Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Ramiro Gonçalves

2021

A flow-based intrusion detection framework for internet of things networks

Authors
Santos, L; Goncalves, R; Rabadao, C; Martins, J;

Publication
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS

Abstract
The application of the Internet of Things concept in domains such as industrial control, building automation, human health, and environmental monitoring, introduces new privacy and security challenges. Consequently, traditional implementation of monitoring and security mechanisms cannot always be presently feasible and adequate due to the number of IoT devices, their heterogeneity and the typical limitations of their technical specifications. In this paper, we propose an IP flow-based Intrusion Detection System (IDS) framework to monitor and protect IoT networks from external and internal threats in real-time. The proposed framework collects IP flows from an IoT network and analyses them in order to monitor and detect attacks, intrusions, and other types of anomalies at different IoT architecture layers based on some flow features instead of using packet headers fields and their payload. The proposed framework was designed to consider both the IoT network architecture and other IoT contextual characteristics such as scalability, heterogeneity, interoperability, and the minimization of the use of IoT networks resources. The proposed IDS framework is network-based and relies on a hybrid architecture, as it involves both centralized analysis and distributed data collection components. In terms of detection method, the framework uses a specification-based approach drawn on normal traffic specifications. The experimental results show that this framework can achieve approximate to 100% success and 0% of false positives in detection of intrusions and anomalies. In terms of performance and scalability in the operation of the IDS components, we study and compare it with three different conventional IDS (Snort, Suricata, and Zeek) and the results demonstrate that the proposed solution can consume fewer computational resources (CPU, RAM, and persistent memory) when compared to those conventional IDS.

2023

Guiding Evacuees to Improve Fire Building Evacuation Efficiency: Hazard and Congestion Models to Support Decision Making by a Context-Aware Recommender System

Authors
Neto, J; Morais, AJ; Gonçalves, R; Coelho, AL;

Publication
BUILDINGS

Abstract
Fires in large buildings can have tragic consequences, including the loss of human lives. Despite the advancements in building construction and fire safety technologies, the unpredictable nature of fires, particularly in large buildings, remains an enormous challenge. Acknowledging the paramount importance of prioritising human safety, the academic community has been focusing consistently on enhancing the efficiency of building evacuation. While previous studies have integrated evacuation simulation models, aiding in aspects such as the design of evacuation routes and emergency signalling, modelling human behaviour during a fire emergency remains challenging due to cognitive complexities. Moreover, behavioural differences from country to country add another layer of complexity, hindering the creation of a universal behaviour model. Instead of centring on modelling the occupant behaviour, this paper proposes an innovative approach aimed at enhancing the occupants' behaviour predictability by providing real-time information to the occupants regarding the most suitable evacuation routes. The proposed models use a building's environmental conditions to generate contextual information, aiding in developing solutions to make the occupants' behaviour more predictable by providing them with real-time information on the most appropriate and efficient evacuation routes at each moment, guiding the occupants to safety during a fire emergency. The models were incorporated into a context-aware recommender system for testing purposes. The simulation results indicate that such a system, coupled with hazard and congestion models, positively influences the occupants' behaviour, fostering faster adaptation to the environmental conditions and ultimately enhancing the efficiency of building evacuations.

2023

ICT Accessibility Requirements Tool - Version 1.2-Implementing Experts' Contributions, Improvements, and Suggestions

Authors
Martins, M; Godinho, F; Gonçalves, P; Gonçalves, R;

Publication
UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION, UAHCI 2023, PT I

Abstract
The Accessibility Requirements Tool for Information and Communication Technologies (FRATIC) was developed within the work of a doctoral project, at the University of Tras-os-Montes and Alto Douro, and may be used at various stages of public procurement processes as well as projects and developments that include ICT products and services. This tool helps to consult, determine and assess the accessibility requirements for ICT products and services in European Standard EN 301 549 supporting the legislation in the field of public procurement for the countries of the European Union - Directive 2014/24/EU. This paper focuses on the implementation of contributions, improvements, and suggestions from 25 experts in the fields of accessibility, assistive technologies and public procurement, gathered from usability tests and semi-structured interviews, which were conducted on FRATIC version 1.1. The implementation of these has resulted in an improved version of the tool: FRATIC 1.2.

2024

Preliminary Research to Propose a Master Data Management Framework Aimed at Triggering Data Governance Maturity

Authors
Guerreiro, L; Bernardo, MD; Martins, J; Gonçalves, R; Branco, F;

Publication
INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, WORLDCIST 2023

Abstract
Data management solutions became highly expensive and ineffective mainly due to the lack of transparent processes and procedures to measure and provide clear guidance on the steps needed to implement them. The organizations and specialists agree that the only manner solve the data management issues requires the implementation of data governance. Many of those attempts had failed previously because they were based only on IT, with rigid processes and activities frequently split by systems or the areas supported by systems and their data. It shows that Data governance has been acquiring significant relevance. However, a consensus or even a holist approach was not achieved so far. This paper that is part of an ongoing thesis research that aims to identify the main gaps and opportunities by summarizing and study the literature consistently and as result at the end of the research it will propose a standard framework for data governance measuring its impact on the Data Governance maturity level before and after its implementation and thus as contribute to the community by trying to mitigate the problems found.

2024

Factors Affecting Cloud Computing Adoption in the Education Context-Systematic Literature Review

Authors
Santos, A; Martins, J; Pestana, PD; Gonçalves, R; Mamede, HS; Branco, F;

Publication
IEEE ACCESS

Abstract
This systematic literature review investigates the factors influencing cloud computing adoption within both educational and organizational settings. By synthesizing a comprehensive body of research, this study finds and analyzes the determinants that shape the decision-making process about cloud technology adoption. Security, cost-effectiveness, scalability, interoperability, and regulatory compliance are examined across educational institutions and organizational contexts. Additionally, socio-economic, political, and technological factors specific to each context are explored to provide a nuanced understanding of the challenges and opportunities associated with cloud computing adoption. The review reveals commonalities and differences in adoption drivers and barriers between education and organizational environments, offering insights into tailored strategies for effective implementation. This research contributes to the existing literature by shedding light on the multifaceted nature of cloud adoption and offering valuable guidance for educators, organizational leaders, policymakers, and technology providers looking to use cloud computing to enhance operations and services.

2024

Towards Safer and Efficient Dowry Transactions: A Blockchain-Based Approach

Authors
Bria, MMS; Goncalves, R; Martins, J; Serodio, C; Branco, F;

Publication
GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024

Abstract
The dowry payment system is used in the cultural context and tradition of certain financial transactions related to marriages and engagement. However, disputes, fraud, and financial gaps in exploitation occur in these systems, which affect user confidence. This study uses an exploratory approach to identify the main weaknesses of current traditional dowry payment systems and analyses the benefits that blockchain technology and smart contracts can provide. The proposed data security framework combines blockchain security features such as decentralisation, cryptography, and automatic verification through smart contracts to ensure the integrity and reliability of dowry payment transactions. In this study, we adopt the Design Science Research (DSR) methodology to propose producing and developing artefacts that support solving problems in the existing dowry payment system more efficiently. We will disseminate new ideas or concepts developed to indigenous communities in Timor-Leste using the Diffusion of Innovation (DOI) and Technology Acceptance Model (TAM) frameworks to ensure that the technological framework developed can be used safely and efficiently.

  • 35
  • 36