2022
Authors
de Almeida, JESC; Carneiro, MA; Silva, MFL; Baptista, RJV;
Publication
Lecture Notes in Networks and Systems
Abstract
Following the reduced number of female students at ISTEC Porto computer science and engineering courses, we tried to find out what are the factors that might be causing this fact. This gender inequality was found looking back at the data from the last 15 years, clearly showing the gap between male and female students managing to conclude the degree. To point out the reasons and probable explanation a literature review was made to figure out conceivable paths to change this status quo. The article concludes that gender inequality resides on cultural differences as well as in the lack of information about the real role played by women in technology companies, particularly IT companies. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2022
Authors
Rosa, I; Batista, R; Goncalves, R; Martins, J; Branco, F;
Publication
2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
When talking about Cybersecurity, particularly in security incident response plan and processes it is very common and relevant to talk about the ability to detect malicious or suspicious activities and behavior as soon as possible, in other words, in this domain, in Cybersecurity everyone wants to reduce the Mean time to detect (MTTD) or Mean time to respond (MTTR) a potential security incident. The use of Cyber Threat Intelligence CTI indicators can contribute to the reduction of the mean time to detect threats and consequently directly influence the time to response, however there are different types of Cyber Threat Intelligence that serve different purposes. The objective of the study is the development of a reference architecture to support and process data from the most diverse type of data sources in terms of Cyber Threat Intelligence, for example using the combination data from Open Source Intelligence - OSINT sources and honeypots, taking into consideration the advantages and disadvantages of each of these types of data sources to correlate them with each other in order to increase the trust and reliability of the relevant indicators that can be used by security analysts in incident response processes. This paper presents the proposed work for a PhD thesis in Web Science and Technology, scheduled for completion in July 2023. This doctoral thesis falls within the area of Computer Engineering, with applicability in the domain of Cybersecurity and consequently in the subdomain of Threat Intelligence. The research project is in the state-of-the-art study phase. It is expected that the participation in this Doctoral Symposium will provide potential comments that can enhance the growth and complement the ongoing research work.
2025
Authors
Baptista, R; Stuart, AM; Tran, S;
Publication
CoRR
Abstract
2025
Authors
Pistono, A; Santos, A; Baptista, R;
Publication
World Journal of Information Systems
Abstract
2017
Authors
Ricardo José Vieira Baptista;
Publication
Abstract
2021
Authors
Oliveira, André; Gomes, António Alberto; Baptista, Ricardo;
Publication
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.