Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by HASLab

2024

Enhancing the European power system resilience with a recommendation system for voluntary demand response

Authors
Silva, CAM; Bessa, RJ; Andrade, JR; Coelho, FA; Costa, RB; Silva, CD; Vlachodimitropoulos, G; Stavropoulos, D; Chadoulos, S; Rua, DE;

Publication
ISCIENCE

Abstract
Climate change, geopolitical tensions, and decarbonization targets are bringing the resilience of the European electric power system to the forefront of discussion. Among various regulatory and technological solutions, voluntary demand response can help balance generation and demand during periods of energy scarcity or renewable energy generation surplus. This work presents an open data service called Interoperable Recommender that leverages publicly accessible data to calculate a country-specific operational balancing risk, providing actionable recommendations to empower citizens toward adaptive energy consumption, considering interconnections and local grid constraints. Using semantic interoperability, it enables third- party services to enhance energy management and customize applications to consumers. Real-world pilots in Portugal, Greece, and Croatia with over 300 consumers demonstrated the effectiveness of providing signals across diverse contexts. For instance, in Portugal, 7% of the hours included actionable recommendations, and metering data revealed a consumption decrease of 4% during periods when consumers were requested to lower consumption.

2024

Impact of Traffic Sampling on LRD Estimation

Authors
Mendes, J; Lima, SR; Carvalho, P; Silva, JMC;

Publication
INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, WORLDCIST 2023

Abstract
Network traffic sampling is an effective method for understanding the behavior and dynamics of a network, being essential to assist network planning and management. Tasks such as controlling Service Level Agreements or Quality of Service, as well as planning the capacity and the safety of a network can benefit from traffic sampling advantages. The main objective of this paper is focused on evaluating the impact of sampling network traffic on: (i) achieving a low-overhead estimation of the network state and (ii) assessing the statistical properties that sampled network traffic presents regarding the eventual persistence of LongRange Dependence (LRD). For that, different Hurst parameter estimators have been used. Facing the impact of LRD on network congestion and traffic engineering, this work will help clarify the suitability of distinct sampling techniques in accurate network analysis.

2024

Expert Systems in Information Security: A Comprehensive Exploration of Awareness Strategies Against Social Engineering Attacks

Authors
Cardoso, WR; Ribeiro, ADL; da Silva, JMC;

Publication
GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, WORLDCIST 2024

Abstract
This article delves into the pivotal role of expert systems in bolstering information security, with a specific emphasis on their effectiveness in awareness and training programs aimed at thwarting social engineering attacks. Employing a snowball methodology, the research expands upon seminal works, highlighting the intersection between expert systems and cybersecurity. The study identifies a gap in current understanding and aims to contribute valuable insights to the field. By analyzing five key articles as seeds, the research explores the landscape of expert systems in information security, emphasizing their potential impact on cultivating robust defenses against evolving cyber threats.

2024

VQC-based reinforcement learning with data re-uploading: performance and trainability

Authors
Coelho, R; Sequeira, A; Santos, LP;

Publication
QUANTUM MACHINE INTELLIGENCE

Abstract
Reinforcement learning (RL) consists of designing agents that make intelligent decisions without human supervision. When used alongside function approximators such as Neural Networks (NNs), RL is capable of solving extremely complex problems. Deep Q-Learning, a RL algorithm that uses Deep NNs, has been shown to achieve super-human performance in game-related tasks. Nonetheless, it is also possible to use Variational Quantum Circuits (VQCs) as function approximators in RL algorithms. This work empirically studies the performance and trainability of such VQC-based Deep Q-Learning models in classic control benchmark environments. More specifically, we research how data re-uploading affects both these metrics. We show that the magnitude and the variance of the model's gradients remain substantial throughout training even as the number of qubits increases. In fact, both increase considerably in the training's early stages, when the agent needs to learn the most. They decrease later in the training, when the agent should have done most of the learning and started converging to a policy. Thus, even if the probability of being initialized in a Barren Plateau increases exponentially with system size for Hardware-Efficient ansatzes, these results indicate that the VQC-based Deep Q-Learning models may still be able to find large gradients throughout training, allowing for learning.

2024

GLITCH: Polyglot Code Smell Detection in Infrastructure as Code

Authors
Saavedra, N; Ferreira, JF; Mendes, A;

Publication
ERCIM NEWS

Abstract
GLITCH is a versatile tool designed for detecting code smells in Infrastructure as Code (IaC) scripts across multiple technologies. Developed by researchers from INESC-ID (Lisbon), INESC TEC (Porto), Instituto Superior T & eacute;cnico / University of Lisbon, and the Faculty of Engineering / University of Porto, GLITCH automates the detection of both security and design flaws in scripts written in Ansible, Chef, Docker, Puppet, and Terraform. By using a technology-agnostic framework, GLITCH aims to improve the consistency and efficiency of code smell detection, making it valuable resource for DevOps engineers and researchers focused on software quality.

2024

Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

Authors
Rodrigues, B; Amorim, I; Silva, I; Mendes, A;

Publication
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I

Abstract
The exponential growth in the digitisation of services implies the handling and storage of large volumes of data. Businesses and services see data sharing and crossing as an opportunity to improve and produce new business opportunities. The health sector is one area where this proves to be true, enabling better and more innovative treatments. Notwithstanding, this raises concerns regarding personal data being treated and processed. In this paper, we present a patient-centric platform for the secure sharing of health records by shifting the control over the data to the patient, therefore, providing a step further towards data sovereignty. Data sharing is performed only with the consent of the patient, allowing it to revoke access at any given time. Furthermore, we also provide a break-glass approach, resorting to Proxy Re-encryption (PRE) and the concept of a centralised trusted entity that possesses instant access to patients' medical records. Lastly, an analysis is made to assess the performance of the platform's key operations, and the impact that a PRE scheme has on those operations.

  • 17
  • 256