2022
Authors
Pereira, ME; Deuermeier, J; Figueiredo, C; Santos, A; Carvalho, G; Tavares, VG; Martins, R; Fortunato, E; Barquinha, P; Kiazadeh, A;
Publication
ADVANCED ELECTRONIC MATERIALS
Abstract
Memristor crossbar arrays can compose the efficient hardware for artificial intelligent applications. However, the requirements for a linear and symmetric synaptic weight update and low cycle-to-cycle (C2C) and device-to-device variability as well as the sneak-path current issue have been delaying its further development. This study reports on a thin-film amorphous oxide-based 4x4 1-transistor 1-memristor (1T1M) crossbar. The a-IGZO crossbar is built on a flexible polyimide substrate, enabling IoT and wearable applications. In the novel framework, the thin-film transistor and memristor are fabricated at the same level, with the same processing steps and sharing the same materials for all layers. The 1T1M cells show linear and symmetrical plasticity characteristic with low C2C variability. The memristor performs like an analog dot product engine and vector-matrix multiplications in the 4x4 crossbars is demonstrated experimentally, in which the sneak-path current issue is successfully suppressed, resulting in a proof-of-concept for a cost-effective, flexible artificial neural networks hardware.
2022
Authors
Lopes, A; Reis, L; Mamede, HS; Santos, A;
Publication
INFORMATION SYSTEMS AND TECHNOLOGIES, WORLDCIST 2022, VOL 2
Abstract
Due to the value and diversity of data that organizations use and produce in their activity, it is extremely important to protect this asset. Security flaws can arise due to several factors and whenever it is difficult to access the desired information because of technological barriers. In this case, attacks are redirected to the exploitation of human beings vulnerabilities through various techniques. The objective of this work focuses on literature review, studying the underlying theme of Social Engineering, as it uses human trust, convincing someone of something fake, using various interactions and different vectors to gain access to private information. Design Science Research will support the research work due to the possibility of construction, evaluation, and subsequent validation of the artefact. The contribution of a framework proposal for preventing social engineering attacks in organizations and providing the best recommendations, guiding, and supporting the stakeholders in the selection and definition of controls that guarantee the security of organizational information and avoid possible attacks by Social Engineering. It is expected that the practical effects of the future work will result in a reduction in the number of attacks using Social Engineering, greater individual and collective preparation to deal with this problem and, over time, the incentive to the continued expansion of the adoption of these artefacts at the organizational level.
2022
Authors
Antunes, M; Maximiano, M; Gomes, R;
Publication
APPLIED SCIENCES-BASEL
Abstract
Information security and cybersecurity management play a key role in modern enterprises. There is a plethora of standards, frameworks, and tools, ISO 27000 and the NIST Cybersecurity Framework being two relevant families of international Information Security Management Standards (ISMSs). Globally, these standards are implemented by dedicated tools to collect and further analyze the information security auditing that is carried out in an enterprise. The overall goal of the auditing is to evaluate and mitigate the information security risk. The risk assessment is grounded by auditing processes, which examine and assess a list of predefined controls in a wide variety of subjects regarding cybersecurity and information security. For each control, a checklist of actions is applied and a set of corrective measures is proposed, in order to mitigate the flaws and to increase the level of compliance with the standard being used. The auditing process can apply different ISMSs in the same time frame. However, as these processes are time-consuming, involve on-site interventions, and imply specialized consulting teams, the methodology usually adopted by enterprises consists of applying a single ISMS and its existing tools and frameworks. This strategy brings overall less flexibility and diversity to the auditing process and, consequently, to the assessment results of the audited enterprise. In a broad sense, the auditing needs of Small and Medium-sized Enterprises (SMEs) are different from large companies and do not fit with all the existing ISMSs' frameworks, that is a set of controls of a particular ISMS is not suitable to be applied in an auditing process, in an SME. In this paper, we propose a generic and client-centered web-integrated cybersecurity auditing information system. The proposed system can be widely used in a myriad of auditing processes, as it is flexible and it can load a set of predefined controls' checklist assessment and their corresponding mitigation tasks' list. It was designed to meet both SMEs' and large enterprises' requirements and stores auditing and intervention-related data in a relational database. The information system was tested within an ISO 27001:2013 information security auditing project, in which fifty SMEs participated. The overall architecture and design are depicted and the global results are detailed in this paper.
