publicações selecionadas
-
artigo académico
- Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case. Electronics. 2024
- Editorial: Wireless Networks and IoT Applications. Mobile Networks & Applications. 2023
- Provisioning Cybersecurity in ICT Complex Supply Chains: An Overview, Key Issues and a Relevant Architecture. Preprints.org. 2021
- Healthcare Critical Knowledge Monitor System Model: Healthcare Knowledge Capture Component Specification. Research in Medical & Engineering Sciences. 2019
- Academic expectations for engineering freshmen: Gender differences. AI Communications. 2017
- Academic expectations for engineering freshmen: Gender differences. AI Communications. 2017
- Behavioural Biometrics for Authentication and Stress Detection - A Case Study with Children. Global Security, Safety & Sustainability, CCIS, Springer. 2017
- Challenges and Reflections in Designing Cyber Security Curriculum. 2017 Ieee World Engineering Education Conference (Edunine). 2017
- Engineering Education: balancing generalist and specialist formation in technological carriers: a current challenge. 2017 Ieee World Engineering Education Conference (Edunine). 2017
- Self-Oriented Learning based on Intelligent Systems into the Workplace. 2017 Ieee World Engineering Education Conference (Edunine). 2017
- Evaluating information systems with continuous assurance services. International Journal of Information Systems in the Service Sector. 2016
- Enrolment time as a requirement for biometric fingerprint recognition. International Journal of Electronic Security and Digital Forensics. 2014
- Organizational transactions with real time monitoring and auditing. Learning Organization. 2013
- Requirements in an Internet access sharing model. Information (Japan). 2013
- Requisitos para um Sistema Inteligente de Gestão/Análise de Eventos de Segurançada Informação. Proceedings of World Congress on Systems Engineering and Information Technology. 2013
- The matrix of quality dimensions of knowledge management: Knowledge management assessment models review. Knowledge Management. 2013
- User Perception for Biometrics and Secret Management. Proceedings of World Congress on Systems Engineering and Information Technology. 2013
- An Ontological Approach to Information Security Management. Proceedings of the International Conference on Information Warfare and Security. 2012
- Biometric technologies and their perception by the common citizen. International Journal of Electronic Security and Digital Forensics. 2012
- Study of the perception on the biometric technology by the Portuguese citizens. Global Security, Safety and Sustainability & e-Democracy. 2012
- A Security Audit Framework to Manage Information System Security. Communications in Computer and Information Science. 2010
- An audit framework to support information system security management. International Journal of Electronic Security and Digital Forensics. 2010
- Another Global City: Historical Explorations into the Transnational Municipal Moment, 1850-2000. ANOTHER GLOBAL CITY: HISTORICAL EXPLORATIONS INTO THE TRANSNATIONAL MUNICIPAL MOMENT, 1850-2000. 2010
- Cyberwar and the Russian Federation: the usual suspect. International Journal of Electronic Security and Digital Forensics. 2010
- User acceptance OTM machine: In the Arab culture. International Journal of Electronic Security and Digital Forensics. 2010
- A Grid Data Mining architecture for Learning Classifier Systems. WSEAS Transactions on Computers. 2009
- An Ontology Based Approach to Information Security. Communications in Computer and Information Science. 2009
- Previsão de Eventos Anormais em Sistemas de Vídeo-Vigilância. Actas do Simpósio Doutoral em Inteligência Artificial. 2007
- Data mining a prostate cancer dataset using rough sets. IEEE Intelligent Systems. 2006
- The OBSERVER: An intelligent and automated video surveillance system. Computational Methods in Applied Sciences. 2006
-
artigo de conferência
- Data Management in a Smart Campus Project: An Ontological Approach 2023
- People Tracking in a Smart Campus context using Multiple Cameras 2023
- Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification 2022
- Gain Enhancement of Diversity Slot Antenna Using FSS with Metamaterial Unit Cells for UWB Systems 2022
- Low-Profile MM-Wave PIFA Array with Omni-Directional and Full-Coverage Radiations 2022
- Roadmap of Security threats between IPv4/IPv6 2021
- Dual-Band MIMO Antenna Array for Sub 6 GHz 5G Smartphone Applications 2021
- Information Security Assessment and Certification within Supply Chains 2021
- Internal MIMO Antenna Design for Multi-Band Mobile Handset Applications 2021
- The Future of Engineering Education: Current Challenges and Opportunities 2021
