-2020)“…This article describes a multimodal framework based on behavioral biometrics and location for continuous user authentication in mobile banking applications…”
Get full text
Conference Proceeding