2022
Authors
De Macedo, J; Abreu, R; Pereira, R; Saraiva, J;
Publication
2022 INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABILITY (ICT4S 2022)
Abstract
The worldwide Web has dramatically evolved in recent years. Web pages are dynamic, expressed by programs written in common programming languages given rise to sophisticated Web applications. Thus, Web browsers are almost operating systems, having to interpret/compile such programs and execute them. Although JavaScript is widely used to express dynamic Web pages, it has several shortcomings and performance inefficiencies. To overcome such limitations, major IT powerhouses are developing a new portable and size/load efficient language: WebAssembly. In this paper, we conduct the first systematic study on the energy and run-time performance of WebAssembly and JavaScript on the Web. We used micro-benchmarks and also real applications in order to have more realistic results. Preliminary results show that WebAssembly, while still in its infancy, is starting to already outperform JavaScript, with much more room to grow. A statistical analysis indicates that WebAssembly produces significant performance differences compared to JavaScript. However, these differences differ between micro-benchmarks and real-world benchmarks. Our results also show that WebAssembly improved energy efficiency by 30%, on average, and showed how different WebAssembly behaviour is among three popular Web Browsers: Google Chrome, Microsoft Edge, and Mozilla Firefox. Our findings indicate that WebAssembly is faster than JavaScript and even more energy-efficient. Additionally, our benchmarking framework is also available to allow further research and replication.
2022
Authors
Silva, I; Pedras, S; Oliveira, R; Veiga, C; Paredes, H;
Publication
TRIALS
Abstract
Background: Physical exercise is a first-line treatment for peripheral arterial disease (PAD) and intermittent claudication (IC) reducing pain and increasing the distances walked. Home-based exercise therapy (HBET) has the advantage of reaching a higher number of patients and increasing adherence to physical exercise as it is performed in the patient's residential area and does not have the time, cost, and access restrictions of supervised exercise therapy (SET) implemented in a clinical setting. Even so, rates of adherence to physical exercise are relatively low, and therefore, m-health tools are promising in increasing motivation to behavior change and adherence to physical exercise. A built-in virtual assistant is a patient-focused tool available in a mobile interface, providing a variety of functions including health education, motivation, and implementation of behavior change techniques. Methods: This is a single-center, prospective, three-arm, single-blind, randomized, controlled, superior clinical trial with stratified and blocked random allocation. Three hundred participants with PAD and IC will be recruited from an Angiology and Vascular Surgery Department, Centro Hospitalar Universitario Porto (CHUPorto), Porto, Portugal. All patients will receive the same medical care recommended by current guidelines. Participants in all three groups will receive a personalized prescription for an HBET program and a behavioral change and motivational intervention. Participants in experimental groups 1 and 2 will receive a smartphone with the WalkingPad app to monitor exercise sessions. Experimental group 2 WalkingPad app will have a built-in virtual assistant that will promote behavioral change and provide motivational support. Participants allocated to the active control group will not receive the m-health tool, but a practice diary to encourage monitoring. The program will last for 6 months with three evaluation moments (baseline, 3, and 6 months). The primary outcome will be the change in distances walked (maximal and pain-free) from baseline to 3 and 6 months. Secondary outcomes will be changes in quality of life, patients' perception of resistance, and walking speed. Discussion: This study will allow measuring the effectiveness of an m-health tool in increasing motivation for behavior change and adherence to an HBET program in patients with PAD. The superiority of experimental group 2 in the primary and secondary outcomes will indicate that the virtual assistant is effective for motivating behavioral change and encouraging the practice and adherence to physical exercise. The use of m-health tools and virtual health assistants can potentially fill a gap in the access and quality of health services and information, reducing the burden on the health system and promoting self-management and self-care in chronic illness.
2022
Authors
Garcia J.E.;
Publication
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.