- Wideband and Low-Profile Phased Array Smartphone Antenna Supporting 28-38 GHz 2021
- Plenary: The Challenges of Education in Engineering, Computing and Technology without exclusions: Innovation in the era of the Industrial Revolution 4.0. 2020
- EDGE4ALL - Edge Platform For Smart City 2019
- Plenary: Modern Educational Paradigms for a Computer and Engineer Career 2019
- Promoting Creativity in Final Year Engineering Students' Project: A case study in the Smart Cities context 2019
- Study of the Means of Online Payment in the Portuguese Population 2019
- Trends in engineering education: A disruptive view for not so far future. International Conference on Information Technology Based Higher Education and Training. 2019
- Online Smart City Simulator 2018
- Global Perspectives on Cybersecurity Education. Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE. 2018
- Message from the technical program chairs 2018
- The role of professional associations in contemporaneous engineer careers 2018
- Challenges and Reflections in Designing Cyber Security Curriculum 2017
- Classical engineering education coping with engineering profession demands 2017
- Engineering Education: Balancing generalist and specialist formation in technological carriers: A current challenge 2017
- Engineering course specially designed to face retention issue 2017
- Human skeleton detection from semi-constrained environment video 2017
- Knowledge security an empirical use of IT - Child abuse monitor system model 2017
- Pointer dynamics as cognitive biometrics 2017
- Self-Oriented Learning based on Intelligent Systems into the Workplace 2017
- What is missing for trust in the Cloud Computing? 2016
- A Trust model for Cloud Computing environment 2015
- Automatic human action recognition from video using Hidden Markov Model 2015
- Design of a case-based reasoner for information security in military organizations 2015
- Enrollment Time as a Requirement for Biometric Hand Recognition Systems. Proceedings of the International Conference on Information Warfare and Security. 2015
- Challenges in Information Security Protection 2014
- Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System 2014
- Enrolment Time as a Requirement for Face Recognition Biometric Systems 2014
- Management of internal control mechanisms in ERP for continuous monitoring purposes 2014
- Planning Method of Information Security for Military Organizations 2014
- A conceptual model for evaluating systems with continuous assurance services 2013
- An enterprise ontology-based database for continuous monitoring application 2013
- Biometrics Acceptance in Arab Culture: an Exploratory Study 2013
- Health Care Critical Knowledge Monitor System Model:Health Care Critical Knowledge Ontology Component 2013
- Health users' perception of biometric authentication technologies 2013
- Information security - Military standards versus ISO 27001: A case study in a Portuguese military organization 2013
- Scan detection system using artificial neural networks 2013
- A solution for real time monitoring and auditing of organizational transactions 2012
- An ontology approach in designing security information systems to support organizational security risk knowledge 2012
- Botnets: A heuristic-based detection framework 2012
- Continuous assurance on organizational transactions 2012
- Critical knowledge monitor system model: Healthcare context 2012
- Information security model to military organizations in environment of information warfare 2012
- Keystroke dynamics for continuous access control enforcement 2012
- Video casting application oriented key exchange 2012
- Botnet detection: A numerical and heuristic analysis 2011
- Description of a practical application of an information security audit framework 2011
- Grid data mining by means of learning classifier systems and distributed model induction 2011
- Intrusion detection through keystroke dynamics 2011
- A conceptual model approach to manage and audit information systems security 2010
- A security framework for audit and manage information system security 2010
- An ontology based approach to semantically structure data in security information systems 2010
- Automation of the Approval and Control Process of Documents 2010
- GridclassTK- Toolkit for grid learning classifier systems 2010
- Odour user interface for authentication: Possibility and acceptance: Case study 2010
- Podcasts in Higher Education: Students´ and Teachers´ Perspectives 2009
- RFID: Big brother global? 2009
- Security framework for information systems 2009
- Structured Textual Data Monitoring Based on a Rough Set Classifier 2008
