Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
About

About

Frederico Branco is an assistant professor at the University of Trás-os-Montes and Alto Douro and a senior researcher at the INESC TEC research center. He has published over 90 articles in journals and event proceedings. He has published over 90 articles in journals and event proceedings. He is also involved in several academic works as a project, dissertation, and thesis supervisor and is continuously participating in several research projects. His professional career is also directly related to the industry, with a particular focus on various planning and implementation projects in information systems, with particular attention to the agri-food and services sectors. Throughout his career, he has held various senior management roles in the areas of operations, information systems, and quality management.

Interest
Topics
Details

Details

  • Name

    Frederico Branco
  • Since

    01st April 2015
009
Publications

2026

The Ecosystem of Information Systems in Higher Education: A Strategic Perspective on Business Intelligence and Decision Support

Authors
, R; Reis, A; Branco, FA; Alves, P;

Publication
Communications in Computer and Information Science

Abstract
Higher Education Institutions (HEIs) face significant challenges in managing and integrating diverse Information System (ISs) that support academic, administrative, and strategic operations. As digital transformation advances, the need for seamless interoperability and data-driven governance becomes increasingly crucial. This study provides a comprehensive analysis of the ISs Ecosystem (ISE) in HEIs, emphasizing the importance of system integration, Business Intelligence (BI) solutions, and Decision Support Systems (DSS) in fostering efficient, data-driven decision-making. By examining a real-world case study of the University of Trás-os-Montes and Alto Douro (UTAD), this research validates the role of BI in transforming fragmented information landscapes into cohesive digital environments. The findings demonstrate that successful BI adoption requires well-defined governance structures, seamless data flow, and alignment with institutional objectives. Additionally, the study underscores the strategic impact of interoperability, highlighting how institutions can enhance institutional intelligence, streamline decision-making processes, and improve operational efficiency through an integrated BI ecosystem. The insights contribute to ongoing discussions on digital transformation in higher education, offering a scalable framework for HEIs seeking to transition from isolated systems to an interoperable and intelligent data ecosystem. The paper also explores emerging trends such as AI-driven analytics and predictive modelling, outlining potential pathways for HEIs to further optimize their decision-support infrastructures. © 2025 Elsevier B.V., All rights reserved.

2025

A Container-Native IAM Framework for Secure Green Mobility: A Case Study with Keycloak and Kubernetes

Authors
Sousa, A; Branco, F; Reis, A; Reis, MJCS;

Publication
INFORMATION

Abstract
The rapid adoption of green mobility solutions-such as electric-vehicle sharing and intelligent transportation systems-has accelerated the integration of Internet of Things (IoT) technologies, introducing complex security and performance challenges. While conceptual Identity and Access Management (IAM) frameworks exist, few are empirically validated for the scale, heterogeneity, and real-time demands of modern mobility ecosystems. This work presents a data-backed, container-native reference architecture for secure and resilient Authentication, Authorization, and Accounting (AAA) in green mobility environments. The framework integrates Keycloak within a Kubernetes-orchestrated infrastructure and applies Zero Trust and defense-in-depth principles. Effectiveness is demonstrated through rigorous benchmarking across latency, throughput, memory footprint, and automated fault recovery. Compared to a monolithic baseline, the proposed architecture achieves over 300% higher throughput, 90% faster startup times, and 75% lower idle memory usage while enabling full service restoration in under one minute. This work establishes a validated deployment blueprint for IAM in IoT-driven transportation systems, offering a practical foundation for a secure and scalable mobility infrastructure.

2025

A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats

Authors
Santos, P; Abreu, R; Reis, MJCS; Serôdio, C; Branco, F;

Publication
SENSORS

Abstract
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify the most effective tools and methodologies for threat detection and prevention, and highlight the limitations of current approaches. An extensive search of academic databases was conducted following the PRISMA guidelines, including 43 relevant studies. This number reflects a rigorous selection process based on defined inclusion, exclusion, and quality criteria and is consistent with the scope of similar systematic reviews in the field of cyber threat intelligence. This review concludes that while CTI significantly improves the ability to predict and prevent cyber threats, challenges such as data standardization, privacy concerns, and trust between organizations persist. It also underscores the necessity of continuously improving CTI practices by leveraging the integration of advanced technologies and creating enhanced collaboration frameworks. These advancements are essential for developing a robust and adaptive cybersecurity posture capable of responding to an evolving threat landscape, ultimately contributing to a more secure digital environment for all sectors. Overall, the review provides practical reflections on the current state of CTI and suggests future research directions to strengthen and improve CTI's effectiveness.

2025

A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols

Authors
Hussain, I; Reis, MJCS; Serodio, C; Branco, F;

Publication
FUTURE INTERNET

Abstract
This research examined the domain of intelligent transportation systems (ITS) by analyzing the impact of scholarly work and thematic prevalence, as well as focusing attention on vehicles, their technologies, cybersecurity, and related scholarly technologies. This was performed by examining the scientific literature indexed in the Scopus database. This study analysed 2919 documents published between 2018 and 2025. The findings indicated that the highest and most significant journal was derived from IEEE Transactions on Vehicular Technology, with significant standing to the growth of communication and computing on vehicles with edge computing and AI optimization of vehicular systems. In addition, important PST research conferences highlighted the growing interest in academic research in cybersecurity for vehicle networks. Sensor networks, pose forensics, and privacy-preserving communication frameworks were some of the significant contributing fields marking the significance of the interdisciplinary nature of this research. Employing bibliometric analysis, the literature illustrated the multiple channels integrating knowledge creation and innovation in ITS through citation analysis. The outcome suggested an increasingly sophisticated research area, weighing technical progress and increasing concern about security and privacy measures. Further studies must investigate edge computing integrated with AI, advanced privacy-preserving linguistic protocols, and new vehicular network intrusion detection systems.

2025

Cybersecurity in Connected and Autonomous Vehicles: A Systematic Review of Automotive Security

Authors
Abreu, R; Branco, F; Reis, MJCS; Serôdio, C;

Publication
IEEE ACCESS

Abstract
The rapid evolution of the automotive industry has driven the emergence of Connected and Autonomous Vehicles, raising significant concerns about the cybersecurity vulnerabilities inherent in their complex networks. This systematic review investigates cybersecurity in Connected and Autonomous Vehicles, focusing on internal and external networks and addressing four key research questions: (RQ1) What security controls exist in CAV networks? (RQ2) What methodologies are employed in cybersecurity studies? (RQ3) How effective are these methods, and what limitations do they present? (RQ4) What are the key themes, common approaches, and future research directions? Peer-reviewed studies published between 2019 and 2024 were included, using IEEE Xplore, Elsevier, MDPI, ACM Digital Library, and Springer as data sources. Following PRISMA 2020 guidelines, 111 relevant articles were analysed and grouped into seven themes: Authentication, Blockchain, Intrusion Detection Systems, Vehicle-to-Everything communication, Network Operation Centers, Security Operations Centers, and Systematic Reviews. The thematic synthesis highlighted study objectives, methodologies, and implemented security controls. This review identifies significant gaps in the literature, particularly in integrating Security Information and Event Management systems and the real-world validation of proposed security measures. It underscores the need for adaptive cybersecurity frameworks to address evolving threats and highlights the importance of collaboration between academia and industry. Furthermore, future research should prioritize the development of advanced security protocols, address scalability challenges, and explore the impact of emerging technologies such as Artificial Intelligence and 5G. Providing awareness and training is also essential to mitigate human error. These findings are a foundation for designing more resilient and secure Connected and Autonomous Vehicles systems.