Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2022

Host-based IDS: A review and open issues of an anomaly detection system in IoT

Authors
Martins, I; Resende, JS; Sousa, PR; Silva, S; Antunes, L; Gama, J;

Publication
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE

Abstract
The Internet of Things (IoT) envisions a smart environment powered by connectivity and heterogeneity where ensuring reliable services and communications across multiple industries, from financial fields to healthcare and fault detection systems, is a top priority. In such fields, data is being collected and broadcast at high speed on a continuous and real-time scale, including IoT in the streaming processing paradigm. Intrusion Detection Systems (IDS) rely on manually defined security policies and signatures that fail to design a real-time solution or prevent zero-day attacks. Therefore, anomaly detection appears as a prominent solution capable of recognizing patterns, learning from experience, and detecting abnormal behavior. However, most approaches do not fit the urged requirements, often evaluated on deprecated datasets not representative of the working environment. As a result, our contributions address an overview of cybersecurity threats in IoT, important recommendations for a real-time IDS, and a real-time dataset setting to evaluate a security system covering multiple cyber threats. The dataset used to evaluate current host-based IDS approaches is publicly available and can be used as a benchmark by the community.

2022

Natural Regeneration of Maritime Pine: A Review of the Influencing Factors and Proposals for Management

Authors
Ribeiro, S; Cerveira, A; Soares, P; Fonseca, T;

Publication
FORESTS

Abstract
The main objective of the present work was to review the current knowledge about the factors that influence the different phases of the natural regeneration of maritime pine (Pinus pinaster Aiton) and propose scientifically based management schedules. The review focused on the natural regeneration of maritime pine within its most representative areas (Portugal, Spain, and France). First, a brief characterisation of the main phases of the natural regeneration of maritime pine is described. Next, information on the factors affecting the natural regeneration of the species is provided, highlighting its positive and negative effects. Finally, management proposals are presented to promote the natural regeneration of maritime pine species. Numerous factors influencing the natural regeneration of maritime pine were identified. Fires and climatic factors can intervene in all three regeneration phases (seeding, germination, and seedling survival and development). The natural regeneration failure of maritime pine species can be aggravated in drier scenarios. Forest management plays an important role as it can promote the natural regeneration of the species.

2022

Using EPP Boxes in a Dark Store: A New Approach to Simplify Food Retail E-Commerce Deliveries

Authors
Pintado, E; de Oliveira, LC; Garcia, JE;

Publication
BUSINESS SYSTEMS RESEARCH JOURNAL

Abstract
Background: E-commerce has emerged as a good response to the pandemic of COVID-19. However, the costs of providing a service, which includes a driver and a vehicle, in a regular vehicle that can transport goods that need positive cold (0 & DEG; to 5 & DEG;C) are very high. Objectives: This paper aims to investigate how a big Portuguese retailer company can reduce its dependence on refrigerated vehicles, simplifying operations and reducing the costs of transporting positive and negative cold food. Methods/Approach: This research was carried out in a food retailer Portuguese company, more precisely in a Dark Store dedicated to the online channel. The study was developed based on the AS-IS/TO-BE process analysis methodology, starting with the analysis of the current situation, giving rise to the so-called AS-IS model. Results: It was possible to reduce costs associated with transporting positive cold goods. As a result, there are 30% fewer costs associated with order transportation. With an additional 10% in space optimization with the gain of space within the galley of each vehicle. Conclusions: The costs of transporting positive and negative cold foods were decreased, and substituting vehicles with room temperature transport reduced the need for refrigerated vehicles.

2022

Development of soft skills competencies through the use of FLIGBY

Authors
Almeida, F; Buzady, Z;

Publication
TECHNOLOGY PEDAGOGY AND EDUCATION

Abstract
Traditionally, serious games have been used in the development of hard skills, particularly in technical areas such as health, engineering, defence or the environment. However, they can also be applied in the assessment and development of soft skills, which are increasingly key competencies for an individual in the twenty-first century. In this sense, this study proposes the adoption of the FLIGBY serious game in a higher education institution to evaluate and develop students' skills in this field. The findings indicate a large correspondence between the soft skills fundamental to the twenty-first century and the assessment dimensions recorded by the game. Furthermore, the findings reveal that FLIGBY can be used primarily to develop skills in dimensions such as leadership, conflict management, diplomacy and emotional intelligence. These findings are relevant for higher education institutions that intend to include and foster the development of soft skills competencies in their curricula.

2022

Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?

Authors
Lopes, D; Medeiros, P; Dong, JD; Barradas, D; Portela, B; Vinagre, J; Ferreira, B; Christin, N; Santos, N;

Publication
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022

Abstract
Tor is the most popular anonymity network in the world. It relies on advanced security and obfuscation techniques to ensure the privacy of its users and free access to the Internet. However, the investigation of traffic correlation attacks against Tor Onion Services (OSes) has been relatively overlooked in the literature. In particular, determining whether it is possible to emulate a global passive adversary capable of deanonymizing the IP addresses of both the Tor OSes and of the clients accessing them has remained, so far, an open question. In this paper, we present ongoing work toward addressing this question and reveal some preliminary results on a scalable traffic correlation attack that can potentially be used to deanonymize Tor OS sessions. Our attack is based on a distributed architecture involving a group of colluding ISPs from across the world. After collecting Tor traffic samples at multiple vantage points, ISPs can run them through a pipeline where several stages of traffic classifiers employ complementary techniques that result in the deanonymization of OS sessions with high confidence (i.e., low false positives). We have responsibly disclosed our early results with the Tor Project team and are currently working not only on improving the effectiveness of our attack but also on developing countermeasures to preserve Tor users' privacy.

2022

COVID-19 Impact on Forecasting Emergency Department Visits Performance

Authors
Silva, E; Ferreira-Coimbra, J; Oliveira, E; Henriques, M; Rodrigues, NF;

Publication
SSRN Electronic Journal

Abstract

  • 600
  • 4201