- Information technologies for the information agent 2007
- Prediction of abnormal behaviors for intelligent video surveillance systems 2007
- An approach to information systems risk management of health units,Uma abordagem à gestão do risco para os sistemas de informação das unidades de saúde 2006
- An international governmental mailing system : A requirement to prevent web-enhanced terrorism 2006
- Critical aspects in authentication graphic keys 2006
- N-ary trees classifier 2006
- Reaching learning objectives of the cognitive domain with a synchronized streaming media environment 2006
- Moving object detection unaffected by cast shadows, highlights and ghosts. IEEE International Conference on Image Processing (ICIP). 2005
- Password secured sites - Stepping forward with keystroke dynamics 2005
- Modeling industrial embedded systems with UML 2000
-
artigo de revista
- Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture. Bioengineering. 2021
- Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices. Journal of Sensor and Actuator Networks. 2021
- Automatic human trajectory destination prediction from video. Expert Systems with Applications. 2018
- Comparison and evaluation of organizational transactions for continuous auditing and business compliance. International Journal of Information System Modeling and Design. 2018
- Automatic visual detection of human behavior: A review from 2000 to 2014. Expert Systems with Applications. 2015
- Monitoring organizational transactions in enterprise information systems with continuous assurance requirements. International Journal of Enterprise Information Systems. 2015
- A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics. 2007
- A Heterogeneous Computer Vision Architecture: Implementation Issues. Computing Systems in Engineering. 1995
-
capítulo de livro
- Exploring Risk Analysis Methods in IoE Projects: A Smart Campus Use Case 2024
- Information Security Metrics: Challenges and Models in an All-Digital World 2024
- Blockchain and Sustainability in the Public Sector: A Risk Management Perspective 2023
- Blockchain in the Public Sector: An Umbrella Review of Literature 2023
- Virtual Lab Virtues in Distance Learning 2022
- Proposing an Architecture for IoT Based on WSN 2021
- Agência da União Europeia para a Cibersegurança (ENISA) 2020
- EDGE4ALL: Edge Computing for Smart City. EAI/Springer Innovations in Communication and Computing. 2020
- Simulator for Smart City Environment 2020
- A Trust Model for Cloud Computing environment 2015
- Automation of the Approval and Control Process of Documents 2012
- Wireless Identity Management: Multimodal Biometrics and Multilayered IDM 2012
- Methods of Organizational Information Security 2010
- Multimodal Biometrics and Multilayered IDM for Secure Authentication 2010
- OTM Machine Acceptance: In the Arab Culture 2010
- Podcasts in Higher Education: Students’ and Lecturers’ Perspectives 2009
-
documento
- Science and Technologies for Smart Cities. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. 2020
- Smart City Summit Demos 2018 2019
- Security metrics to evaluate organizational IT security 2014
-
livro
- Preface 2023
- Cybersecurity ; A Practical Engineering Approach 2022
- Work-in-Progress: Global Experiences for Engineering Programs 2019
- Proposing a Behavior-Based IDS Model for IoT Environment 2018
- The information value: Perception of the problem 2016
- An immunity based configuration for multilayer single featured biometric authentication algorithms 2015
- Child abuse monitor system model: A health care critical knowledge monitor system 2015
- Detection of dangerous situations using a smart internet of things system 2015
- Insider threats: The major challenge to security risk management 2015
- Determinants of behavioral intention to mobile banking in Arab culture 2014
- Free typed text using keystroke dynamics for continuous authentication 2014
- A study of biometric authentication adoption in health services 2013
- Specialized knowledge systems - A model for intelligent learning management within organizations 2013
- User's requirements in Internet access sharing 2013
- Password Sharing and How to Reduce It 2010
- RFID: Big Brother Global? 2009
- An Ontology Based Approach to Data Surveillance 2008
- Using technology to overcome the password's contradiction 2008
- Voice based authentication using the null freqencies 2008
- Graphical based user authentication with embedded mouse stroke dynamics 2007
- Enhancing login security through the use of keystroke input dynamics 2006
- Data mining a keystroke dynamics based biometrics database using rough sets 2005
- A Methodology for Complex Embedded Systems Design: Petri Nets within a UML Approach 2001